CN1092533A - Software enciphering method that enciphered data is transmitted voluntarily and primary and secondary software security dog - Google Patents

Software enciphering method that enciphered data is transmitted voluntarily and primary and secondary software security dog Download PDF

Info

Publication number
CN1092533A
CN1092533A CN 93119444 CN93119444A CN1092533A CN 1092533 A CN1092533 A CN 1092533A CN 93119444 CN93119444 CN 93119444 CN 93119444 A CN93119444 A CN 93119444A CN 1092533 A CN1092533 A CN 1092533A
Authority
CN
China
Prior art keywords
dog
bitch
sub
software
interface circuit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 93119444
Other languages
Chinese (zh)
Inventor
王定湖
陈丽琴
刘东朴
韩锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHONGJIAO TIANCHENG INFORMATION ENGINEERING Co BEIJING
Original Assignee
ZHONGJIAO TIANCHENG INFORMATION ENGINEERING Co BEIJING
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHONGJIAO TIANCHENG INFORMATION ENGINEERING Co BEIJING filed Critical ZHONGJIAO TIANCHENG INFORMATION ENGINEERING Co BEIJING
Priority to CN 93119444 priority Critical patent/CN1092533A/en
Publication of CN1092533A publication Critical patent/CN1092533A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention relates to software enciphering method and primary and secondary software security dog that a kind of enciphered data is transmitted automatically.During user's initial purchase software, give him a bitch, have corresponding encrypted content in the bitch.When buying second software, give him a sub-dog, have the encrypted content of corresponding second software in the sub-dog.After the user goes back, sub-dog is inserted on the computer parallel port, bitch is inserted in thereafter, on main frame, move a program then, power on to the parallel port, and send out a startup command to sub-dog, automatically set up communication link between the primary and secondary dog this moment, sub-dog is imported content wherein in the bitch into, and later program run is only carried out under the support of bitch.

Description

Software enciphering method that enciphered data is transmitted voluntarily and primary and secondary software security dog
The present invention relates to software enciphering method and primary and secondary software security dog that a kind of enciphered data is transmitted automatically, belong to field of computer technology.
Along with the development of computer software industry, the protection of Software Intellectual Property Rights has produced the very big market demand, several different methods such as disk encryption, hard card encryption, parallel port (serial port, keyboard mouth) encryption occurred.Wherein be installed in the software security dog (hereinafter to be referred as dongle) on the parallel port, easy for installation with it, do not take computer resource (promptly not influencing printing), and be subjected to user's welcome.The ultimate principle of dongle is: during encrypted running software; relevant circuit in the relevant signal wire gating dongle on the control parallel port; produce specific output; if this output valve is identical with expectation value in the program; think that then the user is a validated user; program can continue operation, otherwise just ends program run, thereby reaches the purpose of protection software.A software needs a software security dog in general, and for some professional software exploitation units, a user may divide several times, buys different software to it like this.If one of a software " dog ", then not only increased expense, and in use very inconvenient to the user, user or move a software and insert a dog, or all dogs are all plugged, on the parallel port, form a string.Sky city company, world company, U.S. Transend company, the trend company in Taiwan and the dongle of other company sold on the market now, all belong to this type of, though some company can give a plurality of file encryptions, when reality is used, there is inconvenience again, makes a concrete analysis of as follows:
Present software security dog will realize that a plurality of program encryptions are had two methods:
1, different users impose different encrypted contents, the software developer sets " dog " interior related content (this be worth between each user have nothing in common with each other) when user's initial purchase software, and this content record is preserved, when next time, this user bought new software, get final product with this content-encrypt again.Give software cryptography in this way, make after encrypting, to have nothing in common with each other same software, but also corresponding one by one with specific " dog ", bring very burden to software marketing and after sale service, software can't be carried out earlier in batches, can only now encrypt cash sale, quality can't guarantee.
When 2, requiring the old user to buy new software, its former dongle is brought on-the-spot in dog, the interpolation and the new corresponding fresh content of software.So not only sell to Software Production and bring problems, and nonlocal user is during buying new software, its original old software may can't not use because of there being " dog ".
The objective of the invention is to design a kind of primary and secondary software security dog and encryption method thereof that has data-transformation facility each other, with a software security dog same software developer is encrypted at the different software of different times exploitation, and software can be copied in batches, software security dog energy batch making, thereby make same software, each copy after the encryption all is the same, the softdog of same software too, be beneficial to production management, improve the quality of production, also be convenient to simultaneously sell and after sale service.
Content of the present invention is: the software enciphering method that enciphered data is transmitted is voluntarily finished by following each step:
(1) software of user's initial purchase company is then given him a bitch, has corresponding encrypted content in the bitch.This bitch is inserted on computer parallel port or the serial ports, can moves this software.
When (2) user buys second software, then give him a sub-dog, have the encrypted content of corresponding second software in the sub-dog.
(3) after the user goes back, sub-dog is inserted on computer parallel port or the serial ports, bitch is inserted in thereafter, and program of operation on main frame powers on to parallel or serial port then, and send out a startup command to sub-dog, at this moment, set up communication link automatically between son, the bitch, sub-dog is imported encrypted content wherein in the bitch into, this process must the main frame intervention, thereby has fabulous confidentiality.
(4) after sub-dog spreads out of the encrypted content in it, eliminate all the elements wherein automatically, realize the software protection purpose.
(5) encrypted content of first, second two softwares all deposits in the bitch, and the operation of later program only gets final product under the support of bitch.
If the user repurchases software for the third time, as long as the atom dog is taken back, change a new sub-dog, repeat said process and get final product.Like this, with a pair of primary and secondary dog, just can realize encryption to a plurality of different softwares.When software company adopts said method to encrypt, whenever go out a cover software, go out a sub-dog of software cryptography simultaneously, the encrypted content of same software is all the same, and all sub-dogs are all the same, are easy to like this ensure the quality of products.
In order to realize said method, the present invention has designed the primary and secondary software security dog that can transmit enciphered data automatically.Bitch comprises parallel or serial port (parallel or serial port that relates to the dongle ingredient all refers to and parallel port, plug or socket that serial ports is corresponding, and is as follows), data line, output interface circuit, input interface circuit, Single Chip Microcomputer (SCM) system and enciphered message memory.The control signal of coming from data line enters single-chip microcomputer through input interface circuit and does the identification processing.If normal running is then from enciphered message memory E 2Take out respective encrypted information among the PROM, export through output interface circuit; If not normal running, the single-chip microcomputer rerun routine that starts anew then.The structure of sub-dog and bitch is basic identical, is made up of parallel or serial port, data line, two cover input interface circuits, two cover output interface circuit, Single Chip Microcomputer (SCM) system and enciphered message memories etc.The data line of sub-dog is corresponding with the bitch data line, and sub-dog is linked with PC by parallel or serial port by the first cover input, output circuit interface, by another set of imput output circuit, is established a communications link with bitch by parallel or serial port.In the time of after bitch being inserted in sub-dog, the output interface circuit of sub-dog just in time links to each other with the input interface circuit of bitch, and the input interface circuit of sub-dog just in time links to each other with the output interface circuit of bitch.Program of operation powers on to parallel or serial port, and sends out a startup command to sub-dog on main frame, sets up communication link automatically between son, the bitch, and sub-dog is encrypted memory E 2Enciphered message in the PROM is imported in the enciphered message memory of bitch automatically.The operation of program later on only gets final product under bitch is supported, sub-dog only plays encrypted content and transmits medium.The user buys the 3rd, the 4th ... during individual software, only need sub-dog is taken back, change contain into corresponding to the 3rd, the 4th ... the sub-dog of the encrypted content of individual software is repeated above operating process and gets final product.
Description of drawings:
Fig. 1 is the bitch functional-block diagram.
Fig. 2 is sub-dog functional-block diagram.
Fig. 3 is sub-dog flowsheet.
Fig. 4 and Fig. 5 are respectively the circuit diagrams of bitch and sub-dog in the one embodiment of the invention.
Below in conjunction with accompanying drawing, introduce content of the present invention in detail.
Among Fig. 1, L 1, L 2, L 3Be any 3 in 8 data lines on the parallel port, L 1Give the each several part circuit supply in the bitch, L 2, L 3Be bitch control signal incoming line; L 4Be one of parallel port input state line, the enciphered message in the bitch is line input PC thus.E 2PROM is the enciphered message memory, from L 2, L 3The control signal that line comes through input interface circuit, enters in the single-chip microcomputer after single-chip microcomputer identification is handled, if normal running, then from E 2Take out respective encrypted information among the PROM, export through output interface circuit; If not normal running, single-chip microcomputer rerun routine from the beginning then.
L in the sub-dog of Fig. 2 1, L 2, L 3, L 4With the L in the bitch 1, L 2, L 3, L 4Corresponding to four same on parallel port signal wires, but L 2, L 3, L 4Be not communicated with at 25 stamen parallel or serial ports gap bridge.L 1For sub-dog circuit provides power supply, L 5, L 6Be two in the data line of parallel port, can with L 2, L 3Identical.L 7Be one in the parallel or serial port input state line, can same L 4The same bitch of sub-dog each several part circuit function, but sub-dog has two cover imput output circuits, sub-dog is set up contact by input interface circuit 1, output interface circuit 1 with PC: by output interface circuit 2, input interface circuit 2 establishes a communications link with bitch, from top narration as can be known, in the time of after bitch being inserted in sub-dog, the output interface circuit 2 of sub-dog just in time links to each other with the input interface circuit of bitch, and the input interface circuit 2 of sub-dog just in time links to each other with the output interface circuit of bitch.As seen PC can import relevant enciphered message in the enciphered message memory of sub-dog into through sub-dog IO interface 1.When being inserted with bitch thereon, sub-dog footpath can be transferred to enciphered message in the enciphered message memory on the bitch by input/output interface circuit circuit 2.Like this, bitch can be supported the operation of two or more different encryption softwares.
Fig. 4 and Fig. 5 are the bitch of one embodiment of the invention, sub-dog circuit diagram.Among Fig. 4, L 1, L 2Be the incoming line of input circuit, L 3Be the output line of output circuit, L 4Make power lead, L 5Be ground wire.Among Fig. 5, L 1, L 2Be the incoming line of input interface circuit 1, L 3Be the output line of output interface circuit, L 6Be the incoming line of input interface circuit 2, L 4, L 5Be the output line of output interface circuit 3, L 7As power lead, L 8Be ground wire.
Software enciphering method of the present invention and primary and secondary software security dog can be realized on the parallel or serial port of computing machine or keyboard mouth.

Claims (2)

1, the software enciphering method that transmits voluntarily of a kind of enciphered data is characterized in that adopting the following step:
(1) encrypted content with first software deposits in the bitch;
(2) encrypted content with second software deposits in the sub-dog;
(3) sub-dog is inserted on computer parallel port or the serial ports, bitch is inserted in thereafter, then program of operation on main frame, power on to parallel or serial port, and send out a startup command to sub-dog, and set up communication link automatically between son, the bitch, encrypted content imports in the bitch in the sub-dog;
(4) after sub-dog spreads out of the encrypted content in it, eliminate all the elements wherein automatically;
(5) encrypted content of first, second software all deposits in the bitch.
2, a kind of primary and secondary software security dog, it is characterized in that described bitch comprises parallel or serial port, data line, input interface circuit, output interface circuit, Single Chip Microcomputer (SCM) system and enciphered message memory, the control signal of from data line, coming, enter single-chip microcomputer through input interface circuit and do the identification processing, from widget, take out respective encrypted information then, export through output interface circuit; Described sub-dog comprises parallel or serial port, data line, two cover input interface circuits, two cover output interface circuit, Single Chip Microcomputer (SCM) system and enciphered message memories; The data line of sub-dog is corresponding with the bitch data line, sub-dog is linked with PC by parallel or serial port by a cover input, output interface circuit, establish a communications link with bitch by parallel or serial port by another set of input, output interface circuit, after both established a communications link, the enciphered message in the sub-dog widget was imported in the enciphered message memory of bitch.
CN 93119444 1993-10-29 1993-10-29 Software enciphering method that enciphered data is transmitted voluntarily and primary and secondary software security dog Pending CN1092533A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 93119444 CN1092533A (en) 1993-10-29 1993-10-29 Software enciphering method that enciphered data is transmitted voluntarily and primary and secondary software security dog

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 93119444 CN1092533A (en) 1993-10-29 1993-10-29 Software enciphering method that enciphered data is transmitted voluntarily and primary and secondary software security dog

Publications (1)

Publication Number Publication Date
CN1092533A true CN1092533A (en) 1994-09-21

Family

ID=4992920

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 93119444 Pending CN1092533A (en) 1993-10-29 1993-10-29 Software enciphering method that enciphered data is transmitted voluntarily and primary and secondary software security dog

Country Status (1)

Country Link
CN (1) CN1092533A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100346251C (en) * 2005-10-28 2007-10-31 武汉理工大学 Virtual software dog enciphering method
CN101291219B (en) * 2007-04-19 2010-08-18 北京深思洛克软件技术股份有限公司 Multiple encryption lock device and binding method of multiple encryption lock

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100346251C (en) * 2005-10-28 2007-10-31 武汉理工大学 Virtual software dog enciphering method
CN101291219B (en) * 2007-04-19 2010-08-18 北京深思洛克软件技术股份有限公司 Multiple encryption lock device and binding method of multiple encryption lock

Similar Documents

Publication Publication Date Title
CN106530088B (en) Method for trading certificate products based on blockchain security nodes
CN110659515B (en) Open type integrated circuit collaborative design cloud platform and method thereof
CN100573441C (en) Carry out the micro processor, apparatus and the method for index multiplication
CN108346110B (en) Information interaction system based on manufacturing block chain
CN112035879B (en) Information processing method and system for improving confidentiality of automatic logistics of cell
US20240106893A1 (en) Filecoin cluster data transmission method and system based on remote direct memory access
CN106126465B (en) A kind of data transmission method and device
CN107885509A (en) A kind of neutral net accelerator chip framework based on safety
CN112286872A (en) Medical image data sharing method and system based on block chain technology and interplanetary file system and readable storage medium
CN1092533A (en) Software enciphering method that enciphered data is transmitted voluntarily and primary and secondary software security dog
CN113409144A (en) Block chain data transaction method with privacy protection
Morici Barring entry? China and the WTO
CN113014385A (en) Double-port hardware network data encryption system and method
CN103678244B (en) A kind of smart machine without using application processor
CN111638975A (en) Data transmission method and system based on pipeline
CN102854862A (en) Functional block with FF (foundation fieldbus) interface
CN111767036A (en) Block chain platform capable of customizing business model
CN206388180U (en) A kind of server with signature sign test function
CN100367215C (en) Method for controlling data interchange
CN2372721Y (en) Programmable software enciphered lock
WO2023128238A1 (en) Blockchain-based primary product history management system
CN1286434A (en) Encrypting card for secrete file -IDE data channel
WO2021215761A1 (en) Private blockchain platform-based power transaction data storage system, and method for verifying and distributively storing power transaction data by using same
CN2257612Y (en) IC card parallel fast read/write card
CN106375397A (en) Consumption information back-up management system applied to big data

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C01 Deemed withdrawal of patent application (patent law 1993)
WD01 Invention patent application deemed withdrawn after publication