CN107169322A - A kind of security of computer software encryption handling system - Google Patents
A kind of security of computer software encryption handling system Download PDFInfo
- Publication number
- CN107169322A CN107169322A CN201710567361.8A CN201710567361A CN107169322A CN 107169322 A CN107169322 A CN 107169322A CN 201710567361 A CN201710567361 A CN 201710567361A CN 107169322 A CN107169322 A CN 107169322A
- Authority
- CN
- China
- Prior art keywords
- module
- input
- electrically connected
- computer software
- output end
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000010200 validation analysis Methods 0.000 claims abstract description 39
- 238000012795 verification Methods 0.000 claims abstract description 19
- 230000002159 abnormal effect Effects 0.000 claims description 5
- 238000012544 monitoring process Methods 0.000 claims description 5
- 238000012360 testing method Methods 0.000 claims description 4
- 230000005611 electricity Effects 0.000 claims description 2
- 238000000034 method Methods 0.000 description 4
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000010835 comparative analysis Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of security of computer software encryption handling system, including security input unit, the output end of the security input unit and the input of safety verification unit are electrically connected with, and the output end of safety verification unit and the input of feedback unit are electrically connected with.The security of computer software encryption handling system, the validation problem that user can be actually entered, the validation problem standard value of unlocking pin and secondary password respectively with setting, unlocking pin standard value and secondary password standard value are analyzed, so as to carry out safe encipherment protection to computer software, effectively avoiding computer software there is the phenomenon leaked, have a safety feature, when safety verification is obstructed out-of-date, file locking module can be locked to computer software, alarm module can synchronize warning, remote control can be carried out to the management system, real-time guard can be carried out to computer software, the security of computer software encryption handling system is more perfect.
Description
Technical field
The present invention relates to security of computer software technical field, specially a kind of security of computer software encryption handling system
System.
Background technology
Computer is commonly called as computer, is a kind of modern electronic computer device for supercomputing, can carry out numerical computations,
Logical calculated can be carried out again, also with store-memory function, computer is that one kind can be run according to program, automatic and high speed
The modernization intelligent electronic device of mass data is handled, computer is made up of hardware system and software systems, be fitted without and appoint
The computer of what software is referred to as bare machine, and computer can be divided into supercomputer, industrial control computer, network computer, individual
Computer and the class of embedded computer five, more advanced computer have biocomputer, photonic computer and quantum computer etc..
Existing computer software in use, the problem of easily being opened by stranger and software leakage occur, it is difficult to
Computer software is reasonably protected, security performance is poor, therefore, a kind of it is proposed that security of computer software encryption pipe
Reason system.
The content of the invention
(One)The technical problem of solution
In view of the shortcomings of the prior art, the invention provides a kind of security of computer software encryption handling system, solve existing
The problem of security of computer software poor-performing.
(Two)Technical scheme
To achieve the above object, the present invention provides following technical scheme:A kind of security of computer software encryption handling system, including
Security input unit, the output end of the security input unit and the input of safety verification unit are electrically connected with, the safety
The input of the output end of authentication unit and feedback unit is electrically connected with, the output end of the feedback unit and microprocessor it is defeated
Enter end to be electrically connected with.
The output end of the input of the microprocessor and safe ciphering unit is electrically connected with, the safe ciphering unit bag
Include validation problem setting module, unlocking pin setting module and secondary password setting module, the output end of the microprocessor and
The input of safety verification unit is electrically connected with, the microprocessor and the two-way electrical connection of memory module, the microprocessor and
The two-way electrical connection of file locking module.
The two-way electrical connection of microprocessor and radio receiving transmitting module, the radio receiving transmitting module and intelligent mobile terminal are double
To electrical connection, the intelligent mobile terminal includes checking information display module, abnormal information monitoring modular and remote operation management
Module, the output end of the checking information display module and the input of display screen are electrically connected with, and the abnormal information monitors mould
The output end of block and the input of buzzer are electrically connected with.
It is preferred that, it is close that the security input unit includes validation problem input module, unlocking pin input module and two grades
Code input module, the safety verification unit includes validation problem contrast module, unlocking pin contrast module and secondary password pair
Than module, the feedback unit includes feedback module one, feedback module two and feedback module three.
It is preferred that, the output end of the validation problem input module and the input of validation problem contrast module electrically connect
Connect, the output end of the validation problem contrast module and the input of feedback module one are electrically connected with.
It is preferred that, the output end of the unlocking pin input module and the input of unlocking pin contrast module electrically connect
Connect, the output end of the unlocking pin contrast module and the input of feedback module two are electrically connected with.
It is preferred that, the output end of the secondary password input module and the input of secondary password contrast module electrically connect
Connect, the output end of the secondary password contrast module and the input of feedback module three are electrically connected with.
It is preferred that, the output end of the microprocessor and the input of alarm module are electrically connected with, the microprocessor
The output end of input and power module is electrically connected with.
(Three)Beneficial effect
The invention provides a kind of security of computer software encryption handling system, possesses following beneficial effect:
(1)The security of computer software encryption handling system, by being provided with safe ciphering unit, can enter to computer software
Row validation problem standard value, unlocking pin standard value and secondary password standard value setting, and by the validation problem after setting, unblock
Password and secondary password are as the validation criteria value of safety verification unit, and by being provided with security input unit, user needs
Validation problem, unlocking pin and secondary password are verified, at safety verification unit, user can be actually entered
Validation problem, unlocking pin and secondary password are close with the validation problem standard value of setting, unlocking pin standard value and two grades respectively
Code standard value is analyzed, and so as to carry out safe encipherment protection to computer software, effectively avoids computer
There is the phenomenon leaked in software, has a safety feature.
(2)The security of computer software encryption handling system, by file locking module, when testing that user actually enters
Card problem, unlocking pin and secondary password and validation problem standard value, unlocking pin standard value and the secondary password standard of setting
When value is not inconsistent, in the presence of microprocessor, file locking module can be locked and protected to computer software, alarm module
Warning can be synchronized, by being provided with radio receiving transmitting module and intelligent mobile terminal, the management system can be carried out long-range
Control, can carry out real-time guard, the security of computer software encryption handling system is more perfect to computer software.
Brief description of the drawings
Fig. 1 is secure encryption system control figure of the present invention;
Fig. 2 is intelligent mobile terminal management system control figure of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made
Embodiment, belongs to the scope of protection of the invention.
Fig. 1-2 is referred to, the present invention provides a kind of technical scheme:A kind of security of computer software encryption handling system, bag
Security input unit is included, the output end of security input unit and the input of safety verification unit are electrically connected with, safety verification list
The output end of member and the input of feedback unit are electrically connected with, and security input unit is close including validation problem input module, unblock
Code input module and secondary password input module, safety verification unit include validation problem contrast module, unlocking pin contrast mould
Block and secondary password contrast module, feedback unit include feedback module one, feedback module two and feedback module three, and validation problem is defeated
The input of the output end and validation problem contrast module that enter module is electrically connected with, the output end of validation problem contrast module and anti-
The input for presenting module one is electrically connected with, the output end of unlocking pin input module and the input electricity of unlocking pin contrast module
Property connection, the input of the output end of unlocking pin contrast module and feedback module two is electrically connected with, secondary password input module
Output end and secondary password contrast module input be electrically connected with, the output end and feedback module of secondary password contrast module
Three input is electrically connected with, and the output end of feedback unit and the input of microprocessor are electrically connected with, and microprocessor is by one
The central processing unit of piece or several large scale integrated circuits composition, microprocessor can complete to obtain instruction, execute instruction with
And the operation such as information is exchanged with extraneous memory and logical block, microprocessor is the product well known to prior art, to affiliated
For person skilled in the art, and operation principle is clearly complete, and therefore, no longer microprocessor is excessively described, micro-
The model Core-I7 processors of processor, have the advantages that the speed of service is fast and caching performance is high, are effectively guaranteed the report
The normal of alert system is used, and the output end of microprocessor and the input of alarm module are electrically connected with, the input of microprocessor
It is electrically connected with the output end of power module, power module is municipal power supply.
The output end of the input of microprocessor and safe ciphering unit is electrically connected with, and safe ciphering unit is asked including checking
Inscribe setting module, unlocking pin setting module and secondary password setting module, the output end and safety verification unit of microprocessor
Input be electrically connected with, microprocessor and the two-way electrical connection of memory module can carry out effective storage, more to checking information
Plus it is user-friendly for management, microprocessor and the two-way electrical connection of file locking module, the checking actually entered as user
Problem, unlocking pin and secondary password and validation problem standard value, unlocking pin standard value and the secondary password standard value of setting
When not being inconsistent, in the presence of microprocessor, file locking module can be locked and protected to computer software.
Microprocessor and the two-way electrical connection of radio receiving transmitting module, radio receiving transmitting module and intelligent mobile terminal is two-way is electrically connected
Connect, intelligent mobile terminal includes checking information display module, abnormal information monitoring modular and remote operation management module, checking letter
Cease the output end of display module and the input of display screen is electrically connected with, real-time exhibition, display screen can be carried out to checking information
For LED LCDs, the output end of abnormal information monitoring modular and the input of buzzer are electrically connected with, can be to exception
Information is warned, and person more convenient to use is managed.
Operation principle:Under the effect of safe ciphering unit, validation problem standard value, unblock are carried out to computer software in advance
Password standard value and the setting of secondary password standard value, and it regard the validation problem after setting, unlocking pin and secondary password as peace
The validation criteria value of full authentication unit, when opening computer software, user need at security input unit to validation problem,
Unlocking pin and secondary password are verified, at safety verification unit, the validation problem that can actually enter user, solution
Lock cipher and secondary password are carried out with the validation problem standard value, unlocking pin standard value and secondary password standard value of setting respectively
Comparative analysis, feedback unit feeds back to the checking information of safety verification unit, the validation problem that actually enters as user,
Unlocking pin and secondary password and validation problem standard value, unlocking pin standard value and the secondary password standard value of setting are not inconsistent
When, microprocessor can be assigned at instruction to file locking module, and file locking module can be locked and protected to computer software
Shield, alarm module can synchronize warning, in the presence of radio receiving transmitting module and intelligent mobile terminal, can be to the management system
System carries out remote control, can carry out real-time guard to computer software, the security of computer software encryption handling system is more
It is perfect.
The correlation module being related in the system is hardware system module or is prior art Computer Software journey
The functional module that sequence or agreement are combined with hardware, computer software programs or agreement involved by the functional module itself
The technology being well known to those skilled in the art, it is not the improvements of the system, and the system is improved between each module
Interaction relationship or annexation, be that the overall construction of system is improved, to be solved with solving the system
Relevant art problem.
In summary, the security of computer software encryption handling system, can be to meter by being provided with safe ciphering unit
Calculation machine software carries out validation problem standard value, unlocking pin standard value and the setting of secondary password standard value, and by testing after setting
Card problem, unlocking pin and secondary password as safety verification unit validation criteria value, by being provided with security input unit,
User needs to verify validation problem, unlocking pin and secondary password, at safety verification unit, can be by user
Validation problem standard value, the unlocking pin standard of validation problem, unlocking pin and the secondary password actually entered respectively with setting
Value and secondary password standard value are analyzed, and so as to carry out safe encipherment protection to computer software, effectively keep away
Computer software is exempted from and the phenomenon leaked has occurred, had a safety feature, by file locking module, when testing that user actually enters
Card problem, unlocking pin and secondary password and validation problem standard value, unlocking pin standard value and the secondary password standard of setting
When value is not inconsistent, in the presence of microprocessor, file locking module can be locked and protected to computer software, alarm module
Warning can be synchronized, by being provided with radio receiving transmitting module and intelligent mobile terminal, the management system can be carried out long-range
Control, can carry out real-time guard, the security of computer software encryption handling system is more perfect to computer software.
It should be noted that herein, such as first and second or the like relational terms are used merely to a reality
Body or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or deposited between operating
In any this actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant are intended to
Nonexcludability is included, so that process, method, article or equipment including a series of key elements not only will including those
Element, but also other key elements including being not expressly set out, or also include being this process, method, article or equipment
Intrinsic key element.The electric elements occurred in this article are electrically connected with extraneous main controller and 220V civil powers, and main controller
The conventionally known equipment of control can be played for computer etc..
Although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with
A variety of changes, modification can be carried out to these embodiments, replace without departing from the principles and spirit of the present invention by understanding
And modification, the scope of the present invention is defined by the appended.
Claims (6)
1. a kind of security of computer software encryption handling system, including security input unit, it is characterised in that:The safety input
The output end of unit and the input of safety verification unit are electrically connected with, the output end and feedback unit of the safety verification unit
Input be electrically connected with, the input of the output end of the feedback unit and microprocessor is electrically connected with;
The output end of the input of the microprocessor and safe ciphering unit is electrically connected with, and the safe ciphering unit includes testing
Card problem setting module, unlocking pin setting module and secondary password setting module, the output end and safety of the microprocessor
The input of authentication unit is electrically connected with, the microprocessor and the two-way electrical connection of memory module, the microprocessor and file
The two-way electrical connection of locking module, the two-way electrical connection of microprocessor and radio receiving transmitting module, the radio receiving transmitting module and intelligence
Can the two-way electrical connection of mobile terminal, the intelligent mobile terminal include checking information display module, abnormal information monitoring modular and
Remote operation management module, the output end of the checking information display module and the input of display screen are electrically connected with, described different
The output end of normal information monitoring module and the input of buzzer are electrically connected with.
2. a kind of security of computer software encryption handling system according to claim 1, it is characterised in that:The safety is defeated
Entering unit includes validation problem input module, unlocking pin input module and secondary password input module, the safety verification list
Member includes validation problem contrast module, unlocking pin contrast module and secondary password contrast module, and the feedback unit includes anti-
Present module one, feedback module two and feedback module three.
3. a kind of security of computer software encryption handling system according to claim 2, it is characterised in that:The checking is asked
Inscribe input module output end and validation problem contrast module input be electrically connected with, the validation problem contrast module it is defeated
The input for going out end and feedback module one is electrically connected with.
4. a kind of security of computer software encryption handling system according to claim 2, it is characterised in that:The unblock is close
Code input module output end and unlocking pin contrast module input be electrically connected with, the unlocking pin contrast module it is defeated
The input for going out end and feedback module two is electrically connected with.
5. a kind of security of computer software encryption handling system according to claim 2, it is characterised in that:Described two grades close
Code input module output end and secondary password contrast module input be electrically connected with, the secondary password contrast module it is defeated
The input for going out end and feedback module three is electrically connected with.
6. a kind of security of computer software encryption handling system according to claim 1, it is characterised in that:The microprocessor
The output end of device and the input of alarm module are electrically connected with, the input of the microprocessor and the output end electricity of power module
Property connection.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710567361.8A CN107169322A (en) | 2017-07-12 | 2017-07-12 | A kind of security of computer software encryption handling system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710567361.8A CN107169322A (en) | 2017-07-12 | 2017-07-12 | A kind of security of computer software encryption handling system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107169322A true CN107169322A (en) | 2017-09-15 |
Family
ID=59824040
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710567361.8A Pending CN107169322A (en) | 2017-07-12 | 2017-07-12 | A kind of security of computer software encryption handling system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107169322A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108154015A (en) * | 2017-12-25 | 2018-06-12 | 苏州赛源微电子有限公司 | A kind of security of computer software encryption handling system |
CN109492409A (en) * | 2018-09-28 | 2019-03-19 | 内蒙古师范大学 | A kind of security of computer software encryption handling system |
CN109886032A (en) * | 2019-02-20 | 2019-06-14 | 宿迁学院 | A kind of computer software encryption protection system |
CN111143783A (en) * | 2019-12-09 | 2020-05-12 | 河南工业和信息化职业学院 | Computer software encryption protection device and method |
CN112511327A (en) * | 2020-03-17 | 2021-03-16 | 苏州安澜展览展示有限公司 | Distributed control computer host management system and management method thereof |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105095746A (en) * | 2015-07-02 | 2015-11-25 | 北京奇虎科技有限公司 | Method and device for application program starting authentication |
CN205121542U (en) * | 2015-11-10 | 2016-03-30 | 上海炙伦电信设备有限公司 | But remote alarm's embedded system encrypts spare still original mounting |
CN106326729A (en) * | 2016-08-29 | 2017-01-11 | 四川格锐乾图科技有限公司 | Intelligently-locked computer software secret leakage prevention system |
-
2017
- 2017-07-12 CN CN201710567361.8A patent/CN107169322A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105095746A (en) * | 2015-07-02 | 2015-11-25 | 北京奇虎科技有限公司 | Method and device for application program starting authentication |
CN205121542U (en) * | 2015-11-10 | 2016-03-30 | 上海炙伦电信设备有限公司 | But remote alarm's embedded system encrypts spare still original mounting |
CN106326729A (en) * | 2016-08-29 | 2017-01-11 | 四川格锐乾图科技有限公司 | Intelligently-locked computer software secret leakage prevention system |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108154015A (en) * | 2017-12-25 | 2018-06-12 | 苏州赛源微电子有限公司 | A kind of security of computer software encryption handling system |
CN109492409A (en) * | 2018-09-28 | 2019-03-19 | 内蒙古师范大学 | A kind of security of computer software encryption handling system |
CN109886032A (en) * | 2019-02-20 | 2019-06-14 | 宿迁学院 | A kind of computer software encryption protection system |
CN111143783A (en) * | 2019-12-09 | 2020-05-12 | 河南工业和信息化职业学院 | Computer software encryption protection device and method |
CN111143783B (en) * | 2019-12-09 | 2023-04-25 | 河南工业和信息化职业学院 | Computer software encryption protection device and method |
CN112511327A (en) * | 2020-03-17 | 2021-03-16 | 苏州安澜展览展示有限公司 | Distributed control computer host management system and management method thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107169322A (en) | A kind of security of computer software encryption handling system | |
CN103809517B (en) | The control system of Digit Control Machine Tool and encryption method thereof | |
CN106530140A (en) | Online monitoring system of water quality | |
CN106372786A (en) | "Two ticket" operation safety management and control system and method | |
CN204465588U (en) | A kind of host monitor based on server architecture and auditing system | |
CN108847930A (en) | A kind of data transmission method, device and fire-fighting system | |
CN104464048A (en) | Electronic coded lock unlocking method and electronic coded lock unlocking device | |
CN108376290A (en) | A kind of control method, device and server that financial self-service equipment is safeguarded | |
CN105094070B (en) | The operation monitoring system and its operating method of passive outdoor equipment | |
CN108256341A (en) | A kind of system of safe encryption handling computer software | |
CN206003100U (en) | Metering safety device | |
CN101499142A (en) | Double-interface smart card and method for processing application instruction | |
CN109842615B (en) | Communication device and communication method | |
CN115118751B (en) | Blockchain-based supervision system, method, equipment and medium | |
CN203942333U (en) | Transformer substation grounding wire management system | |
CN108959858A (en) | Novel computer software security encryption management system | |
CN204695314U (en) | A kind of computer information safe device | |
CN112631177B (en) | Agricultural data acquisition device based on hardware encryption transmission | |
CN205644710U (en) | Smart meter box lock monitored control system | |
CN114844676A (en) | Network security threat emergency disposal system and method for power monitoring system | |
CN204667545U (en) | Intelligent Card for Gas Meter mainboard automated detection system | |
CN104167074B (en) | Residual current type electrical fire regional type monitoring detector | |
CN209785060U (en) | Internet of things safety payment platform | |
CN206877332U (en) | A kind of intelligent protection module of information safety devices | |
CN112437050A (en) | Computer network safety protection system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170915 |