CN1092533A - Software enciphering method that enciphered data is transmitted voluntarily and primary and secondary software security dog - Google Patents
Software enciphering method that enciphered data is transmitted voluntarily and primary and secondary software security dog Download PDFInfo
- Publication number
- CN1092533A CN1092533A CN 93119444 CN93119444A CN1092533A CN 1092533 A CN1092533 A CN 1092533A CN 93119444 CN93119444 CN 93119444 CN 93119444 A CN93119444 A CN 93119444A CN 1092533 A CN1092533 A CN 1092533A
- Authority
- CN
- China
- Prior art keywords
- dog
- bitch
- sub
- software
- interface circuit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The present invention relates to software enciphering method and primary and secondary software security dog that a kind of enciphered data is transmitted automatically.During user's initial purchase software, give him a bitch, have corresponding encrypted content in the bitch.When buying second software, give him a sub-dog, have the encrypted content of corresponding second software in the sub-dog.After the user goes back, sub-dog is inserted on the computer parallel port, bitch is inserted in thereafter, on main frame, move a program then, power on to the parallel port, and send out a startup command to sub-dog, automatically set up communication link between the primary and secondary dog this moment, sub-dog is imported content wherein in the bitch into, and later program run is only carried out under the support of bitch.
Description
The present invention relates to software enciphering method and primary and secondary software security dog that a kind of enciphered data is transmitted automatically, belong to field of computer technology.
Along with the development of computer software industry, the protection of Software Intellectual Property Rights has produced the very big market demand, several different methods such as disk encryption, hard card encryption, parallel port (serial port, keyboard mouth) encryption occurred.Wherein be installed in the software security dog (hereinafter to be referred as dongle) on the parallel port, easy for installation with it, do not take computer resource (promptly not influencing printing), and be subjected to user's welcome.The ultimate principle of dongle is: during encrypted running software; relevant circuit in the relevant signal wire gating dongle on the control parallel port; produce specific output; if this output valve is identical with expectation value in the program; think that then the user is a validated user; program can continue operation, otherwise just ends program run, thereby reaches the purpose of protection software.A software needs a software security dog in general, and for some professional software exploitation units, a user may divide several times, buys different software to it like this.If one of a software " dog ", then not only increased expense, and in use very inconvenient to the user, user or move a software and insert a dog, or all dogs are all plugged, on the parallel port, form a string.Sky city company, world company, U.S. Transend company, the trend company in Taiwan and the dongle of other company sold on the market now, all belong to this type of, though some company can give a plurality of file encryptions, when reality is used, there is inconvenience again, makes a concrete analysis of as follows:
Present software security dog will realize that a plurality of program encryptions are had two methods:
1, different users impose different encrypted contents, the software developer sets " dog " interior related content (this be worth between each user have nothing in common with each other) when user's initial purchase software, and this content record is preserved, when next time, this user bought new software, get final product with this content-encrypt again.Give software cryptography in this way, make after encrypting, to have nothing in common with each other same software, but also corresponding one by one with specific " dog ", bring very burden to software marketing and after sale service, software can't be carried out earlier in batches, can only now encrypt cash sale, quality can't guarantee.
When 2, requiring the old user to buy new software, its former dongle is brought on-the-spot in dog, the interpolation and the new corresponding fresh content of software.So not only sell to Software Production and bring problems, and nonlocal user is during buying new software, its original old software may can't not use because of there being " dog ".
The objective of the invention is to design a kind of primary and secondary software security dog and encryption method thereof that has data-transformation facility each other, with a software security dog same software developer is encrypted at the different software of different times exploitation, and software can be copied in batches, software security dog energy batch making, thereby make same software, each copy after the encryption all is the same, the softdog of same software too, be beneficial to production management, improve the quality of production, also be convenient to simultaneously sell and after sale service.
Content of the present invention is: the software enciphering method that enciphered data is transmitted is voluntarily finished by following each step:
(1) software of user's initial purchase company is then given him a bitch, has corresponding encrypted content in the bitch.This bitch is inserted on computer parallel port or the serial ports, can moves this software.
When (2) user buys second software, then give him a sub-dog, have the encrypted content of corresponding second software in the sub-dog.
(3) after the user goes back, sub-dog is inserted on computer parallel port or the serial ports, bitch is inserted in thereafter, and program of operation on main frame powers on to parallel or serial port then, and send out a startup command to sub-dog, at this moment, set up communication link automatically between son, the bitch, sub-dog is imported encrypted content wherein in the bitch into, this process must the main frame intervention, thereby has fabulous confidentiality.
(4) after sub-dog spreads out of the encrypted content in it, eliminate all the elements wherein automatically, realize the software protection purpose.
(5) encrypted content of first, second two softwares all deposits in the bitch, and the operation of later program only gets final product under the support of bitch.
If the user repurchases software for the third time, as long as the atom dog is taken back, change a new sub-dog, repeat said process and get final product.Like this, with a pair of primary and secondary dog, just can realize encryption to a plurality of different softwares.When software company adopts said method to encrypt, whenever go out a cover software, go out a sub-dog of software cryptography simultaneously, the encrypted content of same software is all the same, and all sub-dogs are all the same, are easy to like this ensure the quality of products.
In order to realize said method, the present invention has designed the primary and secondary software security dog that can transmit enciphered data automatically.Bitch comprises parallel or serial port (parallel or serial port that relates to the dongle ingredient all refers to and parallel port, plug or socket that serial ports is corresponding, and is as follows), data line, output interface circuit, input interface circuit, Single Chip Microcomputer (SCM) system and enciphered message memory.The control signal of coming from data line enters single-chip microcomputer through input interface circuit and does the identification processing.If normal running is then from enciphered message memory E
2Take out respective encrypted information among the PROM, export through output interface circuit; If not normal running, the single-chip microcomputer rerun routine that starts anew then.The structure of sub-dog and bitch is basic identical, is made up of parallel or serial port, data line, two cover input interface circuits, two cover output interface circuit, Single Chip Microcomputer (SCM) system and enciphered message memories etc.The data line of sub-dog is corresponding with the bitch data line, and sub-dog is linked with PC by parallel or serial port by the first cover input, output circuit interface, by another set of imput output circuit, is established a communications link with bitch by parallel or serial port.In the time of after bitch being inserted in sub-dog, the output interface circuit of sub-dog just in time links to each other with the input interface circuit of bitch, and the input interface circuit of sub-dog just in time links to each other with the output interface circuit of bitch.Program of operation powers on to parallel or serial port, and sends out a startup command to sub-dog on main frame, sets up communication link automatically between son, the bitch, and sub-dog is encrypted memory E
2Enciphered message in the PROM is imported in the enciphered message memory of bitch automatically.The operation of program later on only gets final product under bitch is supported, sub-dog only plays encrypted content and transmits medium.The user buys the 3rd, the 4th ... during individual software, only need sub-dog is taken back, change contain into corresponding to the 3rd, the 4th ... the sub-dog of the encrypted content of individual software is repeated above operating process and gets final product.
Description of drawings:
Fig. 1 is the bitch functional-block diagram.
Fig. 2 is sub-dog functional-block diagram.
Fig. 3 is sub-dog flowsheet.
Fig. 4 and Fig. 5 are respectively the circuit diagrams of bitch and sub-dog in the one embodiment of the invention.
Below in conjunction with accompanying drawing, introduce content of the present invention in detail.
Among Fig. 1, L
1, L
2, L
3Be any 3 in 8 data lines on the parallel port, L
1Give the each several part circuit supply in the bitch, L
2, L
3Be bitch control signal incoming line; L
4Be one of parallel port input state line, the enciphered message in the bitch is line input PC thus.E
2PROM is the enciphered message memory, from L
2, L
3The control signal that line comes through input interface circuit, enters in the single-chip microcomputer after single-chip microcomputer identification is handled, if normal running, then from E
2Take out respective encrypted information among the PROM, export through output interface circuit; If not normal running, single-chip microcomputer rerun routine from the beginning then.
L in the sub-dog of Fig. 2
1, L
2, L
3, L
4With the L in the bitch
1, L
2, L
3, L
4Corresponding to four same on parallel port signal wires, but L
2, L
3, L
4Be not communicated with at 25 stamen parallel or serial ports gap bridge.L
1For sub-dog circuit provides power supply, L
5, L
6Be two in the data line of parallel port, can with L
2, L
3Identical.L
7Be one in the parallel or serial port input state line, can same L
4The same bitch of sub-dog each several part circuit function, but sub-dog has two cover imput output circuits, sub-dog is set up contact by input interface circuit 1, output interface circuit 1 with PC: by output interface circuit 2, input interface circuit 2 establishes a communications link with bitch, from top narration as can be known, in the time of after bitch being inserted in sub-dog, the output interface circuit 2 of sub-dog just in time links to each other with the input interface circuit of bitch, and the input interface circuit 2 of sub-dog just in time links to each other with the output interface circuit of bitch.As seen PC can import relevant enciphered message in the enciphered message memory of sub-dog into through sub-dog IO interface 1.When being inserted with bitch thereon, sub-dog footpath can be transferred to enciphered message in the enciphered message memory on the bitch by input/output interface circuit circuit 2.Like this, bitch can be supported the operation of two or more different encryption softwares.
Fig. 4 and Fig. 5 are the bitch of one embodiment of the invention, sub-dog circuit diagram.Among Fig. 4, L
1, L
2Be the incoming line of input circuit, L
3Be the output line of output circuit, L
4Make power lead, L
5Be ground wire.Among Fig. 5, L
1, L
2Be the incoming line of input interface circuit 1, L
3Be the output line of output interface circuit, L
6Be the incoming line of input interface circuit 2, L
4, L
5Be the output line of output interface circuit 3, L
7As power lead, L
8Be ground wire.
Software enciphering method of the present invention and primary and secondary software security dog can be realized on the parallel or serial port of computing machine or keyboard mouth.
Claims (2)
1, the software enciphering method that transmits voluntarily of a kind of enciphered data is characterized in that adopting the following step:
(1) encrypted content with first software deposits in the bitch;
(2) encrypted content with second software deposits in the sub-dog;
(3) sub-dog is inserted on computer parallel port or the serial ports, bitch is inserted in thereafter, then program of operation on main frame, power on to parallel or serial port, and send out a startup command to sub-dog, and set up communication link automatically between son, the bitch, encrypted content imports in the bitch in the sub-dog;
(4) after sub-dog spreads out of the encrypted content in it, eliminate all the elements wherein automatically;
(5) encrypted content of first, second software all deposits in the bitch.
2, a kind of primary and secondary software security dog, it is characterized in that described bitch comprises parallel or serial port, data line, input interface circuit, output interface circuit, Single Chip Microcomputer (SCM) system and enciphered message memory, the control signal of from data line, coming, enter single-chip microcomputer through input interface circuit and do the identification processing, from widget, take out respective encrypted information then, export through output interface circuit; Described sub-dog comprises parallel or serial port, data line, two cover input interface circuits, two cover output interface circuit, Single Chip Microcomputer (SCM) system and enciphered message memories; The data line of sub-dog is corresponding with the bitch data line, sub-dog is linked with PC by parallel or serial port by a cover input, output interface circuit, establish a communications link with bitch by parallel or serial port by another set of input, output interface circuit, after both established a communications link, the enciphered message in the sub-dog widget was imported in the enciphered message memory of bitch.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 93119444 CN1092533A (en) | 1993-10-29 | 1993-10-29 | Software enciphering method that enciphered data is transmitted voluntarily and primary and secondary software security dog |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 93119444 CN1092533A (en) | 1993-10-29 | 1993-10-29 | Software enciphering method that enciphered data is transmitted voluntarily and primary and secondary software security dog |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1092533A true CN1092533A (en) | 1994-09-21 |
Family
ID=4992920
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 93119444 Pending CN1092533A (en) | 1993-10-29 | 1993-10-29 | Software enciphering method that enciphered data is transmitted voluntarily and primary and secondary software security dog |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1092533A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100346251C (en) * | 2005-10-28 | 2007-10-31 | 武汉理工大学 | Virtual software dog enciphering method |
CN101291219B (en) * | 2007-04-19 | 2010-08-18 | 北京深思洛克软件技术股份有限公司 | Multiple encryption lock device and binding method of multiple encryption lock |
-
1993
- 1993-10-29 CN CN 93119444 patent/CN1092533A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100346251C (en) * | 2005-10-28 | 2007-10-31 | 武汉理工大学 | Virtual software dog enciphering method |
CN101291219B (en) * | 2007-04-19 | 2010-08-18 | 北京深思洛克软件技术股份有限公司 | Multiple encryption lock device and binding method of multiple encryption lock |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106530088B (en) | Method for trading certificate products based on blockchain security nodes | |
CN110659515B (en) | Open type integrated circuit collaborative design cloud platform and method thereof | |
CN100573441C (en) | Carry out the micro processor, apparatus and the method for index multiplication | |
CN108346110B (en) | Information interaction system based on manufacturing block chain | |
CN112035879B (en) | Information processing method and system for improving confidentiality of automatic logistics of cell | |
US20240106893A1 (en) | Filecoin cluster data transmission method and system based on remote direct memory access | |
CN106126465B (en) | A kind of data transmission method and device | |
CN107885509A (en) | A kind of neutral net accelerator chip framework based on safety | |
CN112286872A (en) | Medical image data sharing method and system based on block chain technology and interplanetary file system and readable storage medium | |
CN1092533A (en) | Software enciphering method that enciphered data is transmitted voluntarily and primary and secondary software security dog | |
CN113409144A (en) | Block chain data transaction method with privacy protection | |
Morici | Barring entry? China and the WTO | |
CN113014385A (en) | Double-port hardware network data encryption system and method | |
CN103678244B (en) | A kind of smart machine without using application processor | |
CN111638975A (en) | Data transmission method and system based on pipeline | |
CN102854862A (en) | Functional block with FF (foundation fieldbus) interface | |
CN111767036A (en) | Block chain platform capable of customizing business model | |
CN206388180U (en) | A kind of server with signature sign test function | |
CN100367215C (en) | Method for controlling data interchange | |
CN2372721Y (en) | Programmable software enciphered lock | |
WO2023128238A1 (en) | Blockchain-based primary product history management system | |
CN1286434A (en) | Encrypting card for secrete file -IDE data channel | |
WO2021215761A1 (en) | Private blockchain platform-based power transaction data storage system, and method for verifying and distributively storing power transaction data by using same | |
CN2257612Y (en) | IC card parallel fast read/write card | |
CN106375397A (en) | Consumption information back-up management system applied to big data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C06 | Publication | ||
PB01 | Publication | ||
C01 | Deemed withdrawal of patent application (patent law 1993) | ||
WD01 | Invention patent application deemed withdrawn after publication |