CN2039039U - Anti-tracking encrypted protection keylock for softwore of a microcomputor - Google Patents
Anti-tracking encrypted protection keylock for softwore of a microcomputor Download PDFInfo
- Publication number
- CN2039039U CN2039039U CN 88213464 CN88213464U CN2039039U CN 2039039 U CN2039039 U CN 2039039U CN 88213464 CN88213464 CN 88213464 CN 88213464 U CN88213464 U CN 88213464U CN 2039039 U CN2039039 U CN 2039039U
- Authority
- CN
- China
- Prior art keywords
- software
- encrypted
- protection
- serial ports
- microcomputer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The utility model discloses an anti-tracking encrypted protection keylock for software of a microcomputer, which is a non-intelligent hardware encrypted device for the protection of the software of the microcomputer. The encrypted technology adopts an encrypted protection keylock and an encrypted program two parts. The users are allowed to copy the generated encrypted software by themselves for backup. When in operation, the encrypted software can automatically access the ports of the computers. Only when the existence of the protection lock is ensured and the cipher is matching, the software can go on running; otherwise, the system can break. If the encrypted software is decoded by tracking or other similar methods, great loss can be rendered to the microcomputer system. The power source of the device is directly from the query signals, which can reduce the interference and the cost.
Description
The utility model is a kind of non intelligent hardware encipher device of microcomputer software protection.
Software protection is the chief component of develop computer software.Because the application of microcomputer is very extensive, the protection of microcomputer software is then had more significance.The encryption technology of microcomputer software can be divided into two kinds of software cryptography and hardware enciphers: user's propagation software is voluntarily forbidden in software cryptography; Hardware encipher then allows user's propagation software, but can't move this software, unless special hardware supported is arranged.The eighties mid-term the external microcomputer software that occurs non intelligent hardware-based cryptographic, be exactly the non intelligent hardware-based cryptographic of at present popular a kind of typical microcomputer software.The U.S., Britain, West Germany, etc. country and China Taiwan production is all arranged, " software sentry " this non intelligent hardware encipher device with U.S. Rainbow Technologies company production in 1987 is an example, it can be encrypted the source program that multiple program language is write, and function ratio is more complete.But itself admits the said firm, and device only can increase the difficulty of decoding, and decoding process (this situation can often take place) is not taked any precautionary measures.Although therefore on the function of device itself improves, descended very big strength, from the reliability aspect of maintaining secrecy, and be provided with substantial improvements, in addition,, cause cost to improve because the device inner structure is complicated.See that with regard to domestic actual conditions the price of this device has surpassed the price of most of softwares to be encrypted itself, thereby be difficult to the software developer and the user accepts.
In view of the foregoing, the utility model aims to provide a kind of simple in structure and more reliable microcomputer software protection lock of confidentiality, and it can make foregoing problems obtain satisfied solution.
Antitracking microcomputer software encipherment protection lock mainly is made of physical circuit such as figure one shift register and select switch two parts.(1) be select switch, (2) are shift register, and (3) are serial ports of computers (EIA RS-232-C).Shift register is as the input of coding, and select switch is exported as coding, thereby forms coding circuit, and is connected with serial ports of computers by the DB-25 edge connector.Shift register can be to the select switch transition coding, and determines the level of data bit in the select switch according to this coding.These data link to each other with the CTS end (5 pin) of serial ports of computers as coding output.Encrypted software utilizes the software inquiry mode when operation, by RTS end (4 pin) the transmission pulse of serial ports, and with the capacitor C charging of this pulse in circuit, as the power supply of this encipherment protection lock.DTR by serial ports end sends data level then, to the shift register coding input end of this protection lock (just as) set to reach it to the select switch purpose of encoding.
In accompanying drawing one, select switch, shift register are TTL or MOS chip.The resistance of resistance R is 3K, and the appearance value of capacitor C is 20 microfarads, and diode is 2CP10.Circuit shows be encoded to " 111 " of (2) shift register among the figure, and 14 pin of the corresponding select switch of encoding therewith are set the level value into the software appointment, and it is received the CTS end of serial ports.Do not sending before the geocoding, the pulse that utilizes the RTS end to send is charged to 20 microfarad electric capacity, the DTR end (20 pin) of serial ports can send data level, make its dataset end set to shift register, select switch is a codified, and this moment, select switch was a shift pulse with the pulse of the RTS end of serial ports.Serial number among the figure one in (1) select switch (2) shift register is a chip pin number.When protection lock is inserted on the serial ports and password when conforming to, the inquiry response signal is correct, and encrypted software can normally move, otherwise system will stop running.Whole coding circuit (protection lock) among the figure one except that serial ports becomes integral body with epoxy casting, and with metal material or nonmetallic materials encapsulation, encapsulates with aluminium sheet in the present embodiment.Accompanying drawing two is outside drawings of encipherment protection lock, and as the specification digest accompanying drawing.
Antitracking microcomputer software encryption technology is made of encipherment protection lock and encipheror two parts.The software developer need only move the antitracking encryption software, and according to the name of pointing out input software to be encrypted, ciphering process can be finished.Accompanying drawing three is antitracking encryption software flow chart.The encrypted software that is generated allows the user to duplicate voluntarily and gives over to backup, or copies to hard disk and be convenient to operation.Encrypted software with the serial ports of automatic access computer, has only under the situation that the affirmation protection lock exists and password conforms to when operation, and encrypted software could continue operation, otherwise system will interrupt.Encipheror can be encrypted on source program or two levels of file destination the software with multiple distinct program language compilation on the one hand, on the other hand can be when having human tracking or the attempt of other similar approach to decode encrypted software, can cause the multiple loss that can't retrieve to its microsystem, thereby improve the reliability of software cryptography.
The utility model simple and compact structure, cost only is 1/5 of an external product, for software developer and user adopt this technology to create condition, the inquiry pulse is taken from the design of line power, reduced interference, reduction expense, encryption software have the antitracking function, have improved the reliability of software cryptography greatly.
Claims (2)
1, antitracking microcomputer software encipherment protection lock; have shift register (2) and select switch (1); it is characterized in that with the input of shift register as coding; select switch is formed coding circuit as the output of encoding; (EIARS-232-C) be connected with serial ports of computers (3) by the DB-25 edge connector; utilize the DTR end of serial ports (3) to be the coding input end of this protection lock; coding output is connected to the CTS end of serial ports (3); and the RTS end that passes through serial ports (3) is to the charging of the capacitor C in the circuit, as the power supply of this encipherment protection lock.
2, according to the described antitracking microcomputer software of claim 1 encipherment protection lock, it is characterized in that described coding circuit epoxy casting, and encapsulate with metal material or nonmetallic materials.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 88213464 CN2039039U (en) | 1988-09-21 | 1988-09-21 | Anti-tracking encrypted protection keylock for softwore of a microcomputor |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 88213464 CN2039039U (en) | 1988-09-21 | 1988-09-21 | Anti-tracking encrypted protection keylock for softwore of a microcomputor |
Publications (1)
Publication Number | Publication Date |
---|---|
CN2039039U true CN2039039U (en) | 1989-06-07 |
Family
ID=4846569
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 88213464 Withdrawn CN2039039U (en) | 1988-09-21 | 1988-09-21 | Anti-tracking encrypted protection keylock for softwore of a microcomputor |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN2039039U (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102520223A (en) * | 2011-11-02 | 2012-06-27 | 宁波三星电气股份有限公司 | Software anti-interference method used for electric energy meter |
-
1988
- 1988-09-21 CN CN 88213464 patent/CN2039039U/en not_active Withdrawn
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102520223A (en) * | 2011-11-02 | 2012-06-27 | 宁波三星电气股份有限公司 | Software anti-interference method used for electric energy meter |
CN102520223B (en) * | 2011-11-02 | 2014-05-14 | 宁波三星电气股份有限公司 | Software anti-interference method used for electric energy meter |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6094486A (en) | Security apparatus for data transmission with dynamic random encryption | |
US20060026826A1 (en) | Method and apparatus for deterring snooping of data in digital data processing systems | |
WO1998058322A9 (en) | Security apparatus for data transmission with dynamic random encryption | |
US5696823A (en) | High-bandwidth encryption system with low-bandwidth cryptographic modules | |
JPH09179871A (en) | System and method providing safe sql-level access to data base | |
CA2641215A1 (en) | Cryptographic co-processor | |
CA2004485A1 (en) | Computer with improved keyboard password functions | |
CN103795814B (en) | A kind of short message equipment universal communication interface producing CPU and OS based on the whole nation | |
JPH06243065A (en) | Method for establishing simulated terminal link and its device | |
CN104318649A (en) | Smart lock system based on vibration frequency communication of smart phone | |
CN2039039U (en) | Anti-tracking encrypted protection keylock for softwore of a microcomputor | |
CN204242262U (en) | Based on the intelligent lock system of smart mobile phone vibration frequency communication | |
Tao et al. | A design of WSN based locking system | |
CN216083691U (en) | Tax UKEY and tax processing system | |
CN216817425U (en) | USB key device | |
CN218896363U (en) | Computer interface safety device capable of preventing computer data from being stolen | |
DE59810759D1 (en) | ENCRYPTION METHOD AND DEVICE | |
Bleyer et al. | Kasner-like, inflationary, and steady state solutions in multidimensional cosmology | |
CN2313013Y (en) | Mechanical puzzle lock | |
MUFTIC | Design and operations of a secure computer system[Ph. D. Thesis] | |
Fortier | Encoding and decoding quasi-spherical signal sets | |
Hemmati | Decoding the eight-state partial unit-memory code | |
CN1329808C (en) | Data coding and decoding device | |
CN117792799A (en) | Encryption and decryption communication method based on simple communication architecture | |
Ochman | Electronic equipment in multiple access information systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C19 | Lapse of patent right due to non-payment of the annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |