CN106534163A - Detection method of receiver - Google Patents

Detection method of receiver Download PDF

Info

Publication number
CN106534163A
CN106534163A CN201611101418.7A CN201611101418A CN106534163A CN 106534163 A CN106534163 A CN 106534163A CN 201611101418 A CN201611101418 A CN 201611101418A CN 106534163 A CN106534163 A CN 106534163A
Authority
CN
China
Prior art keywords
receiver
computer software
upper computer
detection method
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611101418.7A
Other languages
Chinese (zh)
Other versions
CN106534163B (en
Inventor
庄昊
张志桂
方智强
谢华忠
赵康德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI SHUANGWEI NAVIGATION TECHNOLOGY CO.,LTD.
Original Assignee
Shanghai Huace Navigation Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Huace Navigation Technology Ltd filed Critical Shanghai Huace Navigation Technology Ltd
Priority to CN201611101418.7A priority Critical patent/CN106534163B/en
Publication of CN106534163A publication Critical patent/CN106534163A/en
Application granted granted Critical
Publication of CN106534163B publication Critical patent/CN106534163B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the pirate detection field, especially to a detection method of a receiver. Therefore, while modification on authorized-edition receiver software and upper computer software is reduced, the cracking difficulty for authorized-edition upper computer software usage by the pirate receiver increases, so that the copyright of the upper computer software can be protected well and the piracy behavior can be cracked down and thus the legal rights of the manufacturer can be protected.

Description

A kind of detection method of receiver
Technical field
The present invention relates to pirate detection field, more particularly to a kind of detection method of receiver.
Background technology
With the development of modern science and technology, receiver is widely used in the integrated, air remote sensing of detection, moving three dimension etc. Aspect.Many product form are produced in the form of receiver and upper computer software are applied in combination.For example, GNSS receiver is generally abided by NMEA0183 agreements, Novatel agreement, RTCM agreements etc. are followed, therefore, if be left intact, the receiver of different manufacturers can With using same upper computer software.The copyright of so unprotected good upper computer software, to the affiliated producer of upper computer software Interests have received impact.Ye You producers have used the agreement for oneself customizing, and which increase the burden of software modification.Also, on Position machine software and slave computer software need to change simultaneously, and do not possess versatility.Different types of upper computer software correspondence is not Same agreement, it is very heavy for the burden of research staff, also it is unfavorable for code maintenance.
The content of the invention
For the problem that prior art is present, now there is provided a kind of detection method of receiver.
Specific technical scheme is as follows:
A kind of detection method of receiver, including:
Step S1, upper computer software is communicated to connect with receiver, and the upper computer software is sent to the receiver please Ask instruction;
Step S2, the receiver are received and send cryptographic protocol to the upper computer software according to the request instruction;
Step S3, the upper computer software receive and parse through the cryptographic protocol, export analysis result.
Preferably, the receiver is GNSS receiver.
Preferably, in step S1, the upper computer software is connected for serial communication with the receiver.
Preferably, step S1 is specifically included:
Step S11, upper computer software is communicated to connect with receiver, plaintext is carried out adding according to decipherment algorithm with key Close, the upper computer software sends request instruction to the receiver.
Preferably, step S2 is specifically included:
Step S21, the receiver receive the request instruction, calculate the key according to the temporal information in message;
Step S22, the receiver send the message to the upper computer software;
Step S23, the receiver are bundled into the cryptographic protocol and are sent to the upper computer software with dark text group in plain text.
Preferably, the receiver sends the cryptographic protocol to the upper computer software according to predeterminated frequency.
Preferably, step S3 is specifically included:
Step S31, the upper computer software calculate the key according to the temporal information in the message;
Step S32, the upper computer software calculate the corresponding decryption information of dark text according to the decipherment algorithm;
Step S33, the upper computer software extract corresponding information in plain text;
Whether step S34, the comparison decryption information are consistent with the corresponding information of the plaintext, to export analysis result.
Preferably, the decipherment algorithm is aes algorithm or DES algorithms.
Preferably, include after step S34:
Step S341, when the decryption information is consistent with the corresponding information of the plaintext, the receiver obtains described The access right of upper computer software.
Preferably, also include after step S34:
Step S342, when decryption information information corresponding with the plaintext is inconsistent, the receiver disables institute State upper computer software.
The beneficial effect of above-mentioned technical proposal is:
Above-mentioned technical proposal while reducing to legal Receiver Software and upper computer software change increased piracy and connect Receipts machine is protected the copyright of upper computer software well, has been hit copy right piracy using the difficulty that cracks of legal upper computer software, Protect the legitimate interests of corresponding producer.
Description of the drawings
Fig. 1 is a kind of flow chart of the embodiment of the detection method of receiver of the invention.
Specific embodiment
It should be noted that in the case where not conflicting, following technical proposals can be mutually combined between technical characteristic.
Below in conjunction with the accompanying drawings the specific embodiment of the present invention is further described:
A kind of detection method of receiver, as shown in figure 1, including:
Step S1, upper computer software is communicated to connect with receiver, and upper computer software sends request instruction to receiver;
Step S2, receiver are received and send cryptographic protocol to upper computer software according to request instruction;
Step S3, upper computer software receive and parse through cryptographic protocol, export analysis result.
The present embodiment is specifically described by GNSS receiver of receiver, and the present embodiment is applied to GNSS navigation fields, More particularly to when needing to evade the pirate receiver for occurring on the market using legal upper computer software, the present embodiment can be fine Ground solves this difficult problem.
The present embodiment can make up the deficiency between traditional receiver and upper computer software communication, increase by one and include the time The cryptographic protocol of information, receiver is connected after upper computer software, and the request for asking the cryptographic protocol is sent by upper computer software Instruction, slave computer (receiver) sends the cryptographic protocol according to certain frequency, after upper computer software receives the cryptographic protocol, decryption Information afterwards is consistent with the information before encryption, then be judged as possessing access right, there is provided respective application service.Otherwise, prohibition right Limit, does not provide respective service.Message that traditional receivers are communicated with host computer is solved well lacks safety, uniqueness Problem, while when receiver is independently used, still going out conventional data, does not have anything to affect.And method of the present invention just has general Property, different upper computer softwares can use this method with receiver.
Specifically, after receiver is connected by communication modes such as serial ports with upper computer software, with key according to corresponding Decipherment algorithm (such as AES, DES algorithms etc.) is in plain text (temporal information is sent to the current epoch of upper computer software and normally reports The verification of text) it is encrypted, the agreement request instruction of request respective encrypted is sent by upper computer software.
Receiver calculates key according to the days in normal message or by the information of monthly variation, and receiver sends report Text, and receiver generates the cryptographic protocol comprising temporal information, and the information that use can change as in plain text, and the such as time believes Breath, is sent to verification of plaintext message of host computer etc. under such as each epoch, through specific algorithm, such as AES, DES Encryption etc., the upper computer software of the present embodiment and receiver can arrange same password, receiver will comprising cleartext information with Ciphertext message group bag is used as cryptographic protocol.
Receiver will encrypt association according to certain frequency while unencrypted, the agreement comprising position temporal information is sent out View is sent to upper computer software, after upper computer software receives cryptographic protocol, is parsed.
Specifically, key is calculated according to the days in message or by the information of monthly variation, calculated with the corresponding decryption of key Method calculates the corresponding decryption information of dark text section, extracts corresponding plaintext segment information, if after the cleartext information for transmitting and parsing The decryption information of dark text is on deserved, then receiver obtains the access right of upper computer software, otherwise, then can not.
The password of the present embodiment can be generated by information such as months, can monthly be changed a password, be which increased what is cracked Difficulty.
To sum up, above-mentioned technical proposal is increased while reducing to legal Receiver Software and upper computer software change Pirate receiver protects the copyright of upper computer software well using the difficulty that cracks of legal upper computer software, has hit robber Version behavior, protects the legitimate interests of corresponding producer.
By explanation and accompanying drawing, the exemplary embodiments of the ad hoc structure of specific embodiment are given, based on essence of the invention God, can also make other conversions.Although foregoing invention proposes existing preferred embodiment, however, these contents are not intended as Limitation.
For a person skilled in the art, after reading described above, various changes and modifications undoubtedly will be evident that. Therefore, appending claims should regard whole variations and modifications of the true intention and scope that cover the present invention as.In power In the range of sharp claim, any and all scope of equal value and content, are all considered as still belonging to the intent and scope of the invention.

Claims (10)

1. a kind of detection method of receiver, it is characterised in that include:
Step S1, upper computer software is communicated to connect with receiver, and the upper computer software sends request to the receiver and refers to Order;
Step S2, the receiver are received and send cryptographic protocol to the upper computer software according to the request instruction;
Step S3, the upper computer software receive and parse through the cryptographic protocol, export analysis result.
2. the detection method of receiver according to claim 1, it is characterised in that the receiver is GNSS receiver.
3. the detection method of receiver according to claim 1, it is characterised in that in step S1, the host computer Software is connected for serial communication with the receiver.
4. the detection method of receiver according to claim 1, it is characterised in that step S1 is specifically included:
Step S11, upper computer software is communicated to connect with receiver, plaintext is encrypted according to decipherment algorithm with key, institute State upper computer software request instruction is sent to the receiver.
5. the detection method of receiver according to claim 4, it is characterised in that step S2 is specifically included:
Step S21, the receiver receive the request instruction, calculate the key according to the temporal information in message;
Step S22, the receiver send the message to the upper computer software;
Step S23, the receiver are bundled into the cryptographic protocol and are sent to the upper computer software with dark text group in plain text.
6. the detection method of receiver according to claim 1, it is characterised in that the receiver will according to predeterminated frequency The cryptographic protocol is sent to the upper computer software.
7. the detection method of receiver according to claim 5, it is characterised in that step S3 is specifically included:
Step S31, the upper computer software calculate the key according to the temporal information in the message;
Step S32, the upper computer software calculate the corresponding decryption information of dark text according to the decipherment algorithm;
Step S33, the upper computer software extract corresponding information in plain text;
Whether step S34, the comparison decryption information are consistent with the corresponding information of the plaintext, to export analysis result.
8. the detection method of the receiver according to claim 4 or 7, it is characterised in that the decipherment algorithm is aes algorithm Or DES algorithms.
9. the detection method of receiver according to claim 8, it is characterised in that include after step S34:
Step S341, when the decryption information is consistent with the corresponding information of the plaintext, the receiver obtains described upper The access right of machine software.
10. the detection method of receiver according to claim 8, it is characterised in that also include after step S34:
Step S342, when decryption information information corresponding with the plaintext is inconsistent, the receiver is disabled on described Position machine software.
CN201611101418.7A 2016-12-05 2016-12-05 Detection method of receiver Active CN106534163B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611101418.7A CN106534163B (en) 2016-12-05 2016-12-05 Detection method of receiver

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611101418.7A CN106534163B (en) 2016-12-05 2016-12-05 Detection method of receiver

Publications (2)

Publication Number Publication Date
CN106534163A true CN106534163A (en) 2017-03-22
CN106534163B CN106534163B (en) 2020-03-24

Family

ID=58355021

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611101418.7A Active CN106534163B (en) 2016-12-05 2016-12-05 Detection method of receiver

Country Status (1)

Country Link
CN (1) CN106534163B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0809244A2 (en) * 1996-05-20 1997-11-26 Fujitsu Limited Software copying system
CN1866870A (en) * 2006-02-23 2006-11-22 华为技术有限公司 Software validity checking system and method based on device management protocol
CN101005361A (en) * 2007-01-22 2007-07-25 北京飞天诚信科技有限公司 Server and software protection method and system
CN101136048A (en) * 2007-09-30 2008-03-05 广东南方信息安全产业基地有限公司 Software identification method
CN101261666A (en) * 2008-04-10 2008-09-10 北京深思洛克数据保护中心 A method for realizing software copyright protection based on encrypted executable program file
WO2009086777A1 (en) * 2007-12-29 2009-07-16 Senselock Software Technology Co., Ltd Software copyright protecting method and system based on encryption lock and encryption lock
CN102479304A (en) * 2010-11-26 2012-05-30 深圳市硅格半导体有限公司 Method, client and system for software access control
CN103065071A (en) * 2012-12-14 2013-04-24 北京思特奇信息技术股份有限公司 Software copyright control method and system
CN104484586A (en) * 2015-01-05 2015-04-01 北京飞音时代技术有限公司 Software copyright protecting method
CN104537283A (en) * 2014-12-17 2015-04-22 安徽清新互联信息科技有限公司 Software licensing control device based on network

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0809244A2 (en) * 1996-05-20 1997-11-26 Fujitsu Limited Software copying system
CN1866870A (en) * 2006-02-23 2006-11-22 华为技术有限公司 Software validity checking system and method based on device management protocol
CN101005361A (en) * 2007-01-22 2007-07-25 北京飞天诚信科技有限公司 Server and software protection method and system
CN101136048A (en) * 2007-09-30 2008-03-05 广东南方信息安全产业基地有限公司 Software identification method
WO2009086777A1 (en) * 2007-12-29 2009-07-16 Senselock Software Technology Co., Ltd Software copyright protecting method and system based on encryption lock and encryption lock
CN101261666A (en) * 2008-04-10 2008-09-10 北京深思洛克数据保护中心 A method for realizing software copyright protection based on encrypted executable program file
CN102479304A (en) * 2010-11-26 2012-05-30 深圳市硅格半导体有限公司 Method, client and system for software access control
CN103065071A (en) * 2012-12-14 2013-04-24 北京思特奇信息技术股份有限公司 Software copyright control method and system
CN104537283A (en) * 2014-12-17 2015-04-22 安徽清新互联信息科技有限公司 Software licensing control device based on network
CN104484586A (en) * 2015-01-05 2015-04-01 北京飞音时代技术有限公司 Software copyright protecting method

Also Published As

Publication number Publication date
CN106534163B (en) 2020-03-24

Similar Documents

Publication Publication Date Title
AU2019271965A1 (en) POS System with white box encryption key sharing
CN103401678A (en) Method for ensuring data transmission safety of Internet of things
CN101742072A (en) Anti-copy method for set-top box software
CN105007256B (en) Security module for executing security function on non-trusted platform
US8161296B2 (en) Method and apparatus for managing digital content
CN104753953A (en) Access control system
US8522351B2 (en) Production security control apparatus for software products and control method thereof
CN102857503B (en) A kind of safe finger print data radio transmitting method
CN104868998A (en) System, Device, And Method Of Provisioning Cryptographic Data To Electronic Devices
KR20120042469A (en) Apparatus for protecting contents using binding additional information and encryption key and method thereof
CN103177225B (en) A kind of data managing method and system
CN104796262B (en) Data ciphering method and terminal system
CN102236761A (en) Method for generating registration code in software pirate prevention
MXPA05010126A (en) Method for provision of access.
CN100461199C (en) Method and device for encrypting and de-encrypting digital content
CN105577361A (en) Information processing method and device thereof
CN101742229B (en) Method, system and device for improving safety of monitoring data
CN106534163A (en) Detection method of receiver
CN104392153B (en) A kind of method for protecting software and system
CN101539978B (en) Software protection method based on space
CN102694655A (en) Hardware anti-counterfeiting method for LKJ monitoring device
CN106778102B (en) Android system-based application program encryption method and device
KR100871619B1 (en) Aapparatus and method for receiving content rights through multimedia message in mobile communication terminal
CN105574419A (en) Data protection method and system
KR101415786B1 (en) A Hybrid Design system and method of Online Execution Class and Encryption-based Copyright Protection for Android Apps

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220314

Address after: 201702 room 104, building 1, No. 599, Gaojing Road, Xujing Town, Qingpu District, Shanghai

Patentee after: SHANGHAI SHUANGWEI NAVIGATION TECHNOLOGY CO.,LTD.

Address before: 200233 Block C, 599 Gaojing Road, Xujing Town, Qingpu District, Shanghai

Patentee before: SHANGHAI HUACE NAVIGATION TECHNOLOGY Ltd.