CN1897005A - Protector against software running in non-authority computer - Google Patents
Protector against software running in non-authority computer Download PDFInfo
- Publication number
- CN1897005A CN1897005A CN 200610010916 CN200610010916A CN1897005A CN 1897005 A CN1897005 A CN 1897005A CN 200610010916 CN200610010916 CN 200610010916 CN 200610010916 A CN200610010916 A CN 200610010916A CN 1897005 A CN1897005 A CN 1897005A
- Authority
- CN
- China
- Prior art keywords
- key
- protection device
- software
- protection
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
A protection device for avoiding software to be operated on no authorized computer consists of key element for storing private key of asymmetric enciphering algorithm and for operating asymmetric enciphering algorithm, protection element containing software code of asymmetric enciphering algorithm and public key of said algorithm for weaving woven-in component into protected software code to protect software, weaving in element for using publicly known algorithm to generate public key and private key pair of asymmetric enciphering algorithm and writing them separately in protection and key elements.
Description
Technical field:
The present invention relates to a kind of protective device of running software on non-authority computer that be used to prevent, belong to the software protection field.
Background technology:
Software Protection Technique is to prevent that unauthorized user from illegally using the technology of software, and Software Protection Technique reaches the purpose that protection software is not illegally used by technological means.
Present widely used Software Protection Technique mainly is to use sequence number protection, and this mode is easy to be cracked.Multiple method of encrypting also is used to software protection, and diverse ways respectively has quality.
Summary of the invention:
The object of the present invention is to provide and a kind ofly protect good being used to of effect to prevent the protective device of running software on non-authority computer.
Protective device of the present invention is by key device (5), protection device (3) and inweave device (1) formation, and the protection step of this protective device is as follows:
Step 1: inweave device (1) and use PKI (2), the private key (4) of known algorithm generation rivest, shamir, adelman right, and with in PKI (2) and private key (4) difference write protection device (3) and the key device (5);
Step 2: protection device (3) is a software code of finishing defencive function, wherein includes the PKI (2) of rivest, shamir, adelman and the software code of rivest, shamir, adelman.Protection device (3) will be inweaved device (1) and be inweaved in the protected software code (6), provide protection for it in the time of in protected software code (6) operation on computers;
Step 3: key device (5) is used to deposit the private key (4) and the operation rivest, shamir, adelman of rivest, shamir, adelman;
Step 4: inweave device (1) and be chosen in and inweave inweaving position a little and inweaving method of protection device (3) in the protected software code (6), a plurality of key points in protected software code (6) inweave protection device (3), making protection device (3) and protected software code (6) become one indivisible or be difficult to cuts apart, in protected software code (6), inweave after the protection device (3), generate the preceding code (7) of issue;
Step 5: code (7) forms releasing software (8) through compiling or after compiling before the issue, and releasing software (8) has comprised protected software code (6) and protection device (3) code that is woven together;
Step 6: key device (5) links together in the running environment of releasing software (8) with protection device (3); in the running environment of releasing software (8); authentication between key device (5) and the protection device (3) uses the authentication algorithm of known rivest, shamir, adelman to carry out each other authentication; the PKI of rivest, shamir, adelman (2) is kept in the protection device (3), and the calculating process that has PKI (2) to participate in is finished in protector (3) part.The private key of rivest, shamir, adelman (4) is kept in the key device (5), and the calculating process that has private key (4) to participate in is finished in key device (5);
Step 7: when releasing software (8) ran to the protection device (3) that inweaves a place, protection device (3) will be randomly carried out each other authentication with key device (5), if authentication is passed through, releasing software (8) continues operation, otherwise stops operation.
Key device of the present invention (5) uses the Intelligent key of existing USB interface, comprises the intelligent card chip that rivest, shamir, adelman (as RSA Algorithm) can be provided in the Intelligent key.Intelligent card chip can guarantee to be stored in the safety of the private key (4) of its inner cryptographic algorithm.The cryptographic operation that has private key (4) to participate in is all finished in intelligent card chip inside, and private key (4) can not be read by the equipment beyond the intelligent card chip.
The device (1) that inweaves of the present invention inweaves algorithm in the protected software code (6) to protection device (3) and has a variety ofly, and the good more protection device of algorithm (3) is difficult to cut apart with protected software code (6) more.A kind of method that optionally inweaves is to inweave protection device (3) at the crucial function entrance place of protected software code (6).Have different braiding algorithms for different programming languages, the braiding algorithm that has is that the source program code of software is operated, and the algorithm that has can be operated object code.If use the braiding algorithm that the source program code of software is operated, before finishing and generate issue, braiding after the code, code (7) before the issue need be compiled, generate releasing software (8).If use the braiding algorithm that object code is operated, code (7) is releasing software (8) before the issue that braiding generates.
The present invention has that the protection effect is good, advantage such as be difficult for being cracked.
Description of drawings:
Fig. 1 is a protective device structure connection diagram.
Fig. 2 generates key to process flow diagram for inweaving device (1).
Fig. 3 generates the preceding code flow figure of issue for inweaving device (1).
Checking process figure when Fig. 4 is protection device (3) operation.
Specific implementation method:
Be used to prevent the protective device of running software on non-authority computer by key device (5), protection device (3) with inweave device (1) and constitute, the protection step of this protective device is as follows:
1. use inweaves device (1) generation PKI (2), private key (4) is right;
2. use to inweave device (1) PKI (2) is deposited in the protection device (3), private key (4) is deposited in the key device (4);
3. use inweaves device (1) and protected software code (6) and protection device (3) is woven together code (7) before the formation issue;
4. code (7) forms releasing software (8) through compiling or after compiling before the issue, and releasing software (8) has comprised protected software code (6) and the protection device code that is woven together, and the releasing software code is distributed to software users;
5. key apparatus is distributed to the software users of mandate, key apparatus and releasing software (8) by different by way of being distributed to authorized user;
6. the software users that is authorized to has releasing software (8) and key apparatus simultaneously, when using software, key apparatus must be inserted the corresponding I/O interface of the computing machine of operating software;
7. in releasing software (8) when operation, will be carried out each other authentication with key device (5), if authentication is passed through, releasing software (8) continues operation, otherwise stops operation.
The present invention shows through use, reaches designing requirement fully.
Claims (1)
1. one kind is used to prevent the protective device of running software on non-authority computer, and this protective device is by key device (5), protection device (3) and inweave device (1) formation, it is characterized in that the protection step of protective device is as follows:
Step 1. inweaves device (1) and uses PKI (2), the private key (4) of known algorithm generation rivest, shamir, adelman right, and with in PKI (2) and private key (4) difference write protection device (3) and the key device (5);
Step 2. protection device (3) is a software code of finishing defencive function, wherein includes the PKI (2) of rivest, shamir, adelman and the software code of rivest, shamir, adelman.Protection device (3) will be inweaved device (1) and be inweaved in the protected software code (6), provide protection for it in the time of in protected software code (6) operation on computers;
Step 3. key device (5) is used to deposit the private key (4) and the operation rivest, shamir, adelman of rivest, shamir, adelman;
Step 4. inweaves device (1) and is chosen in and inweaves inweaving position a little and inweaving method of protection device (3) in the protected software code (6), a plurality of key points in protected software code (6) inweave protection device (3), making protection device (3) and protected software code (6) become one indivisible or be difficult to cuts apart, in protected software code (6), inweave after the protection device (3), generate the preceding code (7) of issue;
Code (7) forms releasing software (8) through compiling or after compiling before step 5. issue, and releasing software (8) has comprised protected software code (6) and protection device (3) code that is woven together;
Step 6. key device (5) links together in the running environment of releasing software (8) with protection device (3); in the running environment of releasing software (8); authentication between key device (5) and the protection device (3) uses the authentication algorithm of known rivest, shamir, adelman to carry out each other authentication; the PKI of rivest, shamir, adelman (2) is kept in the protection device (3), and the calculating process that has PKI (2) to participate in is finished in protector (3) part.The private key of rivest, shamir, adelman (4) is kept in the key device (5), and the calculating process that has private key (4) to participate in is finished in key device (5);
When step 7. releasing software (8) ran to the protection device (3) that inweaves a place, protection device (3) will be randomly carried out each other authentication with key device (5), if authentication is passed through, releasing software (8) continues operation, otherwise stops operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200610010916 CN1897005A (en) | 2006-05-23 | 2006-05-23 | Protector against software running in non-authority computer |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200610010916 CN1897005A (en) | 2006-05-23 | 2006-05-23 | Protector against software running in non-authority computer |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1897005A true CN1897005A (en) | 2007-01-17 |
Family
ID=37609530
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200610010916 Pending CN1897005A (en) | 2006-05-23 | 2006-05-23 | Protector against software running in non-authority computer |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1897005A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101398879B (en) * | 2007-09-25 | 2011-04-27 | 联想(北京)有限公司 | Software authentication method |
CN101533454B (en) * | 2009-04-14 | 2011-12-28 | 飞天诚信科技股份有限公司 | Compiling method |
CN101446905B (en) * | 2008-12-29 | 2012-06-27 | 飞天诚信科技股份有限公司 | Method for compiling and compiler |
CN103177222A (en) * | 2011-12-23 | 2013-06-26 | 腾讯科技(深圳)有限公司 | Processing method for file shell adding and shell removing and device thereof |
CN104899480A (en) * | 2015-05-05 | 2015-09-09 | 易兴旺 | Software copyright protection and management method based on combined public key identity authentication technology |
CN112579989A (en) * | 2020-12-23 | 2021-03-30 | 杭州安司源科技有限公司 | Anti-piracy method for network service software |
-
2006
- 2006-05-23 CN CN 200610010916 patent/CN1897005A/en active Pending
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101398879B (en) * | 2007-09-25 | 2011-04-27 | 联想(北京)有限公司 | Software authentication method |
CN101446905B (en) * | 2008-12-29 | 2012-06-27 | 飞天诚信科技股份有限公司 | Method for compiling and compiler |
CN101533454B (en) * | 2009-04-14 | 2011-12-28 | 飞天诚信科技股份有限公司 | Compiling method |
CN103177222A (en) * | 2011-12-23 | 2013-06-26 | 腾讯科技(深圳)有限公司 | Processing method for file shell adding and shell removing and device thereof |
CN103177222B (en) * | 2011-12-23 | 2015-08-12 | 腾讯科技(深圳)有限公司 | A kind of file adds shell, the disposal route of shelling and equipment thereof |
CN104899480A (en) * | 2015-05-05 | 2015-09-09 | 易兴旺 | Software copyright protection and management method based on combined public key identity authentication technology |
CN112579989A (en) * | 2020-12-23 | 2021-03-30 | 杭州安司源科技有限公司 | Anti-piracy method for network service software |
CN112579989B (en) * | 2020-12-23 | 2022-06-24 | 杭州安司源科技有限公司 | Anti-piracy method for network service software |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1897005A (en) | Protector against software running in non-authority computer | |
EP2092411B1 (en) | Identification and visualization of trusted user interface objects | |
US7870399B2 (en) | Software trusted platform module and application security wrapper | |
CN101329658B (en) | Encryption and decryption method, and PLC system using the same | |
CN101419652B (en) | Software and hardware combined program protecting method | |
US9454456B2 (en) | Method for separately executing software, apparatus, and computer-readable recording medium | |
CN107341374B (en) | Insertion method and device of opaque predicates | |
CN101038615A (en) | Method for directly and arbitrary separating code to encryption lock from software to implement protection of software protection | |
CN1828623A (en) | Method for protecting computer login using disposable password | |
CN104573549A (en) | Credible method and system for protecting confidentiality of database | |
CN107026728A (en) | Dynamic pretrigger stores encryption key | |
CN1263324A (en) | Fingerprint identification keyboard device and its identification method | |
KR20110088509A (en) | Cryptographic algorithm fault protections | |
CN1885298A (en) | Secure information storage method and information security apparatus thereof | |
CN103577732A (en) | Information processing method and device and electronic device | |
CN103560892A (en) | Secret key generation method and secret key generation device | |
CN109765856A (en) | The method of security logic system and safe operation flogic system | |
CN103294969A (en) | File system mounting method and file system mounting device | |
CN111177693A (en) | Method, device, equipment and medium for verifying terminal root certificate | |
CN106254059A (en) | A kind of operation method and safety chip | |
CN107087002A (en) | A kind of encipher-decipher method of data, device and electronic equipment | |
CN103810415B (en) | Graphic password protection method | |
CN106952659B (en) | CD multistage imprinting encryption method based on XTS encryption mode | |
CN111191194A (en) | Off-line use permission system for multi-core processor software integrated development environment | |
CN102681672A (en) | Reusable encryption keyboard circuit and design method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |