CN1584771A - Software encrypting method - Google Patents

Software encrypting method Download PDF

Info

Publication number
CN1584771A
CN1584771A CN 200410042777 CN200410042777A CN1584771A CN 1584771 A CN1584771 A CN 1584771A CN 200410042777 CN200410042777 CN 200410042777 CN 200410042777 A CN200410042777 A CN 200410042777A CN 1584771 A CN1584771 A CN 1584771A
Authority
CN
China
Prior art keywords
software
file
mainboard
algorithm
computing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200410042777
Other languages
Chinese (zh)
Inventor
翁金宏
李嘉伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hongyu Science & Technology Co Ltd Shenzhen City
Original Assignee
Hongyu Science & Technology Co Ltd Shenzhen City
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hongyu Science & Technology Co Ltd Shenzhen City filed Critical Hongyu Science & Technology Co Ltd Shenzhen City
Priority to CN 200410042777 priority Critical patent/CN1584771A/en
Publication of CN1584771A publication Critical patent/CN1584771A/en
Pending legal-status Critical Current

Links

Abstract

A method for enciphering software includes setting file F into computer installing software C and binding execution file of software C fetching host board ID number from host board BIOS by file F, and detecting consistency of host board ID number to host board ID number set in file F for enciphering software.

Description

The encryption method of software
Technical field the present invention relates to a kind of encryption method of software, more particularly, relates to a kind of the realization and encrypt under DOS, protects own software not by the encryption method of bootlegging by ID number encryption method of duplication check computer motherboard.
Background technology in the prior art, the encryption method of existing various computer softwares, mainly contain the Dongle enciphered method, the floppy disk encryption method, the plug-in card enciphered method, password encryption method etc., but all there is weak point in above-mentioned various enciphered method: it is to add a special encryption lock on the LPT of computing machine or on the USB mouth that dongle is encrypted, during software startup in encryption lock the verification secret value whether consistent, if it is inconsistent or do not have encryption lock software out of service, when the consistent running software of verification secret value continues, this encryption method security is relatively good, operation is also convenient, but relative cost increases to some extent, and dongle is made troubles than being easier to lose to work the client there; To arrive when the floppy disk encryption method is software startup and read corresponding data in the floppy disk, software carries out a series of computing and confirms that whether this data value is own needed value then, determine software startup or withdraw from, it is low that this technology is encrypted cost than dongle, result in hand cramps to the user but floppy disk is damaged easily, because now the existing suitable floppy disk of understanding of this encryption mechanism is replicated easily, security is also not ideal enough; It is to plug the special encrypted card of a slice on the slot of computer-internal that the plug-in card examination is encrypted, software also will remove the verification secret value in encrypted card when starting or move, judge with whether predetermined value is consistent and determine whether to start software, this encryption method security is better, but take the resource of computing machine, it is cumbersome that installation will be opened computer cabinet, and cost is also higher; The password encryption method is the password that software prompting when starting or move will be inputed an appointment, and the software verification determined whether to start software afterwards, and this encryption method will be inputed password, bring operational trouble, password runs off easily, and software duplicates easily, thereby security is low, is difficult to management.
Summary of the invention the object of the present invention is to provide a kind ofly realize to be encrypted under DOS, by globally unique hardware ID on the duplication check computer hardware number, thus the purpose that reaches safe handling, is not replicated.
In order to achieve the above object, the utility model provides following technical scheme: the encryption method that adopts a kind of software, under DOS, realize encrypting, on mainboard, read ID number, store, compare and exchange by the quick computing of chip CPU and by its internal memory, this encryption method is by file F being inserted among the computing machine install software C and binding the execute file of software C, file F reads ID number of mainboard from mainboard BIOS, and detects simultaneously ID number of mainboard and realize with the mainboard ID in file F that inserts number consistance.The present invention is to provide that globally unique hardware ID on a kind of duplication check computer hardware number encrypts, hardware ID is number inconsistent in case software is replicated also can't use, the encryption strength height, all cryptographic check processes are not finished automatically need carry out any setting again, use and simply be convenient to operation, do not need to increase in addition a kind of encryption method of hardware cost.The technical matters of all solutions of the present invention is exactly to allow claimed software all will go ID number of verification hardware automatically when each the startup and whether the hardware ID be scheduled to number is consistent determines whether starting operating software.
The present invention's technical scheme preferably is: ciphering process comprises the steps: that (1) move machine code fetch program A on computers, read mainboard ID number in the mainboard BIOS, and generate the file A1 that constitutes by mainboard ID number, (2) send to software company with file A1 then, software company is according to file A1 computing machine authoring program B, generate to authorize by algorithm S1 that the back is unique to be suitable for the file F of this computing machine and to preset operation result X2 based on A1 simultaneously, file F has the function of algorithm S1 simultaneously when operation, (3) are inserted file F among the computing machine install software C and are bound the execute file of software C again, provide the user software C after authorizing, this program of (4) user installation authorizes the unique applicable documents F in back to install on computers generating by algorithm S1 simultaneously at last.That is to say that the user moves machine code fetch program A on the computing machine of desire mandate, promptly read in the mainboard BIOS globally unique mainboard ID number, and generate the file A1 that constitutes by mainboard ID number.The user sends to software company with A1, mainboard ID number the file A1 that software company provides according to the user, with computing machine authoring program B, generate the file F that authorizes unique suitable this computing machine in back and be both the operation result X2 that presets based on A1 by algorithm S1, file F has the function of algorithm S1 simultaneously when operation.File F is inserted among the computing machine install software C of the said firm and bind the execute file of software C, send the user software C after authorizing, the user authorizes the unique file F that is suitable for this computing machine in back to install on computers generating by algorithm S1 after this installation procedure installation of operation simultaneously.
The present invention's technical scheme preferably also can be: make parameter with described ID number during the operation computing machine, by algorithm S1 computing once more, draw operation result X1, and make comparisons with the operation result X2 that inserts in advance, software authentication success when X1 equals X2, the normal computer software that starts, software withdrawed from automatically when X1 was not equal to X2.
Method of the present invention can only be moved on the hardware of appointment, when hardware is different then its ID number also different, read hardware ID number when running software, and the result who presets based on the result who generates for this ID number and software company is also with different, software will withdraw from automatically when two values are unequal; Method of the present invention, install at software exactly and move on on the other machine after the back adopts the whole dish of hard disk to duplicate, also started encrypt file F when starting computer software simultaneously, and whether ID number of detecting mainboard simultaneously be consistent with the mainboard ID in F that inserts number, authentication success when finding unanimity normally starts software; Authentification failure when inconsistent withdraws from startup.This encryption method is to adopt the whether consistent software security of protecting of result that duplication check number generates based on hardware ID; software is no matter start how many times; the verification work of doing that same repetition is all done in each startup is exactly in order to refuse bootlegging, thereby has really realized the protection to software up hill and dale.This encryption method is to adopt the encryption method of self duplication check hardware unique ID number, and the encryption method cost that increases hardware than traditional needs in addition is much lower, because all verifications just finish at software inhouse, thereby brings many convenience to the user.
Compared with prior art, the present invention has following tangible advantage: because encryption method of the present invention is to adopt the encryption method of self duplication check hardware unique ID number, in case software is replicated, also can't use because hardware ID is number inconsistent, thereby the privacy degrees height; All cryptographic check processes are finished automatically, need not carry out any setting again, thereby easy to use, simple to operate; Owing to do not need additionally to increase hardware.Thereby it is with low cost, easy to implement.
Be description of drawings of the present invention below the description of drawings:
Fig. 1 is the computation process block diagram that the present invention encrypts setting;
Fig. 2 is encryption method of the present invention and process block diagram.
With reference to Fig. 1, computational process is: file A1 consists of by mainboard ID number, and file A1 adds Upper arbitrarily code multiply by the long-pending of A1, and another any code that deducts setting multiply by the long-pending of A1, adds above Part A1 adds the remainder that file A1 deducts above-mentioned two any codes, gets the concrete operation result (X1).
With reference to Fig. 2, ciphering process comprises the steps: the first step: the user is at the meter of wish mandate Operation machine code fetch program A reads among this computer motherboard BIOS the whole world only on the calculation machine One mainboard ID, and generate ID file A1, this step is exactly under the C dish prompt under DOS Operation program A, program A just pass through the computing of CPU directly the program branch in the mainboard BIOS Copy accurately the computing base by CPU again after copying for ID number that opens for mainboard Generate a file A1 in this ID number. The user sends to software company with this file; The Two steps: the file A1 that software company provides according to user computer authoring program B, by Unique file F that is suitable for this computer after algorithm S1 generates and authorizes, this step is exactly the software public affairs (program B calls algorithm for the file that the user provides to the operation computer authoring program B of department And the program of ordering algorithm to be obtained a result according to certain rule computing), provide according to the user ID in the mainboard ID file, (algorithm S1 is exactly the ID file of mainboard according to the algorithm of S1 A1 adds that A1 multiply by any code long-pending deduct another arbitrarily code multiply by A1 the long-pending A1 of adding again Add A1 deduct two arbitrarily the remainder of code be exactly operation result X2) obtain a result, and this Individual result and algorithm S1 together tie up and form a file F, and write in the F file Each startup all will call and move S1 and directly read the ID in the mainboard simultaneously and transport by S1 Calculate the result, whether the computing result of verification and binding consistent and judge again, unanimously will to The execute file of software C sends starting command, inconsistent will sending to the execute file of software C The order of the program that withdraws from is inserted this file F among the software C again, and is same in inserting process The time and the binding of the execute file of software C (binding writes generation exactly in the execute file of software C Code, the meaning of code are exactly as execute file while startup file F when carrying out the operation startup, If do not find file F or file F in running the judgement value to returning one with mistake Whether individual information also orders the execute file of software C to continue to carry out), allow software C open at every turn Move simultaneously file F during moving operation execute file, if software C also when not finding file F Automatically stop, unanimously will allowing software C continue to move when file F finds the verification result, when Find to order the execute file of software C to stop when inconsistent at once, thereby stop the fortune of software OK; The 3rd step was exactly to give the user software after encrypting, and restarted meter behind user's installation software The calculation machine at once execute file of operating software C moves encrypt file F simultaneously, and F is according to predetermined Process is carried out down, reads earlier ID number in the mainboard BIOS, and passes through the S1 computing with computing Result and the result of earlier binding make comparisons, and judge whether to allow software C start again.
By specific embodiment the present invention is carried out more detailed description below the embodiment:
Embodiment 1
The mainboard ID of computing machine number is 12, computing machine fetch program A just duplicates down and generates a file accurately at the ID of the following mainboard of computing of CPU numbers 12, the client sends software company the file that is 12 for ID number, software company is authorized with authoring program B according to the file that is 12 for ID number, authoring program B calls algorithm S1 at the ID file that is 12, S1 carries out following computing according to own operation rule: 12 add 12 multiply by any sign indicating number 3 long-pendingly deduct 12 again and multiply by another amassing of sign indicating number 2 arbitrarily, add 12 add 12 deduct two arbitrarily the remainders of sign indicating number 2 and 3 be exactly the value that we want, its computing formula is: 12+12 * 3-12 * 2+12+ (12-3-2)=43,43 is exactly the value that we want; Be this that 43 value together generates a file F together with algorithm S1 then, and allow F possess in operational process, oneself to go ID number of reading mainboard call algorithm S1 according to top algorithm once more the value that draws of computing whether be 43 also, whether be the function of all giving an order to the software execute file; Again file F is presented in the software C, write code in the execute file in software C simultaneously, code possesses: the execute file command file F of software starts operation when software startup, the result of file F operation judges and gives an order and feeds back to execute file by code, execute file receives orders and just makes the function of the decision that startup still withdraws from, give the client encrypting good software again, the client is installed to the execute file that restarts computing machine horse back operating software C on the computing machine to software and also moves encrypt file F simultaneously, F carries out down according to predefined procedure, read ID number in the mainboard BIOS earlier, whether and by the S1 computing operation result and the value that presets earlier to be made comparisons be 43 also, and this judged result is sent to the execute file of software C, be to allow software C start, be not to make software out of service, each startup all repeats this process.
When need changing hardware, the user must allow software company know and could use at new hardware mandate again.Software crash but hardware and do not become, and the user is as long as reinstalled software so.So both effectively protected software security, simultaneously also convenient for users.

Claims (3)

1, a kind of encryption method of software, under DOS, realize encrypting, on mainboard, read ID number, store, compare and exchange by the quick computing of chip CPU and by its internal memory, it is characterized in that: encryption is by file F being inserted among the computing machine install software C and binding the execute file of software C, file F reads ID number of mainboard from mainboard BIOS, and detects simultaneously ID number of mainboard and realize with the mainboard ID in file F that inserts number consistance.
2, encryption method according to claim 1, it is characterized in that: ciphering process comprises the steps:
(1) moves machine code fetch program A on computers, read mainboard ID number in the mainboard BIOS, and generate the file A1 that constitutes by mainboard ID number, then
(2) file A1 is sent to software company, software company is according to file A1 computing machine authoring program B, generate to authorize the unique applicable documents F in back and preset operation result X2 based on A1 simultaneously by algorithm S1, file F has the function of algorithm S1 simultaneously when operation, again
(3) file F is inserted among the computing machine install software C and bind the execute file of software C, provide the user software C after authorizing, last
(4) this program of user installation authorizes the unique applicable documents F in back to install on computers generating by algorithm S1 simultaneously.
3, encryption method according to claim 1 and 2, it is characterized in that: make parameter with described ID number during the operation computing machine, by algorithm S1 computing once more, draw operation result X1, and make comparisons with the operation result X2 that inserts in advance, the software authentication success normally started computer software when X1 equaled X2, and software withdrawed from automatically when X1 was not equal to X2.
CN 200410042777 2004-05-27 2004-05-27 Software encrypting method Pending CN1584771A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200410042777 CN1584771A (en) 2004-05-27 2004-05-27 Software encrypting method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200410042777 CN1584771A (en) 2004-05-27 2004-05-27 Software encrypting method

Publications (1)

Publication Number Publication Date
CN1584771A true CN1584771A (en) 2005-02-23

Family

ID=34601668

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200410042777 Pending CN1584771A (en) 2004-05-27 2004-05-27 Software encrypting method

Country Status (1)

Country Link
CN (1) CN1584771A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010048852A1 (en) * 2008-10-27 2010-05-06 国民技术股份有限公司 Method for binding application and storage device
CN102054135B (en) * 2009-11-06 2013-07-10 北大方正集团有限公司 Software authorization method and device
CN108876538A (en) * 2018-06-19 2018-11-23 北京多采多宜网络科技有限公司 A kind of order information processing method
CN109902453A (en) * 2019-02-22 2019-06-18 山东欧德利电气设备有限公司 A kind of software enciphering method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010048852A1 (en) * 2008-10-27 2010-05-06 国民技术股份有限公司 Method for binding application and storage device
CN102054135B (en) * 2009-11-06 2013-07-10 北大方正集团有限公司 Software authorization method and device
CN108876538A (en) * 2018-06-19 2018-11-23 北京多采多宜网络科技有限公司 A kind of order information processing method
CN109902453A (en) * 2019-02-22 2019-06-18 山东欧德利电气设备有限公司 A kind of software enciphering method

Similar Documents

Publication Publication Date Title
JP6239788B2 (en) Fingerprint authentication method, apparatus, intelligent terminal, and computer storage medium
CN101689237B (en) Activation system architecture
US10992480B2 (en) Method and system for performing a transaction and for performing a verification of legitimate access to, or use of digital data
CN100495421C (en) Authentication protection method based on USB device
US20080022086A1 (en) Methods and system for a key recovery plan
US20060053302A1 (en) Information processing apparatus with security module
CN101311950A (en) Electronic stamp realization method and device
CN101106455A (en) Identity authentication method and intelligent secret key device
CN104951701B (en) A kind of method of the terminal device booting operating system based on USB controller
CN102508791A (en) Method and device for encrypting hard disk partition
CN101529366A (en) Identification and visualization of trusted user interface objects
CN104463554A (en) Electronic seal achieving method and device
JP2004013744A (en) Issuing system for digital content and issuing method
CN109598104B (en) Software authorization protection system and method based on timestamp and secret authentication file
EP1949220A2 (en) Software-firmware transfer system
CN104537282B (en) It is a kind of that method is licensed based on encryption flash memory disk and big data computing
CN112486607B (en) Virtual desktop authorization permission method based on combination of software and hardware
CN100444184C (en) Method and system of software identify identification
KR20080087917A (en) System for certify one-time password, system for issue a seed, and method for generating one-time password
CN101447009A (en) Method, device and system for installing software
CN113901401A (en) Terminal software authorization system and method based on machine fingerprint and USBKey
CN102033820A (en) Flash memory device and network authentication method thereof
TWI428752B (en) Electronic file delivering system, portable communication apparatus with decryption functionality, and related computer program product
CN1584771A (en) Software encrypting method
CN101562523B (en) Security certification method applied on mobile storage device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication