CN104657633A - Program-based characteristic numeric code encryption method - Google Patents
Program-based characteristic numeric code encryption method Download PDFInfo
- Publication number
- CN104657633A CN104657633A CN201410645858.3A CN201410645858A CN104657633A CN 104657633 A CN104657633 A CN 104657633A CN 201410645858 A CN201410645858 A CN 201410645858A CN 104657633 A CN104657633 A CN 104657633A
- Authority
- CN
- China
- Prior art keywords
- program
- word code
- number word
- characteristic number
- characteristic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a program-based characteristic numeric code encryption method. The method includes the steps of embedding a set of random numbers to an encrypted program, designing a characteristic numeric code algorithm and embedding the algorithm to the encrypted program, issuing the encrypted program and a corresponding characteristic numeric code serving as a user password to a user side, entering the password in a password dialog box by a user to start the program, calculating a characteristics numeric code of the program through the characteristic numeric code algorithm embedded into the program, comparing whether the password entered by the user is identical to the password of the program or not, if so, executing the program, and if not, quitting the program. The program-based characteristic numeric code encryption method reduces the risk of finding and cracking of the password carried with the program.
Description
Technical field
The present invention relates to computer software fields, particularly a kind of characteristic number word code encryption method based on program self.
Background technology
For the consideration of safety or interests, add that licencing key is necessary when program performs, general program encryption method is that password is placed on program somewhere, and the person that is not easily cracked finds and revises, and makes failed encryption.
Summary of the invention
Goal of the invention: for above-mentioned prior art Problems existing and deficiency, the object of this invention is to provide a kind of characteristic number word code encryption method based on program self, reduces password and be found, revise, make the risk of failed encryption, and easily realize.
Technical scheme: for achieving the above object, the technical solution used in the present invention is a kind of characteristic number word code encryption method based on program self, comprises the steps:
(1) the characteristic number word code that user inputs when startup the second program is received; Described second program is generate after the computing method being implanted into one group of random number and characteristic number word code in the first program;
(2) start the computing method of the characteristic number word code in described second program, calculate the characteristic number word code of described second program self according to described random number;
(3) the characteristic number word code in more described (1) step and the characteristic number word code in (1) step, if corresponding, then perform described second program.
Preferably, before described step (1), described method also comprises the steps:
(01) described second program is generated after the computing method being implanted into one group of random number and characteristic number word code in described first program;
(02) utilize the computing method of described characteristic number word code, calculate the characteristic number word code of described second program self according to described random number;
(03) the characteristic number word code of described second program and described second program self is sent to targeted customer.
Preferably, described step (03) is the characteristic number word code being sent described second program and described second program self by different paths to targeted customer respectively.
Preferably, corresponding different targeted customers, the described random number computing method that are different and/or described characteristic number word code implanted in described first program are different.
Beneficial effect: the characteristic number word code encryption method that the present invention is based on program self, not existing characteristics digital code in encrypted program, cracker cannot find the plaintext of characteristic number word code, thus not by the mode cracking programs of Modify password.
Accompanying drawing explanation
Fig. 1 is schematic diagram of the present invention;
Fig. 2 is the inventive method process flow diagram;
Fig. 3 is the code snippet of the first program;
Fig. 4 is that random number implants the code segment after in the code snippet of the first program;
Fig. 5 is cryptographic session frame.
Embodiment
Below in conjunction with the drawings and specific embodiments, illustrate the present invention further, these embodiments should be understood only be not used in for illustration of the present invention and limit the scope of the invention, after having read the present invention, the amendment of those skilled in the art to the various equivalent form of value of the present invention has all fallen within the application's claims limited range.
Embodiments provide a kind of characteristic number word code encryption method based on program self.As shown in Figure 1, the method comprises: generate encrypted program i.e. the first program P copy by encrypted program i.e. the second program P ', be implanted into one group of random number and characteristic number word code algorithm M at P ', issue encrypted program P ' and characteristic of correspondence digital code A as the client of user cipher to targeted customer.User is when client issuing procedure P ', can be required to input password, user's input feature vector digital code A, and the feature digital algorithm that program P ' is implanted into can calculate the characteristic number word code A ' of self, when comparing user, to input password A consistent with the characteristic number word code A ' of self, then perform this program, otherwise exit.
As shown in Figure 2, be the concrete steps of the characteristic number word code encryption method based on program self, comprise:
(1) the characteristic number word code that user inputs when startup the second program is received; Second program is the computing method generation that the first program is implanted into one group of random number and characteristic number word code;
(2) start the computing method of the characteristic number word code in described second program, calculate the characteristic number word code of described second program self according to described random number;
(3) the characteristic number word code in more described (1) step and the characteristic number word code in (2) step, if corresponding, then perform described second program.
In the present invention before described step (1), described method also comprises the steps:
(01) the second program is generated after the computing method being implanted into one group of random number and characteristic number word code in the first program.The second program is generated after first the program after the first procedural copy after copy can being implanted into the computing method of one group of random number and characteristic number word code in the present invention.
(02) utilize the computing method of characteristic number word code, calculate the characteristic number word code of the second program self according to random number;
(03) the second program and the second program unique characteristics digital code is sent to targeted customer.
It should be noted that, above-mentioned steps (1)-(3) are generally in the client executing of user, and step (01)-(03) generally performs at server end.
For increasing security further, in step (03), send the characteristic number word code of described second program and described second program self respectively to targeted customer by different paths.
In addition, password each other for different targeted customers, the computing method of different random numbers and/or different characteristic number word codes can be set in the program being sent to different target user for avoiding different user to know each other.
Be below a kind of embody rule scene of the present invention:
Fig. 3 is the code snippet of the first program:
Random number is: 1B C0 32 47 70 07 0F 88 61 76 85 35 67 54 32 62
First, above-mentioned random number is implanted in the code snippet of the first program; Now code segment is as shown in Figure 4:
Then, the computing method M of design feature digital code, implants above-mentioned code segment by this algorithm simultaneously and generates the second program;
If above-mentioned matrix element is B
ij, i=0,1 ..., m; J=0,1 ..., 15;
Definition algorithm M formula A=(∑ (i+1) × N
i) %0x10000000000000000,
Wherein: i=0,1 ..., m; N
i=B
i0b
i1b
i2b
i15
% remainder figures method, such as N
0=4D5A90000300000004000000FFFF0000.
Afterwards, issue the second program, and calculate this performance of program digital code A according to the computing method M of characteristic number word code;
A=3F467325E3F56E778DF8A81C67893F1B
And then never with path, the second program and performance of program digital code A are sent to legal targeted customer.
User's start-up routine second program, fills in performance of program digital code A in input cryptographic session frame.As shown in Figure 5:
Afterwards, start the computing method M of the characteristic number word code in the second program, the characteristic number word code A ' of calculation procedure self;
A’=3F467325E3F56E778DF8A81C67893F1B
Relatively A=A ', as passed through execution second program, otherwise exits.Obvious A '=A, so the second program continues to perform.
The above is only the preferred embodiment of the present invention; it should be pointed out that for those skilled in the art, under the premise without departing from the principles of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.
Claims (4)
1., based on a characteristic number word code encryption method for program self, it is characterized in that, comprise the steps:
(1) the characteristic number word code that user inputs when startup the second program is received; Described second program is generate after the computing method being implanted into one group of random number and characteristic number word code in the first program;
(2) start the computing method of the characteristic number word code in described second program, calculate the characteristic number word code of described second program self according to described random number;
(3) the characteristic number word code in more described (1) step and the characteristic number word code in (2) step, if corresponding, then perform described second program.
2., as claimed in claim 1 based on the characteristic number word code encryption method of program self, it is characterized in that, before described step (1), described method also comprises the steps:
(01) described second program is generated after the computing method being implanted into one group of random number and characteristic number word code in described first program;
(02) utilize the computing method of described characteristic number word code, calculate the characteristic number word code of described second program self according to described random number;
(03) the characteristic number word code of described second program and described second program self is sent to targeted customer.
3. as claimed in claim 1 based on the characteristic number word code encryption method of program self, it is characterized in that, described step (03) is the characteristic number word code being sent described second program and described second program self by different paths to targeted customer respectively.
4. as claimed in claim 1 based on the characteristic number word code encryption method of program self, it is characterized in that, corresponding different targeted customers, the computing method implanting described random number in described first program and/or described characteristic number word code are different.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410645858.3A CN104657633A (en) | 2014-11-12 | 2014-11-12 | Program-based characteristic numeric code encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410645858.3A CN104657633A (en) | 2014-11-12 | 2014-11-12 | Program-based characteristic numeric code encryption method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104657633A true CN104657633A (en) | 2015-05-27 |
Family
ID=53248746
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410645858.3A Pending CN104657633A (en) | 2014-11-12 | 2014-11-12 | Program-based characteristic numeric code encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104657633A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115603998A (en) * | 2022-10-11 | 2023-01-13 | 江苏通卡数字科技有限公司(Cn) | Communication encryption method and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1514375A (en) * | 2003-07-21 | 2004-07-21 | 蒋正华 | Software protection method |
CN1741445A (en) * | 2004-08-27 | 2006-03-01 | 英业达股份有限公司 | Method for encrypting and protecting applied program |
CN102314578A (en) * | 2011-09-26 | 2012-01-11 | 浪潮(北京)电子信息产业有限公司 | System and method for realizing software protection |
CN102708332A (en) * | 2012-01-12 | 2012-10-03 | 苏州百正信息科技有限公司 | Method for protecting computer software copyrights by hardware identification codes |
CN103164642A (en) * | 2011-12-19 | 2013-06-19 | 比亚迪股份有限公司 | Method and system for preventing software piracy |
-
2014
- 2014-11-12 CN CN201410645858.3A patent/CN104657633A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1514375A (en) * | 2003-07-21 | 2004-07-21 | 蒋正华 | Software protection method |
CN1741445A (en) * | 2004-08-27 | 2006-03-01 | 英业达股份有限公司 | Method for encrypting and protecting applied program |
CN102314578A (en) * | 2011-09-26 | 2012-01-11 | 浪潮(北京)电子信息产业有限公司 | System and method for realizing software protection |
CN103164642A (en) * | 2011-12-19 | 2013-06-19 | 比亚迪股份有限公司 | Method and system for preventing software piracy |
CN102708332A (en) * | 2012-01-12 | 2012-10-03 | 苏州百正信息科技有限公司 | Method for protecting computer software copyrights by hardware identification codes |
Non-Patent Citations (3)
Title |
---|
李龙景 等: "《计算机信息加密与解密》", 31 January 2007, 中国政法大学出版社 * |
看雪: "《加密与解密--软件保护技术及完全解决方案》", 30 September 2001 * |
许旭: "一种基于"一机一码"的软件激活序列号生成方案", 《浙江科技学院学报》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115603998A (en) * | 2022-10-11 | 2023-01-13 | 江苏通卡数字科技有限公司(Cn) | Communication encryption method and system |
CN115603998B (en) * | 2022-10-11 | 2023-10-31 | 江苏通卡数字科技有限公司 | Communication encryption method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9077710B1 (en) | Distributed storage of password data | |
KR102493744B1 (en) | Security Verification Method Based on Biometric Characteristics, Client Terminal, and Server | |
Kaptchuk et al. | Giving state to the stateless: Augmenting trustworthy computation with ledgers | |
US9009463B2 (en) | Secure delivery of trust credentials | |
US10438513B2 (en) | Hardened white box implementation 1 | |
JP6956878B1 (en) | Systems and methods for authenticated control of content delivery | |
JP6448668B2 (en) | Password-based authentication | |
US9634999B1 (en) | Mobile device key management | |
CN108737326B (en) | Method, system, device and electronic equipment for token verification | |
WO2016051856A1 (en) | Sequential biometric cryptosystem and sequential biometric cryptographic processing method | |
US20130283361A1 (en) | Identity verification | |
US10068106B2 (en) | Tokenization column replacement | |
CN103780379A (en) | Password encryption method and system, and cryptographic check method and system | |
JP6884284B2 (en) | White box calculation of keyed message authentication code | |
JP2007529935A (en) | Anonymous authentication method | |
CN104917748B (en) | A kind of method and apparatus for being converted and being handled to encrypted message | |
CN105847000A (en) | Token generation method and communication system based on same | |
CN113225297A (en) | Data hybrid encryption method, device and equipment | |
CN110502889A (en) | Login method, device, computer readable storage medium and computer equipment | |
US10862669B2 (en) | Encryption/description method protected against side-channel attacks | |
CN114741704A (en) | Privacy protection method, device, equipment and medium based on marriage and love dating | |
KR20130085492A (en) | Authentication system and method by use of non-fixed user id | |
CN117195306A (en) | Malicious participation behavior detection method based on multiparty energy data privacy calculation | |
CN109039590A (en) | Memory, electronic equipment and its encipher-decipher method for preventing side-channel attack | |
US20220147613A1 (en) | Automatic password expiration based on password integrity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150527 |