CN104657633A - Program-based characteristic numeric code encryption method - Google Patents

Program-based characteristic numeric code encryption method Download PDF

Info

Publication number
CN104657633A
CN104657633A CN201410645858.3A CN201410645858A CN104657633A CN 104657633 A CN104657633 A CN 104657633A CN 201410645858 A CN201410645858 A CN 201410645858A CN 104657633 A CN104657633 A CN 104657633A
Authority
CN
China
Prior art keywords
program
word code
number word
characteristic number
characteristic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410645858.3A
Other languages
Chinese (zh)
Inventor
江卫中
苏宁
徐青龙
丁丽萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Suzhou Power Supply Co Ltd of Jiangsu Electric Power Co
Original Assignee
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Suzhou Power Supply Co Ltd of Jiangsu Electric Power Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Jiangsu Electric Power Co Ltd, Suzhou Power Supply Co Ltd of Jiangsu Electric Power Co filed Critical State Grid Corp of China SGCC
Priority to CN201410645858.3A priority Critical patent/CN104657633A/en
Publication of CN104657633A publication Critical patent/CN104657633A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a program-based characteristic numeric code encryption method. The method includes the steps of embedding a set of random numbers to an encrypted program, designing a characteristic numeric code algorithm and embedding the algorithm to the encrypted program, issuing the encrypted program and a corresponding characteristic numeric code serving as a user password to a user side, entering the password in a password dialog box by a user to start the program, calculating a characteristics numeric code of the program through the characteristic numeric code algorithm embedded into the program, comparing whether the password entered by the user is identical to the password of the program or not, if so, executing the program, and if not, quitting the program. The program-based characteristic numeric code encryption method reduces the risk of finding and cracking of the password carried with the program.

Description

A kind of characteristic number word code encryption method based on program self
Technical field
The present invention relates to computer software fields, particularly a kind of characteristic number word code encryption method based on program self.
Background technology
For the consideration of safety or interests, add that licencing key is necessary when program performs, general program encryption method is that password is placed on program somewhere, and the person that is not easily cracked finds and revises, and makes failed encryption.
Summary of the invention
Goal of the invention: for above-mentioned prior art Problems existing and deficiency, the object of this invention is to provide a kind of characteristic number word code encryption method based on program self, reduces password and be found, revise, make the risk of failed encryption, and easily realize.
Technical scheme: for achieving the above object, the technical solution used in the present invention is a kind of characteristic number word code encryption method based on program self, comprises the steps:
(1) the characteristic number word code that user inputs when startup the second program is received; Described second program is generate after the computing method being implanted into one group of random number and characteristic number word code in the first program;
(2) start the computing method of the characteristic number word code in described second program, calculate the characteristic number word code of described second program self according to described random number;
(3) the characteristic number word code in more described (1) step and the characteristic number word code in (1) step, if corresponding, then perform described second program.
Preferably, before described step (1), described method also comprises the steps:
(01) described second program is generated after the computing method being implanted into one group of random number and characteristic number word code in described first program;
(02) utilize the computing method of described characteristic number word code, calculate the characteristic number word code of described second program self according to described random number;
(03) the characteristic number word code of described second program and described second program self is sent to targeted customer.
Preferably, described step (03) is the characteristic number word code being sent described second program and described second program self by different paths to targeted customer respectively.
Preferably, corresponding different targeted customers, the described random number computing method that are different and/or described characteristic number word code implanted in described first program are different.
Beneficial effect: the characteristic number word code encryption method that the present invention is based on program self, not existing characteristics digital code in encrypted program, cracker cannot find the plaintext of characteristic number word code, thus not by the mode cracking programs of Modify password.
Accompanying drawing explanation
Fig. 1 is schematic diagram of the present invention;
Fig. 2 is the inventive method process flow diagram;
Fig. 3 is the code snippet of the first program;
Fig. 4 is that random number implants the code segment after in the code snippet of the first program;
Fig. 5 is cryptographic session frame.
Embodiment
Below in conjunction with the drawings and specific embodiments, illustrate the present invention further, these embodiments should be understood only be not used in for illustration of the present invention and limit the scope of the invention, after having read the present invention, the amendment of those skilled in the art to the various equivalent form of value of the present invention has all fallen within the application's claims limited range.
Embodiments provide a kind of characteristic number word code encryption method based on program self.As shown in Figure 1, the method comprises: generate encrypted program i.e. the first program P copy by encrypted program i.e. the second program P ', be implanted into one group of random number and characteristic number word code algorithm M at P ', issue encrypted program P ' and characteristic of correspondence digital code A as the client of user cipher to targeted customer.User is when client issuing procedure P ', can be required to input password, user's input feature vector digital code A, and the feature digital algorithm that program P ' is implanted into can calculate the characteristic number word code A ' of self, when comparing user, to input password A consistent with the characteristic number word code A ' of self, then perform this program, otherwise exit.
As shown in Figure 2, be the concrete steps of the characteristic number word code encryption method based on program self, comprise:
(1) the characteristic number word code that user inputs when startup the second program is received; Second program is the computing method generation that the first program is implanted into one group of random number and characteristic number word code;
(2) start the computing method of the characteristic number word code in described second program, calculate the characteristic number word code of described second program self according to described random number;
(3) the characteristic number word code in more described (1) step and the characteristic number word code in (2) step, if corresponding, then perform described second program.
In the present invention before described step (1), described method also comprises the steps:
(01) the second program is generated after the computing method being implanted into one group of random number and characteristic number word code in the first program.The second program is generated after first the program after the first procedural copy after copy can being implanted into the computing method of one group of random number and characteristic number word code in the present invention.
(02) utilize the computing method of characteristic number word code, calculate the characteristic number word code of the second program self according to random number;
(03) the second program and the second program unique characteristics digital code is sent to targeted customer.
It should be noted that, above-mentioned steps (1)-(3) are generally in the client executing of user, and step (01)-(03) generally performs at server end.
For increasing security further, in step (03), send the characteristic number word code of described second program and described second program self respectively to targeted customer by different paths.
In addition, password each other for different targeted customers, the computing method of different random numbers and/or different characteristic number word codes can be set in the program being sent to different target user for avoiding different user to know each other.
Be below a kind of embody rule scene of the present invention:
Fig. 3 is the code snippet of the first program:
Random number is: 1B C0 32 47 70 07 0F 88 61 76 85 35 67 54 32 62
First, above-mentioned random number is implanted in the code snippet of the first program; Now code segment is as shown in Figure 4:
Then, the computing method M of design feature digital code, implants above-mentioned code segment by this algorithm simultaneously and generates the second program;
If above-mentioned matrix element is B ij, i=0,1 ..., m; J=0,1 ..., 15;
Definition algorithm M formula A=(∑ (i+1) × N i) %0x10000000000000000,
Wherein: i=0,1 ..., m; N i=B i0b i1b i2b i15
% remainder figures method, such as N 0=4D5A90000300000004000000FFFF0000.
Afterwards, issue the second program, and calculate this performance of program digital code A according to the computing method M of characteristic number word code;
A=3F467325E3F56E778DF8A81C67893F1B
And then never with path, the second program and performance of program digital code A are sent to legal targeted customer.
User's start-up routine second program, fills in performance of program digital code A in input cryptographic session frame.As shown in Figure 5:
Afterwards, start the computing method M of the characteristic number word code in the second program, the characteristic number word code A ' of calculation procedure self;
A’=3F467325E3F56E778DF8A81C67893F1B
Relatively A=A ', as passed through execution second program, otherwise exits.Obvious A '=A, so the second program continues to perform.
The above is only the preferred embodiment of the present invention; it should be pointed out that for those skilled in the art, under the premise without departing from the principles of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (4)

1., based on a characteristic number word code encryption method for program self, it is characterized in that, comprise the steps:
(1) the characteristic number word code that user inputs when startup the second program is received; Described second program is generate after the computing method being implanted into one group of random number and characteristic number word code in the first program;
(2) start the computing method of the characteristic number word code in described second program, calculate the characteristic number word code of described second program self according to described random number;
(3) the characteristic number word code in more described (1) step and the characteristic number word code in (2) step, if corresponding, then perform described second program.
2., as claimed in claim 1 based on the characteristic number word code encryption method of program self, it is characterized in that, before described step (1), described method also comprises the steps:
(01) described second program is generated after the computing method being implanted into one group of random number and characteristic number word code in described first program;
(02) utilize the computing method of described characteristic number word code, calculate the characteristic number word code of described second program self according to described random number;
(03) the characteristic number word code of described second program and described second program self is sent to targeted customer.
3. as claimed in claim 1 based on the characteristic number word code encryption method of program self, it is characterized in that, described step (03) is the characteristic number word code being sent described second program and described second program self by different paths to targeted customer respectively.
4. as claimed in claim 1 based on the characteristic number word code encryption method of program self, it is characterized in that, corresponding different targeted customers, the computing method implanting described random number in described first program and/or described characteristic number word code are different.
CN201410645858.3A 2014-11-12 2014-11-12 Program-based characteristic numeric code encryption method Pending CN104657633A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410645858.3A CN104657633A (en) 2014-11-12 2014-11-12 Program-based characteristic numeric code encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410645858.3A CN104657633A (en) 2014-11-12 2014-11-12 Program-based characteristic numeric code encryption method

Publications (1)

Publication Number Publication Date
CN104657633A true CN104657633A (en) 2015-05-27

Family

ID=53248746

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410645858.3A Pending CN104657633A (en) 2014-11-12 2014-11-12 Program-based characteristic numeric code encryption method

Country Status (1)

Country Link
CN (1) CN104657633A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115603998A (en) * 2022-10-11 2023-01-13 江苏通卡数字科技有限公司(Cn) Communication encryption method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1514375A (en) * 2003-07-21 2004-07-21 蒋正华 Software protection method
CN1741445A (en) * 2004-08-27 2006-03-01 英业达股份有限公司 Method for encrypting and protecting applied program
CN102314578A (en) * 2011-09-26 2012-01-11 浪潮(北京)电子信息产业有限公司 System and method for realizing software protection
CN102708332A (en) * 2012-01-12 2012-10-03 苏州百正信息科技有限公司 Method for protecting computer software copyrights by hardware identification codes
CN103164642A (en) * 2011-12-19 2013-06-19 比亚迪股份有限公司 Method and system for preventing software piracy

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1514375A (en) * 2003-07-21 2004-07-21 蒋正华 Software protection method
CN1741445A (en) * 2004-08-27 2006-03-01 英业达股份有限公司 Method for encrypting and protecting applied program
CN102314578A (en) * 2011-09-26 2012-01-11 浪潮(北京)电子信息产业有限公司 System and method for realizing software protection
CN103164642A (en) * 2011-12-19 2013-06-19 比亚迪股份有限公司 Method and system for preventing software piracy
CN102708332A (en) * 2012-01-12 2012-10-03 苏州百正信息科技有限公司 Method for protecting computer software copyrights by hardware identification codes

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
李龙景 等: "《计算机信息加密与解密》", 31 January 2007, 中国政法大学出版社 *
看雪: "《加密与解密--软件保护技术及完全解决方案》", 30 September 2001 *
许旭: "一种基于"一机一码"的软件激活序列号生成方案", 《浙江科技学院学报》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115603998A (en) * 2022-10-11 2023-01-13 江苏通卡数字科技有限公司(Cn) Communication encryption method and system
CN115603998B (en) * 2022-10-11 2023-10-31 江苏通卡数字科技有限公司 Communication encryption method

Similar Documents

Publication Publication Date Title
US9077710B1 (en) Distributed storage of password data
KR102493744B1 (en) Security Verification Method Based on Biometric Characteristics, Client Terminal, and Server
US9009463B2 (en) Secure delivery of trust credentials
US10438513B2 (en) Hardened white box implementation 1
Kaptchuk et al. Giving state to the stateless: Augmenting trustworthy computation with ledgers
US9634999B1 (en) Mobile device key management
JP6448668B2 (en) Password-based authentication
US20150207790A1 (en) Method and system for generating and authorizing dynamic password
US20130283361A1 (en) Identity verification
WO2016051856A1 (en) Sequential biometric cryptosystem and sequential biometric cryptographic processing method
CN103780379A (en) Password encryption method and system, and cryptographic check method and system
JP2021533426A (en) Systems and methods for authenticated control of content delivery
US10068106B2 (en) Tokenization column replacement
EP3732822B1 (en) Whitebox computation of keyed message authentication codes
JP2007529935A (en) Anonymous authentication method
US20200076592A1 (en) Method for generating seed and device thereof
US20100241865A1 (en) One-Time Password System Capable of Defending Against Phishing Attacks
CN105847000A (en) Token generation method and communication system based on same
CN106533677B (en) A kind of user login method, user terminal and server
CN113225297A (en) Data hybrid encryption method, device and equipment
US10862669B2 (en) Encryption/description method protected against side-channel attacks
CN114741704A (en) Privacy protection method, device, equipment and medium based on marriage and love dating
CN110502889A (en) Login method, device, computer readable storage medium and computer equipment
KR20130085492A (en) Authentication system and method by use of non-fixed user id
US10979420B2 (en) Method for authenticating with a password comprising a salt

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150527