CN1897005A - Protector against software running in non-authority computer - Google Patents

Protector against software running in non-authority computer Download PDF

Info

Publication number
CN1897005A
CN1897005A CN 200610010916 CN200610010916A CN1897005A CN 1897005 A CN1897005 A CN 1897005A CN 200610010916 CN200610010916 CN 200610010916 CN 200610010916 A CN200610010916 A CN 200610010916A CN 1897005 A CN1897005 A CN 1897005A
Authority
CN
China
Prior art keywords
key
protection device
software
protection
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200610010916
Other languages
Chinese (zh)
Inventor
施霖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 200610010916 priority Critical patent/CN1897005A/en
Publication of CN1897005A publication Critical patent/CN1897005A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

A protection device for avoiding software to be operated on no authorized computer consists of key element for storing private key of asymmetric enciphering algorithm and for operating asymmetric enciphering algorithm, protection element containing software code of asymmetric enciphering algorithm and public key of said algorithm for weaving woven-in component into protected software code to protect software, weaving in element for using publicly known algorithm to generate public key and private key pair of asymmetric enciphering algorithm and writing them separately in protection and key elements.

Description

A kind ofly be used to prevent the protective device of running software on non-authority computer
Technical field:
The present invention relates to a kind of protective device of running software on non-authority computer that be used to prevent, belong to the software protection field.
Background technology:
Software Protection Technique is to prevent that unauthorized user from illegally using the technology of software, and Software Protection Technique reaches the purpose that protection software is not illegally used by technological means.
Present widely used Software Protection Technique mainly is to use sequence number protection, and this mode is easy to be cracked.Multiple method of encrypting also is used to software protection, and diverse ways respectively has quality.
Summary of the invention:
The object of the present invention is to provide and a kind ofly protect good being used to of effect to prevent the protective device of running software on non-authority computer.
Protective device of the present invention is by key device (5), protection device (3) and inweave device (1) formation, and the protection step of this protective device is as follows:
Step 1: inweave device (1) and use PKI (2), the private key (4) of known algorithm generation rivest, shamir, adelman right, and with in PKI (2) and private key (4) difference write protection device (3) and the key device (5);
Step 2: protection device (3) is a software code of finishing defencive function, wherein includes the PKI (2) of rivest, shamir, adelman and the software code of rivest, shamir, adelman.Protection device (3) will be inweaved device (1) and be inweaved in the protected software code (6), provide protection for it in the time of in protected software code (6) operation on computers;
Step 3: key device (5) is used to deposit the private key (4) and the operation rivest, shamir, adelman of rivest, shamir, adelman;
Step 4: inweave device (1) and be chosen in and inweave inweaving position a little and inweaving method of protection device (3) in the protected software code (6), a plurality of key points in protected software code (6) inweave protection device (3), making protection device (3) and protected software code (6) become one indivisible or be difficult to cuts apart, in protected software code (6), inweave after the protection device (3), generate the preceding code (7) of issue;
Step 5: code (7) forms releasing software (8) through compiling or after compiling before the issue, and releasing software (8) has comprised protected software code (6) and protection device (3) code that is woven together;
Step 6: key device (5) links together in the running environment of releasing software (8) with protection device (3); in the running environment of releasing software (8); authentication between key device (5) and the protection device (3) uses the authentication algorithm of known rivest, shamir, adelman to carry out each other authentication; the PKI of rivest, shamir, adelman (2) is kept in the protection device (3), and the calculating process that has PKI (2) to participate in is finished in protector (3) part.The private key of rivest, shamir, adelman (4) is kept in the key device (5), and the calculating process that has private key (4) to participate in is finished in key device (5);
Step 7: when releasing software (8) ran to the protection device (3) that inweaves a place, protection device (3) will be randomly carried out each other authentication with key device (5), if authentication is passed through, releasing software (8) continues operation, otherwise stops operation.
Key device of the present invention (5) uses the Intelligent key of existing USB interface, comprises the intelligent card chip that rivest, shamir, adelman (as RSA Algorithm) can be provided in the Intelligent key.Intelligent card chip can guarantee to be stored in the safety of the private key (4) of its inner cryptographic algorithm.The cryptographic operation that has private key (4) to participate in is all finished in intelligent card chip inside, and private key (4) can not be read by the equipment beyond the intelligent card chip.
The device (1) that inweaves of the present invention inweaves algorithm in the protected software code (6) to protection device (3) and has a variety ofly, and the good more protection device of algorithm (3) is difficult to cut apart with protected software code (6) more.A kind of method that optionally inweaves is to inweave protection device (3) at the crucial function entrance place of protected software code (6).Have different braiding algorithms for different programming languages, the braiding algorithm that has is that the source program code of software is operated, and the algorithm that has can be operated object code.If use the braiding algorithm that the source program code of software is operated, before finishing and generate issue, braiding after the code, code (7) before the issue need be compiled, generate releasing software (8).If use the braiding algorithm that object code is operated, code (7) is releasing software (8) before the issue that braiding generates.
The present invention has that the protection effect is good, advantage such as be difficult for being cracked.
Description of drawings:
Fig. 1 is a protective device structure connection diagram.
Fig. 2 generates key to process flow diagram for inweaving device (1).
Fig. 3 generates the preceding code flow figure of issue for inweaving device (1).
Checking process figure when Fig. 4 is protection device (3) operation.
Specific implementation method:
Be used to prevent the protective device of running software on non-authority computer by key device (5), protection device (3) with inweave device (1) and constitute, the protection step of this protective device is as follows:
1. use inweaves device (1) generation PKI (2), private key (4) is right;
2. use to inweave device (1) PKI (2) is deposited in the protection device (3), private key (4) is deposited in the key device (4);
3. use inweaves device (1) and protected software code (6) and protection device (3) is woven together code (7) before the formation issue;
4. code (7) forms releasing software (8) through compiling or after compiling before the issue, and releasing software (8) has comprised protected software code (6) and the protection device code that is woven together, and the releasing software code is distributed to software users;
5. key apparatus is distributed to the software users of mandate, key apparatus and releasing software (8) by different by way of being distributed to authorized user;
6. the software users that is authorized to has releasing software (8) and key apparatus simultaneously, when using software, key apparatus must be inserted the corresponding I/O interface of the computing machine of operating software;
7. in releasing software (8) when operation, will be carried out each other authentication with key device (5), if authentication is passed through, releasing software (8) continues operation, otherwise stops operation.
The present invention shows through use, reaches designing requirement fully.

Claims (1)

1. one kind is used to prevent the protective device of running software on non-authority computer, and this protective device is by key device (5), protection device (3) and inweave device (1) formation, it is characterized in that the protection step of protective device is as follows:
Step 1. inweaves device (1) and uses PKI (2), the private key (4) of known algorithm generation rivest, shamir, adelman right, and with in PKI (2) and private key (4) difference write protection device (3) and the key device (5);
Step 2. protection device (3) is a software code of finishing defencive function, wherein includes the PKI (2) of rivest, shamir, adelman and the software code of rivest, shamir, adelman.Protection device (3) will be inweaved device (1) and be inweaved in the protected software code (6), provide protection for it in the time of in protected software code (6) operation on computers;
Step 3. key device (5) is used to deposit the private key (4) and the operation rivest, shamir, adelman of rivest, shamir, adelman;
Step 4. inweaves device (1) and is chosen in and inweaves inweaving position a little and inweaving method of protection device (3) in the protected software code (6), a plurality of key points in protected software code (6) inweave protection device (3), making protection device (3) and protected software code (6) become one indivisible or be difficult to cuts apart, in protected software code (6), inweave after the protection device (3), generate the preceding code (7) of issue;
Code (7) forms releasing software (8) through compiling or after compiling before step 5. issue, and releasing software (8) has comprised protected software code (6) and protection device (3) code that is woven together;
Step 6. key device (5) links together in the running environment of releasing software (8) with protection device (3); in the running environment of releasing software (8); authentication between key device (5) and the protection device (3) uses the authentication algorithm of known rivest, shamir, adelman to carry out each other authentication; the PKI of rivest, shamir, adelman (2) is kept in the protection device (3), and the calculating process that has PKI (2) to participate in is finished in protector (3) part.The private key of rivest, shamir, adelman (4) is kept in the key device (5), and the calculating process that has private key (4) to participate in is finished in key device (5);
When step 7. releasing software (8) ran to the protection device (3) that inweaves a place, protection device (3) will be randomly carried out each other authentication with key device (5), if authentication is passed through, releasing software (8) continues operation, otherwise stops operation.
CN 200610010916 2006-05-23 2006-05-23 Protector against software running in non-authority computer Pending CN1897005A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200610010916 CN1897005A (en) 2006-05-23 2006-05-23 Protector against software running in non-authority computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200610010916 CN1897005A (en) 2006-05-23 2006-05-23 Protector against software running in non-authority computer

Publications (1)

Publication Number Publication Date
CN1897005A true CN1897005A (en) 2007-01-17

Family

ID=37609530

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200610010916 Pending CN1897005A (en) 2006-05-23 2006-05-23 Protector against software running in non-authority computer

Country Status (1)

Country Link
CN (1) CN1897005A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101398879B (en) * 2007-09-25 2011-04-27 联想(北京)有限公司 Software authentication method
CN101533454B (en) * 2009-04-14 2011-12-28 飞天诚信科技股份有限公司 Compiling method
CN101446905B (en) * 2008-12-29 2012-06-27 飞天诚信科技股份有限公司 Method for compiling and compiler
CN103177222A (en) * 2011-12-23 2013-06-26 腾讯科技(深圳)有限公司 Processing method for file shell adding and shell removing and device thereof
CN104899480A (en) * 2015-05-05 2015-09-09 易兴旺 Software copyright protection and management method based on combined public key identity authentication technology
CN112579989A (en) * 2020-12-23 2021-03-30 杭州安司源科技有限公司 Anti-piracy method for network service software

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101398879B (en) * 2007-09-25 2011-04-27 联想(北京)有限公司 Software authentication method
CN101446905B (en) * 2008-12-29 2012-06-27 飞天诚信科技股份有限公司 Method for compiling and compiler
CN101533454B (en) * 2009-04-14 2011-12-28 飞天诚信科技股份有限公司 Compiling method
CN103177222A (en) * 2011-12-23 2013-06-26 腾讯科技(深圳)有限公司 Processing method for file shell adding and shell removing and device thereof
CN103177222B (en) * 2011-12-23 2015-08-12 腾讯科技(深圳)有限公司 A kind of file adds shell, the disposal route of shelling and equipment thereof
CN104899480A (en) * 2015-05-05 2015-09-09 易兴旺 Software copyright protection and management method based on combined public key identity authentication technology
CN112579989A (en) * 2020-12-23 2021-03-30 杭州安司源科技有限公司 Anti-piracy method for network service software
CN112579989B (en) * 2020-12-23 2022-06-24 杭州安司源科技有限公司 Anti-piracy method for network service software

Similar Documents

Publication Publication Date Title
CN1897005A (en) Protector against software running in non-authority computer
EP2092411B1 (en) Identification and visualization of trusted user interface objects
US7870399B2 (en) Software trusted platform module and application security wrapper
CN101329658B (en) Encryption and decryption method, and PLC system using the same
CN101419652B (en) Software and hardware combined program protecting method
US9454456B2 (en) Method for separately executing software, apparatus, and computer-readable recording medium
CN107341374B (en) Insertion method and device of opaque predicates
CN101038615A (en) Method for directly and arbitrary separating code to encryption lock from software to implement protection of software protection
CN1828623A (en) Method for protecting computer login using disposable password
CN104573549A (en) Credible method and system for protecting confidentiality of database
CN107026728A (en) Dynamic pretrigger stores encryption key
CN1263324A (en) Fingerprint identification keyboard device and its identification method
KR20110088509A (en) Cryptographic algorithm fault protections
CN1885298A (en) Secure information storage method and information security apparatus thereof
CN103577732A (en) Information processing method and device and electronic device
CN103560892A (en) Secret key generation method and secret key generation device
CN109765856A (en) The method of security logic system and safe operation flogic system
CN103294969A (en) File system mounting method and file system mounting device
CN111177693A (en) Method, device, equipment and medium for verifying terminal root certificate
CN106254059A (en) A kind of operation method and safety chip
CN107087002A (en) A kind of encipher-decipher method of data, device and electronic equipment
CN103810415B (en) Graphic password protection method
CN106952659B (en) CD multistage imprinting encryption method based on XTS encryption mode
CN111191194A (en) Off-line use permission system for multi-core processor software integrated development environment
CN102681672A (en) Reusable encryption keyboard circuit and design method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication