CN106778097A - A kind of encryption lock for safety check security protection background management system - Google Patents
A kind of encryption lock for safety check security protection background management system Download PDFInfo
- Publication number
- CN106778097A CN106778097A CN201710027693.7A CN201710027693A CN106778097A CN 106778097 A CN106778097 A CN 106778097A CN 201710027693 A CN201710027693 A CN 201710027693A CN 106778097 A CN106778097 A CN 106778097A
- Authority
- CN
- China
- Prior art keywords
- software
- encryption lock
- management system
- safety check
- security protection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000006870 function Effects 0.000 description 3
- 238000000034 method Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
Abstract
The invention discloses a kind of encryption lock for safety check security protection background management system, comprising the hardware being arranged on parallel port of computer or USB port, and a set of interface software and tool software suitable for various language.The present invention includes the hardware being arranged on parallel port of computer or USB port; and a set of interface software and tool software suitable for various language; encryption lock is based on hardware protection scheme, the purpose is to be illegally used with the intellectual property that is protected from of data by software.
Description
Technical field
The present invention relates to a kind of encryption lock, specifically a kind of encryption lock for safety check security protection background management system.
Background technology
Software enciphered lock is a kind of security product for inserting software and hardware combining on computers.Typically have tens or hundreds of
The nonvolatile storage space of byte be available for read-write, now with encryption lock inside further comprises single-chip microcomputer.Software developer can
Check whether encryption lock is inserted in carry out data exchange (being written and read encryption lock) by interface function and encryption lock to connect
On mouth;Or directly encrypt oneself EXE file (being commonly called as " involucrum ") with the subsidiary instrument of encryption lock.So, software developer can
To set many places software locks in software, these locks are opened by the use of encryption lock as key;If not inserting encryption lock or encryption
Lock is not corresponded to, and software can not be performed normally.Encryption lock is realized by software implementation procedure with encryption lock exchange data
Encryption.The built-in single chip circuit of encryption lock (also referred to as CPU) so that encryption lock has the disposal ability for judging, analyzing, and enhances master
Dynamic anti-decryption capabilities.Include the algorithm software for being exclusively used in encryption in the built-in single-chip microcomputer of encryption lock, the software is written into list
After piece machine, cannot be read again.In addition, in existing encryption lock, also one kind is to use " code migrating " mode to be added
Close encryption lock, i.e., by compiling, inside " transplanting " to encryption lock hardware, do not have by by the partial code in software in software
This section of copy of code.When in use, the key during application software can instruct encryption lock to run hardware by funcall
Code and data and returning result, so as to can still complete the whole function of whole software.Encrypted present in prior art
Lock, single-chip microcomputer encryption lock is simple due to its algorithm, and memory space is small, is easily replicated by hardware, equally, uses " code migrating "
Although encryption lock improves to some extent, but still cannot avoid above-mentioned defect.
The content of the invention
It is an object of the invention to provide a kind of encryption lock for safety check security protection background management system, to solve the above-mentioned back of the body
The problem proposed in scape technology.
To achieve the above object, the present invention provides following technical scheme:
A kind of encryption lock for safety check security protection background management system, parallel port of computer or USB are arranged on comprising one
Hardware on mouth, and a set of interface software and tool software suitable for various language.
As further scheme of the invention:Software developer sets many places software locks in interface software, using soft
Part encryption lock opens encryption lock as key;If not inserting encryption lock or encryption lock not being corresponded to, software can not be performed normally.
Compared with prior art, the beneficial effects of the invention are as follows:The present invention comprising one be arranged on parallel port of computer or
Hardware in USB port, and a set of interface software and tool software suitable for various language, encryption lock are based on hardware protection skill
Art, the purpose is to be illegally used with the intellectual property that is protected from of data by software.
Specific embodiment
The technical scheme in the embodiment of the present invention is clearly and completely described below, it is clear that described embodiment
Only a part of embodiment of the invention, rather than whole embodiments.Based on the embodiment in the present invention, the common skill in this area
The every other embodiment that art personnel are obtained under the premise of creative work is not made, belongs to the model of present invention protection
Enclose.
In the embodiment of the present invention, a kind of encryption lock for safety check security protection background management system is arranged on meter comprising one
Hardware on calculation machine LPT or USB port, and a set of interface software and tool software suitable for various language.Software developer
Many places software locks are set in interface software, encryption lock is opened as key using software enciphered lock;If not inserting encryption lock
Or encryption lock is not corresponded to, software can not be performed normally.
Encryption lock is a kind of intelligent instrument with software protection function provided for software developer, and it includes one
The individual hardware on parallel port of computer or USB port, and a set of interface software and tool software suitable for various language.
Encryption lock is based on hardware protection scheme, the purpose is to be illegally used with the intellectual property that is protected from of data by software.
It is obvious to a person skilled in the art that the invention is not restricted to the details of above-mentioned one exemplary embodiment, Er Qie
In the case of without departing substantially from spirit or essential attributes of the invention, the present invention can be in other specific forms realized.Therefore, no matter
From the point of view of which point, embodiment all should be regarded as exemplary, and be nonrestrictive, the scope of the present invention is by appended power
Profit requires to be limited rather than described above, it is intended that all in the implication and scope of the equivalency of claim by falling
Change is included in the present invention.Moreover, it will be appreciated that although the present specification is described in terms of embodiments, not each
Implementation method only includes an independent technical scheme, and this narrating mode of specification is only this area for clarity
Specification an as entirety, the technical scheme in each embodiment should can also be formed this by technical staff through appropriately combined
Art personnel may be appreciated other embodiment.
Claims (2)
1. a kind of encryption lock for safety check security protection background management system, it is characterised in that be arranged on computer simultaneously comprising
Hardware on row mouth or USB port, and a set of interface software and tool software suitable for various language.
2. the encryption lock for safety check security protection background management system according to claim 1, it is characterised in that software development
Person sets many places software locks in interface software, and encryption lock is opened as key using software enciphered lock;If not inserting encryption
Lock or encryption lock are not corresponded to, and software can not be performed normally.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710027693.7A CN106778097A (en) | 2017-01-16 | 2017-01-16 | A kind of encryption lock for safety check security protection background management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710027693.7A CN106778097A (en) | 2017-01-16 | 2017-01-16 | A kind of encryption lock for safety check security protection background management system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106778097A true CN106778097A (en) | 2017-05-31 |
Family
ID=58945508
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710027693.7A Pending CN106778097A (en) | 2017-01-16 | 2017-01-16 | A kind of encryption lock for safety check security protection background management system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106778097A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101404056A (en) * | 2008-10-29 | 2009-04-08 | 金蝶软件(中国)有限公司 | Software protection method, apparatus and equipment |
CN104050398A (en) * | 2014-06-17 | 2014-09-17 | 飞天诚信科技股份有限公司 | Multifunctional encryption lock and operating method thereof |
CN204904277U (en) * | 2015-09-08 | 2015-12-23 | 云南中烟工业有限责任公司 | Two encryption lock ukey of intelligence developments |
-
2017
- 2017-01-16 CN CN201710027693.7A patent/CN106778097A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101404056A (en) * | 2008-10-29 | 2009-04-08 | 金蝶软件(中国)有限公司 | Software protection method, apparatus and equipment |
CN104050398A (en) * | 2014-06-17 | 2014-09-17 | 飞天诚信科技股份有限公司 | Multifunctional encryption lock and operating method thereof |
CN204904277U (en) * | 2015-09-08 | 2015-12-23 | 云南中烟工业有限责任公司 | Two encryption lock ukey of intelligence developments |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4073913B2 (en) | Open general-purpose attack-resistant CPU and its application system | |
CN103154925B (en) | Communication disabling in multicomputer system | |
CN103038745B (en) | Extension integrity measurement | |
CN105408912B (en) | Handle certification and resource grant | |
CN103065102B (en) | Data encryption mobile storage management method based on virtual disk | |
EP1410150B1 (en) | Protecting software applications against software piracy | |
CN103136468B (en) | The system service request assisting the application program for hardware protection is mutual | |
CN105339912B (en) | Measure safety zone | |
CN101908119A (en) | Method and device for processing dynamic link library (DLL) file | |
CN103164643B (en) | A kind of method and apparatus that anti-debug is carried out by hardware | |
CN106059762B (en) | Data safety processing method and device | |
CN106650327A (en) | so file dynamic recovery-based Android application reinforcement method | |
CN103955654A (en) | USB (Universal Serial Bus) flash disk secure storage method based on virtual file system | |
CN102932140A (en) | Key backup method for enhancing safety of cipher machine | |
CN105678173A (en) | vTPM safety protection method based on hardware transactional memory | |
CN101964033B (en) | Method for generating machine identification code of flat panel detector and extended application method | |
CN105303093A (en) | Token verification method for cryptographic smart token | |
CN103049705B (en) | A kind of based on virtualized method for secure storing, terminal and system | |
CN104361280B (en) | A kind of method realizing carrying out authentic authentication to USB storage device by SMI interrupt | |
CN107958141A (en) | A kind of method for protecting software based on chip ID number | |
CN107563226A (en) | A kind of Memory Controller, processor module and key updating method | |
CN106778097A (en) | A kind of encryption lock for safety check security protection background management system | |
CN202110552U (en) | Software protection device based on multi-body interleaved storage technology | |
CN111680272A (en) | Byte code encryption and decryption method and device | |
Zhang et al. | A structural approach to prophecy variables |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170531 |
|
RJ01 | Rejection of invention patent application after publication |