CN106534163A - Detection method of receiver - Google Patents
Detection method of receiver Download PDFInfo
- Publication number
- CN106534163A CN106534163A CN201611101418.7A CN201611101418A CN106534163A CN 106534163 A CN106534163 A CN 106534163A CN 201611101418 A CN201611101418 A CN 201611101418A CN 106534163 A CN106534163 A CN 106534163A
- Authority
- CN
- China
- Prior art keywords
- receiver
- computer software
- upper computer
- detection method
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 21
- 230000002123 temporal effect Effects 0.000 claims description 7
- 238000004891 communication Methods 0.000 claims description 3
- 230000004048 modification Effects 0.000 abstract description 4
- 238000012986 modification Methods 0.000 abstract description 3
- 238000005336 cracking Methods 0.000 abstract 1
- 238000000034 method Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to the pirate detection field, especially to a detection method of a receiver. Therefore, while modification on authorized-edition receiver software and upper computer software is reduced, the cracking difficulty for authorized-edition upper computer software usage by the pirate receiver increases, so that the copyright of the upper computer software can be protected well and the piracy behavior can be cracked down and thus the legal rights of the manufacturer can be protected.
Description
Technical field
The present invention relates to pirate detection field, more particularly to a kind of detection method of receiver.
Background technology
With the development of modern science and technology, receiver is widely used in the integrated, air remote sensing of detection, moving three dimension etc.
Aspect.Many product form are produced in the form of receiver and upper computer software are applied in combination.For example, GNSS receiver is generally abided by
NMEA0183 agreements, Novatel agreement, RTCM agreements etc. are followed, therefore, if be left intact, the receiver of different manufacturers can
With using same upper computer software.The copyright of so unprotected good upper computer software, to the affiliated producer of upper computer software
Interests have received impact.Ye You producers have used the agreement for oneself customizing, and which increase the burden of software modification.Also, on
Position machine software and slave computer software need to change simultaneously, and do not possess versatility.Different types of upper computer software correspondence is not
Same agreement, it is very heavy for the burden of research staff, also it is unfavorable for code maintenance.
The content of the invention
For the problem that prior art is present, now there is provided a kind of detection method of receiver.
Specific technical scheme is as follows:
A kind of detection method of receiver, including:
Step S1, upper computer software is communicated to connect with receiver, and the upper computer software is sent to the receiver please
Ask instruction;
Step S2, the receiver are received and send cryptographic protocol to the upper computer software according to the request instruction;
Step S3, the upper computer software receive and parse through the cryptographic protocol, export analysis result.
Preferably, the receiver is GNSS receiver.
Preferably, in step S1, the upper computer software is connected for serial communication with the receiver.
Preferably, step S1 is specifically included:
Step S11, upper computer software is communicated to connect with receiver, plaintext is carried out adding according to decipherment algorithm with key
Close, the upper computer software sends request instruction to the receiver.
Preferably, step S2 is specifically included:
Step S21, the receiver receive the request instruction, calculate the key according to the temporal information in message;
Step S22, the receiver send the message to the upper computer software;
Step S23, the receiver are bundled into the cryptographic protocol and are sent to the upper computer software with dark text group in plain text.
Preferably, the receiver sends the cryptographic protocol to the upper computer software according to predeterminated frequency.
Preferably, step S3 is specifically included:
Step S31, the upper computer software calculate the key according to the temporal information in the message;
Step S32, the upper computer software calculate the corresponding decryption information of dark text according to the decipherment algorithm;
Step S33, the upper computer software extract corresponding information in plain text;
Whether step S34, the comparison decryption information are consistent with the corresponding information of the plaintext, to export analysis result.
Preferably, the decipherment algorithm is aes algorithm or DES algorithms.
Preferably, include after step S34:
Step S341, when the decryption information is consistent with the corresponding information of the plaintext, the receiver obtains described
The access right of upper computer software.
Preferably, also include after step S34:
Step S342, when decryption information information corresponding with the plaintext is inconsistent, the receiver disables institute
State upper computer software.
The beneficial effect of above-mentioned technical proposal is:
Above-mentioned technical proposal while reducing to legal Receiver Software and upper computer software change increased piracy and connect
Receipts machine is protected the copyright of upper computer software well, has been hit copy right piracy using the difficulty that cracks of legal upper computer software,
Protect the legitimate interests of corresponding producer.
Description of the drawings
Fig. 1 is a kind of flow chart of the embodiment of the detection method of receiver of the invention.
Specific embodiment
It should be noted that in the case where not conflicting, following technical proposals can be mutually combined between technical characteristic.
Below in conjunction with the accompanying drawings the specific embodiment of the present invention is further described:
A kind of detection method of receiver, as shown in figure 1, including:
Step S1, upper computer software is communicated to connect with receiver, and upper computer software sends request instruction to receiver;
Step S2, receiver are received and send cryptographic protocol to upper computer software according to request instruction;
Step S3, upper computer software receive and parse through cryptographic protocol, export analysis result.
The present embodiment is specifically described by GNSS receiver of receiver, and the present embodiment is applied to GNSS navigation fields,
More particularly to when needing to evade the pirate receiver for occurring on the market using legal upper computer software, the present embodiment can be fine
Ground solves this difficult problem.
The present embodiment can make up the deficiency between traditional receiver and upper computer software communication, increase by one and include the time
The cryptographic protocol of information, receiver is connected after upper computer software, and the request for asking the cryptographic protocol is sent by upper computer software
Instruction, slave computer (receiver) sends the cryptographic protocol according to certain frequency, after upper computer software receives the cryptographic protocol, decryption
Information afterwards is consistent with the information before encryption, then be judged as possessing access right, there is provided respective application service.Otherwise, prohibition right
Limit, does not provide respective service.Message that traditional receivers are communicated with host computer is solved well lacks safety, uniqueness
Problem, while when receiver is independently used, still going out conventional data, does not have anything to affect.And method of the present invention just has general
Property, different upper computer softwares can use this method with receiver.
Specifically, after receiver is connected by communication modes such as serial ports with upper computer software, with key according to corresponding
Decipherment algorithm (such as AES, DES algorithms etc.) is in plain text (temporal information is sent to the current epoch of upper computer software and normally reports
The verification of text) it is encrypted, the agreement request instruction of request respective encrypted is sent by upper computer software.
Receiver calculates key according to the days in normal message or by the information of monthly variation, and receiver sends report
Text, and receiver generates the cryptographic protocol comprising temporal information, and the information that use can change as in plain text, and the such as time believes
Breath, is sent to verification of plaintext message of host computer etc. under such as each epoch, through specific algorithm, such as AES, DES
Encryption etc., the upper computer software of the present embodiment and receiver can arrange same password, receiver will comprising cleartext information with
Ciphertext message group bag is used as cryptographic protocol.
Receiver will encrypt association according to certain frequency while unencrypted, the agreement comprising position temporal information is sent out
View is sent to upper computer software, after upper computer software receives cryptographic protocol, is parsed.
Specifically, key is calculated according to the days in message or by the information of monthly variation, calculated with the corresponding decryption of key
Method calculates the corresponding decryption information of dark text section, extracts corresponding plaintext segment information, if after the cleartext information for transmitting and parsing
The decryption information of dark text is on deserved, then receiver obtains the access right of upper computer software, otherwise, then can not.
The password of the present embodiment can be generated by information such as months, can monthly be changed a password, be which increased what is cracked
Difficulty.
To sum up, above-mentioned technical proposal is increased while reducing to legal Receiver Software and upper computer software change
Pirate receiver protects the copyright of upper computer software well using the difficulty that cracks of legal upper computer software, has hit robber
Version behavior, protects the legitimate interests of corresponding producer.
By explanation and accompanying drawing, the exemplary embodiments of the ad hoc structure of specific embodiment are given, based on essence of the invention
God, can also make other conversions.Although foregoing invention proposes existing preferred embodiment, however, these contents are not intended as
Limitation.
For a person skilled in the art, after reading described above, various changes and modifications undoubtedly will be evident that.
Therefore, appending claims should regard whole variations and modifications of the true intention and scope that cover the present invention as.In power
In the range of sharp claim, any and all scope of equal value and content, are all considered as still belonging to the intent and scope of the invention.
Claims (10)
1. a kind of detection method of receiver, it is characterised in that include:
Step S1, upper computer software is communicated to connect with receiver, and the upper computer software sends request to the receiver and refers to
Order;
Step S2, the receiver are received and send cryptographic protocol to the upper computer software according to the request instruction;
Step S3, the upper computer software receive and parse through the cryptographic protocol, export analysis result.
2. the detection method of receiver according to claim 1, it is characterised in that the receiver is GNSS receiver.
3. the detection method of receiver according to claim 1, it is characterised in that in step S1, the host computer
Software is connected for serial communication with the receiver.
4. the detection method of receiver according to claim 1, it is characterised in that step S1 is specifically included:
Step S11, upper computer software is communicated to connect with receiver, plaintext is encrypted according to decipherment algorithm with key, institute
State upper computer software request instruction is sent to the receiver.
5. the detection method of receiver according to claim 4, it is characterised in that step S2 is specifically included:
Step S21, the receiver receive the request instruction, calculate the key according to the temporal information in message;
Step S22, the receiver send the message to the upper computer software;
Step S23, the receiver are bundled into the cryptographic protocol and are sent to the upper computer software with dark text group in plain text.
6. the detection method of receiver according to claim 1, it is characterised in that the receiver will according to predeterminated frequency
The cryptographic protocol is sent to the upper computer software.
7. the detection method of receiver according to claim 5, it is characterised in that step S3 is specifically included:
Step S31, the upper computer software calculate the key according to the temporal information in the message;
Step S32, the upper computer software calculate the corresponding decryption information of dark text according to the decipherment algorithm;
Step S33, the upper computer software extract corresponding information in plain text;
Whether step S34, the comparison decryption information are consistent with the corresponding information of the plaintext, to export analysis result.
8. the detection method of the receiver according to claim 4 or 7, it is characterised in that the decipherment algorithm is aes algorithm
Or DES algorithms.
9. the detection method of receiver according to claim 8, it is characterised in that include after step S34:
Step S341, when the decryption information is consistent with the corresponding information of the plaintext, the receiver obtains described upper
The access right of machine software.
10. the detection method of receiver according to claim 8, it is characterised in that also include after step S34:
Step S342, when decryption information information corresponding with the plaintext is inconsistent, the receiver is disabled on described
Position machine software.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611101418.7A CN106534163B (en) | 2016-12-05 | 2016-12-05 | Detection method of receiver |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611101418.7A CN106534163B (en) | 2016-12-05 | 2016-12-05 | Detection method of receiver |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106534163A true CN106534163A (en) | 2017-03-22 |
CN106534163B CN106534163B (en) | 2020-03-24 |
Family
ID=58355021
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611101418.7A Active CN106534163B (en) | 2016-12-05 | 2016-12-05 | Detection method of receiver |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106534163B (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0809244A2 (en) * | 1996-05-20 | 1997-11-26 | Fujitsu Limited | Software copying system |
CN1866870A (en) * | 2006-02-23 | 2006-11-22 | 华为技术有限公司 | Software validity checking system and method based on device management protocol |
CN101005361A (en) * | 2007-01-22 | 2007-07-25 | 北京飞天诚信科技有限公司 | Server and software protection method and system |
CN101136048A (en) * | 2007-09-30 | 2008-03-05 | 广东南方信息安全产业基地有限公司 | Software identification method |
CN101261666A (en) * | 2008-04-10 | 2008-09-10 | 北京深思洛克数据保护中心 | A method for realizing software copyright protection based on encrypted executable program file |
WO2009086777A1 (en) * | 2007-12-29 | 2009-07-16 | Senselock Software Technology Co., Ltd | Software copyright protecting method and system based on encryption lock and encryption lock |
CN102479304A (en) * | 2010-11-26 | 2012-05-30 | 深圳市硅格半导体有限公司 | Method, client and system for software access control |
CN103065071A (en) * | 2012-12-14 | 2013-04-24 | 北京思特奇信息技术股份有限公司 | Software copyright control method and system |
CN104484586A (en) * | 2015-01-05 | 2015-04-01 | 北京飞音时代技术有限公司 | Software copyright protecting method |
CN104537283A (en) * | 2014-12-17 | 2015-04-22 | 安徽清新互联信息科技有限公司 | Software licensing control device based on network |
-
2016
- 2016-12-05 CN CN201611101418.7A patent/CN106534163B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0809244A2 (en) * | 1996-05-20 | 1997-11-26 | Fujitsu Limited | Software copying system |
CN1866870A (en) * | 2006-02-23 | 2006-11-22 | 华为技术有限公司 | Software validity checking system and method based on device management protocol |
CN101005361A (en) * | 2007-01-22 | 2007-07-25 | 北京飞天诚信科技有限公司 | Server and software protection method and system |
CN101136048A (en) * | 2007-09-30 | 2008-03-05 | 广东南方信息安全产业基地有限公司 | Software identification method |
WO2009086777A1 (en) * | 2007-12-29 | 2009-07-16 | Senselock Software Technology Co., Ltd | Software copyright protecting method and system based on encryption lock and encryption lock |
CN101261666A (en) * | 2008-04-10 | 2008-09-10 | 北京深思洛克数据保护中心 | A method for realizing software copyright protection based on encrypted executable program file |
CN102479304A (en) * | 2010-11-26 | 2012-05-30 | 深圳市硅格半导体有限公司 | Method, client and system for software access control |
CN103065071A (en) * | 2012-12-14 | 2013-04-24 | 北京思特奇信息技术股份有限公司 | Software copyright control method and system |
CN104537283A (en) * | 2014-12-17 | 2015-04-22 | 安徽清新互联信息科技有限公司 | Software licensing control device based on network |
CN104484586A (en) * | 2015-01-05 | 2015-04-01 | 北京飞音时代技术有限公司 | Software copyright protecting method |
Also Published As
Publication number | Publication date |
---|---|
CN106534163B (en) | 2020-03-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2019271965A1 (en) | POS System with white box encryption key sharing | |
CN103401678A (en) | Method for ensuring data transmission safety of Internet of things | |
CN101742072A (en) | Anti-copy method for set-top box software | |
CN105007256B (en) | Security module for executing security function on non-trusted platform | |
US8161296B2 (en) | Method and apparatus for managing digital content | |
CN104753953A (en) | Access control system | |
US8522351B2 (en) | Production security control apparatus for software products and control method thereof | |
CN102857503B (en) | A kind of safe finger print data radio transmitting method | |
CN104868998A (en) | System, Device, And Method Of Provisioning Cryptographic Data To Electronic Devices | |
KR20120042469A (en) | Apparatus for protecting contents using binding additional information and encryption key and method thereof | |
CN103177225B (en) | A kind of data managing method and system | |
CN104796262B (en) | Data ciphering method and terminal system | |
CN102236761A (en) | Method for generating registration code in software pirate prevention | |
MXPA05010126A (en) | Method for provision of access. | |
CN100461199C (en) | Method and device for encrypting and de-encrypting digital content | |
CN105577361A (en) | Information processing method and device thereof | |
CN101742229B (en) | Method, system and device for improving safety of monitoring data | |
CN106534163A (en) | Detection method of receiver | |
CN104392153B (en) | A kind of method for protecting software and system | |
CN101539978B (en) | Software protection method based on space | |
CN102694655A (en) | Hardware anti-counterfeiting method for LKJ monitoring device | |
CN106778102B (en) | Android system-based application program encryption method and device | |
KR100871619B1 (en) | Aapparatus and method for receiving content rights through multimedia message in mobile communication terminal | |
CN105574419A (en) | Data protection method and system | |
KR101415786B1 (en) | A Hybrid Design system and method of Online Execution Class and Encryption-based Copyright Protection for Android Apps |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220314 Address after: 201702 room 104, building 1, No. 599, Gaojing Road, Xujing Town, Qingpu District, Shanghai Patentee after: SHANGHAI SHUANGWEI NAVIGATION TECHNOLOGY CO.,LTD. Address before: 200233 Block C, 599 Gaojing Road, Xujing Town, Qingpu District, Shanghai Patentee before: SHANGHAI HUACE NAVIGATION TECHNOLOGY Ltd. |