CN1504907A - Smart card with builtin version protector function - Google Patents
Smart card with builtin version protector function Download PDFInfo
- Publication number
- CN1504907A CN1504907A CNA021535701A CN02153570A CN1504907A CN 1504907 A CN1504907 A CN 1504907A CN A021535701 A CNA021535701 A CN A021535701A CN 02153570 A CN02153570 A CN 02153570A CN 1504907 A CN1504907 A CN 1504907A
- Authority
- CN
- China
- Prior art keywords
- software
- signal
- smart card
- interface
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention is a system to complete identifying user of software, including an input/output interface set in a host computer like a printer linkage port, and an intelligent interface coupled to the input/output interface as well as an intelligent card including: a memory module to store an computer identification signal of the software and a microcontroller to read a user identification signal by the intelligent interface, check if the user identification signal is identical with the computer identification signal, and when they are identical, send a confirm signal to start up the software.
Description
(1) technical field
The relevant a kind of smart card of the present invention is particularly about a kind of smart card (smart card) with function of built-in version protector (keypro).
(2) background technology
In the tradition, general application software or Games Software can adopt the design of version protector, come access to prevent unwarranted user.The version protector is to utilize an electronics EPROM (EEPROM) to write down some special data or identity (key).When the user imports user's verify data by a user interface (as keyboard), host computer will be via the verify data of checking that whether these user's verify datas are write down corresponding to the electronics EPROM, to confirm that the user is a legal user.
Yet stored verify data is easy to be duplicated by the people in the electronics EPROM, and moreover uses the virtual com port program just can crack the design of version protector easily.
(3) summary of the invention
The purpose of this invention is to provide a kind of storage device with the design of version protector, it can prevent unwarranted user's access data of safety, to reach the function of improving safeguard protection.
Above-mentioned purpose of the present invention can be finished by the smart card (smart card) of a built-in version protector function.According to a preferred embodiment of the present invention, a smart card interface, it is an I/O interface that is coupled to a host computer, as a printer connectivity port.This smart card interface is with the several feet position, comprises the data pin position (PD0-7) that SCPSNT (smart card present detection Schmitt-trigger input), SCIO (smart card dataI/O channel), SCPWR (smart card power control), SCCLK (smart card clock output) and SCRST (smart card reset output) are coupled to the printer connectivity port respectively.When a software starts, just user's verify data (it comprises software sequence number or the password that the user inputs) of encrypting can be sent to smart card via printer connectivity port and smart card interface on a host computer.This smart card comprises a memory module, wherein the storing software verify data.This smart card comprises a microcontroller, and it is to read this user's verify data by the smart card interface, and checks that whether this user's verify data conforms to the software authentication data, and the result that will check passes software back.If the result who checks is for passing through, executive software smoothly then; If the result who checks is failure, then software can close or the function of software self is pinned, mustn't user's access.
Above-mentioned advantage and feature with other of the present invention, the detailed description by the following examples conjunction with figs. can obtain more deep understanding.
(4) description of drawings
Fig. 1 shows the smart card interface of a preferred embodiment of the present invention and the synoptic diagram of pin position thereof; And
Fig. 2 shows that the smart card interface of this preferred embodiment is connected the synoptic diagram of configuration with the pin position between the printer connectivity port.
(5) embodiment
To illustrate by preferred embodiment in order to the smart card of specializing built-in version protector function of the present invention.See also Fig. 1 and Fig. 2, in a preferred embodiment of the present invention, a smart card interface 11 (it typically is a card reader) is to be installed on the I/O interface of a host computer (not shown), as a printer connectivity port 12.This smart card interface 11 has several GPIO ports, is the 7th GPIO port at smart card interface 11 and the several feet position that belongs to the 7th GPIO port yet the present invention was concerned about.As shown in Figure 1, the some of eight data pin positions (PD0-7) of printer connectivity port 12 is to combine with the several feet position that belongs to the 7th GPIO port at smart card interface 11, makes it to become multi-function pin.The several feet position that belongs to the 7th GPIO port comprises SCPSNT (smart card present detectionSchmitt-trigger input, it is for detecting the pin position whether smart card inserts the smart card slot), SCIO (smart card data I/O channel, it is the pin position of 12 Data transmission of smart card and printer connectivity port), SCPWR (smart card power control, it sets the pin position for the smart card startup power supply), SCCLK (smart card clock output, it is smart card clock pulse output pin position) and SCRST (smart card reset output, it resets the pin position for the smart card power supply), they are the PD5 that are coupled to printer connectivity port 12 respectively, PD4, PD1, data such as PD2 and PD3 pin position.When a software program started on main frame, software just via the PD4 data pin position of printer connectivity port 12 and the SCIO pin position at smart card interface 11, was passed to smart card with user's authentication signal that the user imported.
In this preferred embodiment, smart card comprises a memory module (not shown), and it stores an authentication computer signal of this software, and it comprises a sequence number of this software at least.Smart card also comprises a microcontroller (not shown), and it is to read the user's authentication signal that sends from printer connectivity port 12 by smart card interface 11, and checks whether user's authentication signal conforms to the authentication computer signal.If microcontroller will send a confirmation signal to confirm that the user is a legal user and starts software; If not, microcontroller will send a shutdown signal to cut out the execution of software.Therefore, user's certification work of software will be carried out by smart card, if check signal that smart card responds for by or failure judge user's legitimacy.
Can promptly be understood by above explanation, the present invention utilizes the security check function of smart card itself to realize the version protector function of software, carries out so that smart card is transferred in the work of the safety inspection of software fully.And the response that software only need be checked smart card for by or failure can judge whether this user is a legal user, and need not worry that the software authentication data are replicated or the function of software protection is cracked.
Claims (9)
1. safety check system that is used for a software is characterized in that it comprises:
One I/O interface is arranged on the host computer;
One IC-card interface is coupled to this I/O interface; And
One IC-card, it stores an authentication computer signal of this software, in order to this IC-card interface certainly to read user's authentication signal that this software sends, and check whether this user's authentication signal conforms to this authentication computer signal, and when this user's authentication signal conforms to this authentication computer data-signal, send a confirmation signal to start this software.
2. the system as claimed in claim 1 is characterized in that, this I/O interface is to be a printer connectivity port.
3. the system as claimed in claim 1 is characterized in that, this IC-card interface is to be a card reader.
4. the system as claimed in claim 1 is characterized in that, this authentication computer signal comprises a sequence number of this software at least.
5. method in order to the security of checking a software is characterized in that it comprises:
An I/O interface that is arranged on the host computer is provided;
An one IC-card interface that is coupled to this I/O interface is provided;
One IC-card of an authentication computer signal that stores this software is provided;
Whether inspection conforms to this authentication computer signal from user's authentication signal that this software sent; And
If this user's authentication signal conforms to this authentication computer signal, send a confirmation signal to start this software.
6. method as claimed in claim 5 is characterized in that, also comprises the following step:
If this user's authentication signal and this authentication computer signal are not inconsistent, send a shutdown signal to close this software.
7. method as claimed in claim 5 is characterized in that, this I/O interface is to be a printer connectivity port.
8. method as claimed in claim 5 is characterized in that, this IC-card interface is to be a card reader.
9. method as claimed in claim 5 is characterized in that, this authentication computer signal comprises a sequence number of this software at least.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA021535701A CN1504907A (en) | 2002-11-28 | 2002-11-28 | Smart card with builtin version protector function |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA021535701A CN1504907A (en) | 2002-11-28 | 2002-11-28 | Smart card with builtin version protector function |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1504907A true CN1504907A (en) | 2004-06-16 |
Family
ID=34235197
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA021535701A Pending CN1504907A (en) | 2002-11-28 | 2002-11-28 | Smart card with builtin version protector function |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1504907A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080256629A1 (en) * | 2007-04-13 | 2008-10-16 | Silicon Motion, Inc. | Management Apparatus, System, and Method for Protecting a Memory Storage Card |
CN101533372B (en) * | 2008-03-13 | 2011-04-13 | 智旺科技股份有限公司 | Data accessing system |
CN101533373B (en) * | 2008-03-13 | 2011-04-13 | 智旺科技股份有限公司 | Data accessing system |
-
2002
- 2002-11-28 CN CNA021535701A patent/CN1504907A/en active Pending
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080256629A1 (en) * | 2007-04-13 | 2008-10-16 | Silicon Motion, Inc. | Management Apparatus, System, and Method for Protecting a Memory Storage Card |
CN101533372B (en) * | 2008-03-13 | 2011-04-13 | 智旺科技股份有限公司 | Data accessing system |
CN101533373B (en) * | 2008-03-13 | 2011-04-13 | 智旺科技股份有限公司 | Data accessing system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100492324C (en) | Partition access control system and method for controlling partition access | |
CN101324912B (en) | Credible safety computer | |
CN100378609C (en) | Method and apparatus for unlocking a computer system hard drive | |
JP3613687B2 (en) | PC card for microcomputer | |
US7461264B2 (en) | Method for automatic identification control and management | |
CN100557617C (en) | SD storage card by hardware to identifying identification | |
US20080246583A1 (en) | Access Control System | |
CN101373437A (en) | Accessing safety memory by embedded controller to increase system safety | |
Hung et al. | Design and implementation of a door lock control based on a near field communication of a smartphone | |
CN100446021C (en) | Method of realizing intelligence cryptographic key set of fingerprint for multiple users to use | |
CN1971575A (en) | An identity control method based on credibility platform module and fingerprint identifying | |
CN101833676B (en) | Method for controlling reading and writing of intelligent card with USBKEY module and reader thereof | |
CN101673330A (en) | BIOS-based computer security protection method and system | |
CN101211651A (en) | USB status restriction equipment and method of use thereof | |
CN201397508Y (en) | Stand-alone terminal secure login and monitoring device | |
US8429419B2 (en) | Method for securing authorized data entry and the device to perform this method | |
CN101560852A (en) | Fingerprint opening system for guesthouse and fingerprint door lock thereof | |
CN103226856B (en) | Multi-identification based security system | |
CN102013026B (en) | A kind of smart card dynamic password Verification System and smart card dynamic password authentication method | |
CN108416217A (en) | A kind of SCM Based computer motherboard BIOS authentication system and method | |
CN1504907A (en) | Smart card with builtin version protector function | |
CN103593596A (en) | USB KEY for collecting external biological characteristics | |
KR20060104268A (en) | Private verification and storage device using usb | |
CN1333348C (en) | Method for protecting portable cryptographic storage device of containing biological identification and stored data | |
CN202306708U (en) | Hand-held ATM (automatic teller machine) terminal and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20040616 |