CN1091902C - Access control of general computer, its software copyright protector and method - Google Patents

Access control of general computer, its software copyright protector and method Download PDF

Info

Publication number
CN1091902C
CN1091902C CN 97125726 CN97125726A CN1091902C CN 1091902 C CN1091902 C CN 1091902C CN 97125726 CN97125726 CN 97125726 CN 97125726 A CN97125726 A CN 97125726A CN 1091902 C CN1091902 C CN 1091902C
Authority
CN
China
Prior art keywords
software
microcontroller
card
user
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 97125726
Other languages
Chinese (zh)
Other versions
CN1221915A (en
Inventor
张义农
蔡华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 97125726 priority Critical patent/CN1091902C/en
Publication of CN1221915A publication Critical patent/CN1221915A/en
Application granted granted Critical
Publication of CN1091902C publication Critical patent/CN1091902C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Abstract

The present invention relates to a device for the access control and the software copyright protection of a universal computer and a method thereof. The present invention slightly reforms a main board of the existing microcomputer, and an output pin of a microcontroller U2 is directly or indirectly connected with a position restoring pin of a central processor U1 of the main board of the microcomputer so as to achieve the position restoring control of the U2 for the central processor U1. The microcontroller U2 and the main board are kept in serial or parallel data communication connection so as to achieve the complete control of computer upper layer application software for the U2, and the U2 can read and write a CPU card module U3. The present invention also comprises an IC card writing and reading apparatus. The present invention has the functions of the identification of the identity of a user, the encryption of data and the protection of the copyright of the software.

Description

A kind of access control of multi-purpose computer and software copyright protector and method
The present invention relates to field of computer technology, relate in particular to computer access control of authority device and copyright protection of computer software method.
In current communication society, people are more and more higher to the safety and the security requirements of information, and present computer operating system (for example: DOS, Windows3.1, Windows95 etc.) is not differentiated operator's identity basically, make operator's resource in the access system optionally, and some may be that perhaps other has the content of security requirements for privacy aspect interior in these resources.Other multi-user operating system (for example: WindowsNT, Unix etc.) is though provide user right control preferably, if refitting operating system, then existing user right control will be broken up easily.
Present software copyright protection means are very weak; the part professional software is provided software licensing power in the mode that dongle is provided; and more software only shows when mounted just that one section advice user observes the literal of Universal Copyright Convention, and software developer's interests are subjected to the serious threat of pirate industry.
Although the method that more existing restrictions are carried out access to computer system, such as the pre-boot scheme of control computer, adopt the information protection device of bus inserted card form electronic lock.These schemes have certain characteristic and novelty when originally proposing, but As time goes on the progress of electronic technology, some scheme obviously falls behind, not only can more easily get around barrier point set in the scheme, and to implement be complicated poor efficiency again, is unfavorable for the industrialization of scheme.
About the method for the copyright protection of computer software, also have manyly, for example adopt telephone communication network or Internet net dynamically to buy the method for software licensing card.But even to this day, the important method of software copyright protection still is the moral concept of making great efforts to cultivate people, rather than relies on those disclosed technical schemes, and many technical schemes implement and have such or such inconvenience.
In restriction computer system is carried out in the method for access, most variations (such as CN1146813A) adopts bus inserted card at first to guide, occupy the control of CPU, thereby judge whether normally to start computing machine according to condition subsequent, the obstacle of removing this scheme manufacturing only need pull out plug-in card.Certainly the CN1146813A scheme has also been mentioned the technological means of some other protection computer resource, such as the method for destroying machine element in logic and physically.Even if, also be the parts that there is no need or not should destroy computing machine fully in fact in the higher application scenario of most of security requirements.On the one hand be because if the The data on the storage medias such as hard disk such as the encryption of high strength such as DES, even if so with the data full disclosure in the hard disk, what obtain also only is inextricable close nothing binary string in all senses, destroys hard disk and just there is no need certainly.In addition, destroy machine element automatically and may bring other pernicious consequence, that is exactly other safety problem except data security, such as the fire that causes of short circuit or the like.The CN1146813A scheme mainly relies on monitor bus to finish the computer resource access control.Develop into these epoch of today at central processing unit, want real monitoring in real time up to the complex bus sequential of hundreds of million clock frequencies, implementing technically is the comparison difficulty, if adopt alternate manner to avoid this positive problem, also just just reflected that this scheme implements the weakness of comparison difficulty.In fact, this scheme mainly is to monitor that with CPU the BIOS calling realizes that indirectly bus monitors really in many places.Obviously, monitor that BIOS calls out and the supervisory computer bus is not the same thing.
Purpose of the present invention mainly is in order to solve the control to the computer access authority better; the restriction disabled user arbitrarily opens computing machine; the data that protection is stored in the hard disc of computer is not visited by unauthorized user, and provide a kind of that easily, be convenient to implement, not only helped the software user but also helped access control and the software copyright protector and the method for multi-purpose computer of the software copyright protection of software marker.
The present invention need transform a little to the motherboard design of existing microsystem, it is characterized in that:
Central processing unit U 1Reset pin and the microcontroller U of increase 2An output pin directly or indirectly be connected, the reset signal on the mainboard no longer with central processing unit U 1Reset pin join, but with micro controller U 2Reset terminal link to each other, to realize U 2To central processing unit U 1The control that resets; Microcontroller U 2Keep the serial or parallel data communication connection with mainboard, to realize that the computing machine upper application software is to U 2Control fully; Increase an embedded CPU card module U at mainboard 3, this module and microprocessor U 2Also keep asynchronous communication contact, make U 2Can read and write this CPU card; At case front panel IC-card read write line U is installed 4, this IC-card read write line comprises read-write deck and peripheral read/write circuit, and with microcontroller U 2Keep the asynchronous serial communication contact, the IC-card read write line also comprises a password keypad.
Multi-purpose computer access control method of the present invention is characterized in that:
When electric on computers, give the microcontroller U that sets up with the reset signal that the mainboard reset circuit produces 2, U 2Back control itself and central processing unit U reset 1The output pin that reset terminal links to each other makes central processing unit U 1Be in reset mode always, and wouldn't enter normal operating conditions;
The microcomputer user inserts the IC-card read write line U that microcomputer is set up with SIM card 4
Microcontroller U 2Read the user cipher of user's input from the password keypad of IC-card read write line;
Microprocessor U 2User cipher is transmitted to SIM card carries out password relatively, if be successful then permission U relatively 2Read the user account number of this SIM card; If relatively failure, SIM card will refuse to carry out U 2The read write command of sending;
Controller U 2Produce a random number and give SIM card, make SIM card produce authenticator, SIM card adopts cryptographic algorithm f 1, producing authenticator among key, account number, the random number three internally, the internal key that SIM card is used leaves SIM card inside in, and authenticator calculates and finishes, and gives microcontroller U 2
Microcontroller U 2Adopt same cryptographic algorithm f 1, from its own internal key, account number, random number three, produce authenticator, microcontroller U 2The internal key that uses leaves innernal CPU card U in 3Inner;
Microcontroller U 2Two authenticators are compared, if equate U 2The control output pin makes central processing unit U 1Break away from reset mode and enter normal operating conditions, executive operating system guiding work; If unequal, then still make U 1Be in reset mode.
The data access control method of multi-purpose computer of the present invention is characterized in that:
User setup data encryption software, encryption software produce a random number, issue the microcontroller U on the mainboard 2, U 2Adopt cryptographic algorithm f 2With key random number is encrypted and to obtain second random number, and second random number is returned to encryption software, encryption software adopts decipherment algorithm f 2With described key second random number is decrypted and obtains the 3rd random number,, represent that this software just moves on first wife's microcomputer if first random number equates with the 3rd random number, otherwise out of service;
Encryption software order microcontroller U 2The execution user identity is differentiated, and is if identity is differentiated failure, then out of service; If identity is differentiated successfully, then obtain microcontroller U 2User account number that returns and internal key;
Encryption software adopts high strength data encryption algorithm f according to user account number and internal key 3To specifying raw data to encrypt, generate secret data;
Encryption software carries out erase operation to the raw data parking space, avoids staying any raw data.
The software copyright protecting method of multi-purpose computer of the present invention is characterized in that:
The subsidiary copyright permission of every cover copyrighted software CPU card, the CPU card is deposited the sequence number of this software, deposits the user cipher of this CPU card in the software;
During install software, the user needs to permit CPU to insert the IC-card read write line U of front panel copyright 4Installation procedure sticks into row with the password of storage inside and copyright permission CPU and checks, cryptographic core to success after, can read the software sequence number of depositing in copyright permission CPU card inside;
Install software is issued microcontroller U on the mainboard with this software sequence number 2, make its CPU card U on mainboard 3Middle foundation basic document are also stored this software sequence number, and install software record primary filename also continues other installment work;
After the software successful installation, when each the execution, software is order microcontroller U earlier 2According to primary filename at mainboard CPU card U 3Whether middle retrieval deposits legal software sequence number, if retrieval is unsuccessful, then out of service.
The present invention has the following advantages:
1. can carry out identity to the computer user and differentiate, stop unauthorized user to open computing machine without authorization because microcontroller U 2Carry out integrated design with computer motherboard, rather than take mainboard plug-in card mode, so thereby do not exist the mainboard plug-in card to be pulled out the defective of cut-through this respect.In addition, the reset terminal of control central processing unit is more much easier than supervision and control computer data bus, realizes that easily function also can be guaranteed well.
2. provide convenience, at the data encryption of user's ID card.The data information that the user can be left on the hard disc of computer carries out high strength encrypting, prevents from that other people from unloading hard disk to read on other computer system and divulge a secret, and data encrypted only can be deciphered with user's ID card.Thereby for data such as individual privacy, secret of the trade, government secret provide extraordinary salvo.
3. can provide perfect software copyright protecting method, protect computer software manufacturer and final user's interests to greatest extent.Because subsidiary CPU card of depositing software sequence number of every cover software, lack this CPU card, install software can not be carried out normal fitting operation, and the CPU card extremely difficulty duplicate and decipher, add install software and CPU card and will carry out bidirectional identity authentication, realize that piracy also is extremely difficult so will crack from install software.
The present invention has conveniently, easily realizes, is easy to industrialization and safe and reliable effect in a word.
The drawing explanation:
Accompanying drawing is the access control of a kind of multi-purpose computer of the present invention and software copyright protector
The embodiment circuit block diagram.
Transformation according to above hardware system will realize the control of computer access authority and the protection of software copyright, implements to get final product according to following method.
1, user identity is differentiated
The computer user need hold legal users ID (identity number) card (Subscriber Idenrtity Module is called for short SIM card), just can start computing machine with SIM card, thereby visit its resource, and realize the control of computer access authority.SIM card can be the higher CPU cards of those present securities, be difficult to be forged, every SIM card has a user cipher (Personal Identify Number, be called for short PIN), when the user uses SIM card, corresponding PIN must be provided, otherwise just not think that he is the legal holder of this SIM card.Only when PIN is correct, just may carry out read-write operation to this SIM card.If the PIN of PIN that the user provides and SIM card storage inside is not inconsistent, when attempting continuously all getting nowhere several times, this card will get clogged and scrap.
Typical user identity discrimination process is as follows:
1. power on to computing machine, the mainboard reset circuit produces reset signal and gives microcontroller U 2, microcontroller U 2After resetting, control itself and central processing unit U 1The output pin that reset terminal links to each other makes central processing unit U 1Be in reset mode always, and wouldn't enter normal operating conditions;
2. the microcomputer user inserts SIM card the IC-card read write line U of microcomputer front panel 4
3. microcontroller U 2Read the user cipher UserPin of user's input from IC-card read write line password keypad;
4. microcontroller U 2User cipher UserPin is transmitted to SIM card carries out password relatively,, then allow microcontroller U if password is more successful 2Read the user account number UserCounterNumber of this SIM card; If password is relatively failed, SIM card will refuse to carry out microcontroller U 2The read write command of sending;
5. microcontroller U 2Produce a random number R andomNumber and give SIM card, the order SIM card produces authenticator VerifyDataIC.Because user cipher UserPin is relatively success, so SIM card takes orders and carries out.SIM card adopts cryptographic algorithm f 1, produce authenticator VerifyDataIC internally among key UserKeyIC, account number UserCounterNumber, the random number R andomNumber three, also be VerfiyDartaIC=f1 (UserKeyIC, UserCounterNumber, RandomNumber).The internal key UserKeyIC that SIM card is used leaves SIM card inside in.Authenticator VerifyDataIC calculates and finishes, and gives microcontroller U 2
6. microcontroller U 2Adopt same cryptographic algorithm f1, produce authenticator VerifyDataPC internally among key UserKeyPC, account number UserCounterNumber, the random number R andkomNumber three, also be VerfiyDataPC=f1 (UserKeyPC, UserCounterNumber, RandomNumber).Microcontroller U 2The internal key UserKeyPC that uses leaves innernal CPU card U in 3Inner;
7. microcontroller U 2Two authenticator UserKeyIC, UserKeyPC are compared, if equate microcontroller U 2The control output pin makes central processing unit U 1Break away from reset mode and enter normal operating conditions, executive operating system guiding work; If unequal, represent that then this SIM card is not the legal card that starts this computing machine, will still make U 1Be in reset mode.
So far, user identity is differentiated and is finished.
Obviously, owing to adopted cryptographic algorithm preferably, microcontroller U 2Can finish correct discriminating preferably, compare this down, microcontroller U user's SIM card 2To central processing unit U 1Reset terminal control just seem more crucial and weakness relatively.Because although most unauthorized user is difficult to cross this step, but can be at some occasion unauthorized user at central processing unit U 1The exposure portion of reset terminal adopts the control that directly resets of the mode of secant, thus guidance system successfully.Yet this method obviously goes to read in the another set of system much hard than directly removing hard disk.
Certainly, if the data on the hard disk are handled through high strength encrypting, so above-mentioned illegal operation just seems without any practical significance.
2, data encryption
Leave the data on the hard disk in, some need obtain maintaining secrecy of higher-strength.Though user identity differentiates and can stop the disabled user to start microsystem, can not prevent that other people from unloading hard disk and cause divulging a secret.The data encryption flow process can be carried out high-intensity encryption to the data on the hard disk, and ciphering process is not only relevant with microcomputer, and relevant with encrypting user, even this is stolen with regard to the data on the hard disk that makes, other people also can't decipher it at all.
Typical data encryption flow process is as follows:
1. encryption software at first carries out the judgement of copyright legitimacy.The user setup data encryption software, encryption software produces a random number R andom2, issue the microcontroller U2 on the mainboard, U2 adopts cryptographic algorithm f2 with key K ey2 Random2 to be encrypted and obtains RandomE2 (RandomE2=f2 (Key2, Random2)), and with RandomE2 return to encryption software.Encryption software adopts decipherment algorithm f2 ' with key K ey2 ' RandomE2 to be decrypted and obtains Random2 ' (Random2 '=f2 ' (Key2 ', RandomE2)), if Random2 equates with Random2 ', represent that this software just moves on first wife's microcomputer, otherwise break off an action;
2. encryption software order microcontroller U 2Carry out user identity and differentiate (user identity differentiates that detailed process is as described above), if it is identity is differentiated failure, then out of service; If identity is differentiated successfully, then obtain microcontroller U 2User account number UserCounterNumber that returns and internal key UserKeyIc;
3. encryption software adopts high strength data encryption algorithm f3 that the specific data file is encrypted according to user account number UserCounterNumber and internal key UserKeyIc, generates secret papers;
4. encryption software carries out erase operation to the source document parking space, avoids staying any raw data;
So far, finish data encryption process.The deciphering flow process is similar to encryption flow, only changes cryptographic algorithm f3 into decipherment algorithm f3 ' and gets final product.
Narrated the scheme that computing machine is conducted interviews and controls above, the problem in the relevant software copyright protection scheme of explained later.
3, software copyright protection
During the copyrighted software distribution, have sequence number usually, this sequence number leaves in the CPU card.When the final user installs this software, installation procedure will leave sequence number in the CPU card in and write embedded CPU card on the computer motherboard, when starting software, whether store correct software sequence number in the CPU card on the software elder generation detection computations machine mainboard, if it is do not exist, then out of service.Depositing the CPU card of software sequence number can not forge, and every cover software can be realized the fine protection of software copyright corresponding to unique sequence number and CPU card, prevents to copy the random installation of software.
The software copyright protection process is as follows:
1. the subsidiary copyright permission of every cover copyrighted software CPU card, the CPU card is deposited the sequence number of this software, deposits the user cipher of this CPU card in the software;
2. during install software, the user needs permit the CPU card to insert the IC-card read write line U of front panel copyright 4Installation procedure sticks into row with the password of storage inside and copyright permission CPU and checks, cryptographic core to success after, can read the software sequence number of depositing in copyright permission CPU card inside;
3. install software is issued microcontroller U on the mainboard with this software sequence number 2, make its CPU card U on mainboard 3Middle foundation basic document are also stored this software sequence number, and install software record primary filename also continues other installment work;
4. after the software successful installation, when each the execution, software is order microcontroller U earlier 2According to primary filename at mainboard CPU card U 3Whether middle retrieval deposits legal software sequence number, if retrieval is unsuccessful, then out of service.
4, the explanation of differentiating about user identity
Is furnished with system manager's SIM card when adopting the secure computer of this design proposal to dispatch from the factory at random.This blocks initialization, can start computing machine by correct step.Can be used to make common SIM card with the supporting software of this system manager's SIM card in addition, use, and subscriber card can't be duplicated or be used for making to common SIM card only for the start use for the common machine personnel of going up;
The flow process of making common SIM card is as follows:
1. system manager's SIM card is inserted IC read write line U 4, start the management software of making common SIM;
2. management software carries out the judgement of copyright legitimacy.The flow process that detailed process such as data are encrypted 1.;
3. management software order microcontroller U 2The execution user identity differentiates, only differentiates successfully when user identity, and user account number is when being the system manager just continuation execution;
4. take system manager's SIM card away from the IC-card read write line, insertion is used for making the CPU card of common SIM card, it is carried out initialization, and user cipher UserPin is set, projects such as internal key UserKeyIC, account number UserCounterNumber, wherein only have user cipher UserPin to need prompting user input, other generates automatically by management software.
5. common SIM card initialization finishes, and carries out the user identity differential test, and provides test result, and manufacturing process finishes.

Claims (2)

1, a kind of access control of multi-purpose computer and software copyright protector is characterized in that: mainboard central processing unit U 1Reset pin and the microcontroller U of increase 2An output pin directly or indirectly be connected, the reset signal on the mainboard no longer with central processing unit U 1Reset pin join, but with micro controller U 2Reset terminal link to each other, to realize U 2To central processing unit U 1The control that resets; Microcontroller U 2Keep the serial or parallel data communication connection with mainboard, to realize that the computing machine upper application software is to U 2Control fully; On mainboard, increase an embedded CPU card module U 3, this module and microprocessor U 2Also keep the serial or parallel data communication connection, make U 2Can read and write this CPU card; At case front panel IC-card read write line U is installed 4, this IC-card read write line comprises read-write deck and peripheral read/write circuit, and with microcontroller U 2Keep the asynchronous serial communication contact, the IC-card read write line also comprises a password keypad.
2, a kind of control, guard method of user identity discriminating, data encryption and software copyright protection of multi-purpose computer; It is characterized in that:
(1) when electricity on computers, gives the microcontroller U that sets up with the reset signal that the mainboard reset circuit produces 2, U 2Back control itself and central processing unit U reset 1The output pin that reset terminal links to each other makes central processing unit U 1Be in reset mode always, and wouldn't enter normal operating conditions;
The microcomputer user inserts the IC-card read write line U that microcomputer is set up with SIM card 4
Microcontroller U 2Read the user cipher of user's input from the password keypad of IC-card read write line;
Microprocessor U 2User cipher is transmitted to SIM card carries out password relatively, if be successful then permission U relatively 2Read the user account number of this SIM card; If relatively failure, SIM card will refuse to carry out U 2The read write command of sending;
Microcontroller U 2Produce a random number and give SIM card, make SIM card produce authenticator, SIM card adopts cryptographic algorithm f 1, producing authenticator among key, account number, the random number three internally, the internal key that SIM card is used leaves SIM card inside in, and authenticator calculates and finishes, and gives microcontroller U 2
Microcontroller U 2Adopt same cryptographic algorithm f 1, from its own internal key, account number, random number three, produce authenticator, microcontroller U 2The internal key that uses leaves innernal CPU card U in 3Inner;
Microcontroller U 2Two authenticators are compared, if equate U 2The control output pin makes central processing unit U 1Break away from reset mode and enter normal operating conditions, executive operating system guiding work; If unequal, then still make U 1Be in reset mode;
(2) user setup data encryption software, encryption software produces a random number, issues the microcontroller U on the mainboard 2, U 2Adopt cryptographic algorithm f 2With key random number is encrypted and to obtain second random number, and second random number is returned to encryption software, encryption software adopts decipherment algorithm f 2With described key second random number is decrypted and obtains the 3rd random number,, represent that this software just moves on first wife's microcomputer if first random number equates with the 3rd random number, otherwise out of service;
Encryption software order microcontroller U 2The execution user identity is differentiated, and is if identity is differentiated failure, then out of service; If identity is differentiated successfully, then obtain microcontroller U 2User account number that returns and internal key;
Encryption software adopts data encryption algorithm f according to user account number and internal key 3To specifying raw data to encrypt, generate secret data;
Encryption software carries out erase operation to the raw data parking space, avoids staying any raw data.
(3) the subsidiary copyright permission of every cover copyrighted software CPU card, the CPU card is deposited the sequence number of this software, deposits the user cipher of this CPU card in the software;
During install software, the user needs to permit the CPU card to insert the IC-card read write line U of front panel copyright 4Installation procedure sticks into row with the password of storage inside and copyright permission CPU and checks, cryptographic core to success after, can read the software sequence number of depositing in copyright permission CPU card inside;
Install software is issued microcontroller U on the mainboard with this software sequence number 2, make its CPU card U on mainboard 3Middle foundation basic document are also stored this software sequence number, and install software record primary filename also continues other installment work;
After the software successful installation, when each the execution, software is order microcontroller U earlier 2According to primary filename at mainboard CPU card U 3Whether middle retrieval deposits legal software sequence number, if retrieval is unsuccessful, then out of service.
CN 97125726 1997-12-29 1997-12-29 Access control of general computer, its software copyright protector and method Expired - Fee Related CN1091902C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 97125726 CN1091902C (en) 1997-12-29 1997-12-29 Access control of general computer, its software copyright protector and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 97125726 CN1091902C (en) 1997-12-29 1997-12-29 Access control of general computer, its software copyright protector and method

Publications (2)

Publication Number Publication Date
CN1221915A CN1221915A (en) 1999-07-07
CN1091902C true CN1091902C (en) 2002-10-02

Family

ID=5177371

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 97125726 Expired - Fee Related CN1091902C (en) 1997-12-29 1997-12-29 Access control of general computer, its software copyright protector and method

Country Status (1)

Country Link
CN (1) CN1091902C (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100361047C (en) * 2004-08-29 2008-01-09 华为技术有限公司 Method and apparatus for raising reliability of bus transmission
CN101521571B (en) * 2008-02-27 2012-07-25 联想(北京)有限公司 Method for authenticating safety unit and server side of mobile hardware
US9148423B2 (en) 2008-12-29 2015-09-29 Google Technology Holdings LLC Personal identification number (PIN) generation between two devices in a network
US8504836B2 (en) * 2008-12-29 2013-08-06 Motorola Mobility Llc Secure and efficient domain key distribution for device registration
US8904172B2 (en) 2009-06-17 2014-12-02 Motorola Mobility Llc Communicating a device descriptor between two devices when registering onto a network
CN102693389B (en) * 2011-03-22 2016-03-30 联想(北京)有限公司 A kind of method, device and CPU that CPU is controlled

Also Published As

Publication number Publication date
CN1221915A (en) 1999-07-07

Similar Documents

Publication Publication Date Title
CN1327357C (en) System and method for verification
EP0773490B1 (en) Security system for protecting information stored in storage media
JP4801059B2 (en) Method, system and security means for data archiving with automatic encryption and decryption by key fragmentation
EP1517512B1 (en) Remote access system, remote access method, and medium containing remote access program
CN100495421C (en) Authentication protection method based on USB device
CN109035519B (en) Biological feature recognition device and method
US20030226025A1 (en) Data security method of storage media
WO2009009052A1 (en) Memory data shredder
CN105740725A (en) File protection method and system
JP2009526472A (en) Data security including real-time key generation
CN1091902C (en) Access control of general computer, its software copyright protector and method
US20040255136A1 (en) Method and device for protecting information against unauthorised use
CN1266617C (en) Computer data protective method
EP1634140B1 (en) Method and system for performing a transaction and for performing a verification of legitimate access to, or use of digital data
CA2393645A1 (en) Computer-readable medium with microprocessor to control reading and computer arranged to communicate with such a medium
JPH09204401A (en) Data base retrieval system and data base protection method
CN112559979B (en) Method for protecting software library authorized use on POS machine through hardware security chip
CN111737722B (en) Method and device for safely ferrying data between intranet terminals
WO1987005175A1 (en) Method and apparatus for distributing and protecting encryption key codes
CN117972753A (en) Enterprise management software data security protection method
CN117113369A (en) Data reading and writing method and device, computer equipment and storage medium
CN115714691A (en) UKey authentication method and security configuration checking tool
CN1349197A (en) IC card-based protecting system for WINDOWS series of computers
CN1345007A (en) No-identification fully dynamic confirming method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C19 Lapse of patent right due to non-payment of the annual fee
CF01 Termination of patent right due to non-payment of annual fee