WO2023179378A1 - 加密方法、装置及电子设备 - Google Patents

加密方法、装置及电子设备 Download PDF

Info

Publication number
WO2023179378A1
WO2023179378A1 PCT/CN2023/080773 CN2023080773W WO2023179378A1 WO 2023179378 A1 WO2023179378 A1 WO 2023179378A1 CN 2023080773 W CN2023080773 W CN 2023080773W WO 2023179378 A1 WO2023179378 A1 WO 2023179378A1
Authority
WO
WIPO (PCT)
Prior art keywords
software
encryption
private
information
target software
Prior art date
Application number
PCT/CN2023/080773
Other languages
English (en)
French (fr)
Inventor
王毅
呼志刚
Original Assignee
杭州海康机器人股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 杭州海康机器人股份有限公司 filed Critical 杭州海康机器人股份有限公司
Publication of WO2023179378A1 publication Critical patent/WO2023179378A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Definitions

  • the present disclosure relates to data security technology, and in particular to encryption methods, devices and electronic equipment.
  • each piece of software is individually provided with an encryption medium specifically designed to encrypt that software.
  • Software can generally refer to a program that implements at least one function (can organize computer data and instructions in a specific order).
  • the encryption medium here is a medium that "restricts and protects the user's use of the software" through parameters such as passwords, system keys, or hardware keys (usually encryption parameters).
  • the encryption medium equipped with each software is only limited to encrypting and protecting the software itself, and cannot encrypt the associated data associated with the software.
  • the associated data associated with the software is, for example, software configuration information to be loaded when the software is used, result information generated after the software is run, newly added functions on the software, etc. That is to say, although the above-mentioned associated data is associated with the software, the encryption of the associated data is independent of the encryption of the software itself.
  • the encryption of different associated data depends on the corresponding encryption medium it is equipped with, and the software depends on the encryption medium. a encryption is an example.
  • the software configuration information to be loaded depends on the encryption medium b encryption.
  • the result information generated after the software is run depends on the encryption medium c encryption. New functions added to the software depend on encryption. Media d encryption.
  • encryption medium a needs to be integrated with encryption medium b, encryption medium c, and encryption medium d. That is, four encryption media are needed at the same time, and the encryption is very complex. Cumbersome.
  • the present disclosure provides encryption methods, devices and electronic equipment to implement encryption using the same encryption medium for software and other software independent of the software.
  • Embodiments of the present disclosure provide an encryption method, which method includes: using currently deployed Private encryption information is recorded in the user's private area in the encryption medium for encryption protection; the encryption medium also records target software encryption information dedicated to encryption protection of the target software; when it is detected that the target software is associated with When the encryption of the associated data is triggered, the associated data is encrypted according to the private encryption information corresponding to the associated data recorded in the user's private area in the encryption medium; wherein, the encryption of the associated data Independent of the encryption of the target software, the associated data includes at least one of the following: software configuration information of the target software, result information generated after the target software is run, custom function software, and custom function software Software configuration information and result information generated after the customized function software is run; the customized function software is implemented by adding a program for realizing the customized function to the target software.
  • An embodiment of the present disclosure provides an encryption device.
  • the device includes: a deployment unit configured to record private encryption information in a user private area in an encryption medium currently deployed for encryption protection of target software; the encryption medium Target software encryption information specifically used to encrypt and protect the target software is also recorded; a processing unit is configured to, when an encryption trigger for encrypting associated data associated with the target software is detected, The private encryption information corresponding to the associated data recorded in the user's private area encrypts the associated data; wherein the encryption of the associated data is independent of the encryption of the target software, and the associated data includes at least the following: One: software configuration information of the target software, result information generated after the target software is run, custom function software, software configuration information of the custom function software, result information generated after the custom function software is run ; The customized function software is implemented by adding a program for realizing the customized function on the target software.
  • An embodiment of the present disclosure also provides an electronic device.
  • the electronic device includes: a processor and a machine-readable storage medium; the machine-readable storage medium stores machine-executable instructions that can be executed by the processor; the processor is used to execute the machine-executable instructions to achieve the above Public method steps.
  • Figure 1 is an example diagram of an encryption medium provided by an embodiment of the present disclosure.
  • Figure 2 is a method flow chart provided by an embodiment of the present disclosure.
  • Figure 3 is another example diagram of an encryption medium provided by an embodiment of the present disclosure.
  • Figure 4a is an example diagram of recording private encrypted information in a user private area provided by an embodiment of the present disclosure.
  • Figure 4b is another example diagram of recording private encrypted information in a user private area provided by an embodiment of the present disclosure.
  • Figure 5a is a schematic diagram of decrypting associated data provided by an embodiment of the present disclosure.
  • Figure 5b is another schematic diagram of decrypting associated data provided by an embodiment of the present disclosure.
  • Figure 6 is a device structure diagram provided by an embodiment of the present disclosure.
  • Figure 7 is a structural diagram of an electronic device provided by an embodiment of the present disclosure.
  • encryption media includes but is not limited to the following areas:
  • Exclusive read-write area Only authorized to the original developer, allowing the original developer to write data and read data.
  • the private read-write area records encryption information (also called software encryption information) dedicated to encrypting software that matches the encryption medium.
  • Public read-only area allows original developers to write data and read data, and allows users to read data.
  • the public read-only area is generally used as a way to record the information expressed externally by the original developer, allowing users to know the information that the original developer wants users to know, such as the basic information of the most common encryption media (model, developer, etc.).
  • the encryption media records the software encryption information, such as keys and passwords, in the private read-write area, and encrypts the software to protect the software itself.
  • the associated data associated with the software is associated with the software, its encryption is independent of the encryption of the software itself.
  • the encryption of different associated data depends on the encryption of different encryption media equipped with it, such as
  • the software described in the background art relies on the encryption of encryption medium a.
  • the software configuration information to be loaded when the software is used relies on the encryption of encryption medium b.
  • the result information generated after the software is run relies on the encryption of encryption medium c.
  • the newly added functionality relies on encryption media encryption.
  • the encryption medium equipped with the software needs to be integrated with the encryption medium equipped with the associated data.
  • the above software integrates the above software configuration information, result information, and newly added functions of the software
  • encryption medium a is required to integrate encryption medium b, encryption medium c, and encryption medium d. That is, four encryption media are required at the same time. Encryption is very cumbersome and will cause great inconvenience.
  • this embodiment provides an encryption method that can solve the above technical problems.
  • Figure 2 illustrates an encryption method provided by an embodiment of the present disclosure.
  • Figure 2 is a method flow chart provided by an embodiment of the present disclosure.
  • the method can be applied to electronic devices.
  • the electronic device may be a device that manages or controls software, which is not specifically limited in this embodiment.
  • the process may include the following steps:
  • Step 201 Record private encryption information in the user private area in the currently deployed encryption medium used to encrypt and protect the target software.
  • the target software can generally refer to any software.
  • the following improvements can be made to the encrypted medium equipped with the target software: setting a user private area in the encrypted medium.
  • Figure 3 shows the addition of a user private area to the encrypted medium shown in Figure 1.
  • the specific location of the user's private area in the encrypted medium is not limited, as long as it is guaranteed not to conflict with the existing divided areas in the encrypted medium, such as the private read-write area, the public read-only area, etc. That’s it.
  • the user private area is authorized to record private encrypted information.
  • a corresponding external interface can be added to the target software to record private encrypted information in the user private area through the external interface.
  • recording private encryption information in the user private area may include: through new settings
  • the external interface corresponding to the above target software receives private encrypted information externally written to the user's private area. That is, recording private encrypted information in the user's private area is achieved.
  • the software interaction interface corresponding to the target software can also be used to record private encrypted information in the user's private area.
  • recording private encrypted information in the user private area may include: receiving externally input private encrypted information to be written to the user private area through the software interaction interface corresponding to the target software, and storing the private encrypted information. Write to the above user private area. That is, the recording of private encrypted information in the user's private area is finally achieved.
  • the private encrypted information recorded in the user's private area can be dynamically modified, deleted, etc. based on actual needs.
  • Step 202 When an encryption trigger for encrypting associated data associated with the target software is detected, step 203 is executed.
  • the above-mentioned associated data is associated with the target software, but the encryption of the associated data is independent of the encryption of the target software.
  • the associated data includes at least one of the following: software configuration information of the target software, result information generated after the target software is run, custom function software, software configuration information of the custom function software, custom function software Defines the result information generated after the functional software is run.
  • the above-mentioned associated data associated with the target software can be defined according to actual needs.
  • the above-mentioned associated data may not cover the custom function software, but only cover the software configuration information of the custom function software.
  • the result information generated after the customized function software is run, etc., this embodiment is not limited one by one.
  • the customized function software is implemented by adding a new program to the target software for realizing the customized function, such as adding user-defined tools or user-defined information to the target software.
  • the new The added user-defined tools or user-defined information can be collectively referred to as customized function software.
  • each associated data of the software must be equipped with a corresponding encryption medium when encrypted.
  • a corresponding encryption medium is no longer provided for the associated data of the software. Encryption of the associated data is achieved by extending the user private area in the encryption medium equipped with the software. See step 203 for details. I won’t go into details here.
  • the above-mentioned electronic device provides an interface to the outside.
  • the interface may be an interactive interface of the above-mentioned target software, or may be a management interface for managing the target software (different from the interactive interface of the target software).
  • an encryption trigger for encrypting the associated data associated with the target software is detected (for example, setting a trigger identification (such as a button, etc.) associated with the associated data on the above interface, if When it is detected that the above trigger flag is triggered, an encryption trigger for encrypting the associated data is detected), and the corresponding associated data can be learned in time for encryption.
  • Step 203 Encrypt the associated data based on the private encryption information corresponding to the associated data recorded in the user private area in the encrypted medium.
  • the above-mentioned user private area can record a private encrypted information.
  • This private encryption information can be used to encrypt all associated data associated with the target software.
  • the private encrypted information recorded in the user private area corresponds to all associated data of the target software.
  • the above-mentioned user private area can record more than two private encryption information to correspond to at least two different associated data.
  • the above-mentioned user private area can record the following three private encryption information: key a1, key a2, Key a3, the software configuration information of the target software corresponds to the key a1 recorded in the user private area, the result information generated after the target software is run corresponds to the key a2, and the custom function software corresponds to the key a3, then in When encrypting the associated data associated with the target software, first identify what the associated data is. For example, the associated data is software configuration information, then the software configuration information is encrypted based on the key a1 recorded in the user private area, and then the associated data is encrypted. If the data is the above result information, then the result information is encrypted based on the key a2 recorded in the above user private area, and so on.
  • the software configuration information of the custom function software and the private encrypted information corresponding to the result information generated after the custom function software is run can be the same.
  • they can both be the corresponding private encryption information of the custom function software.
  • Private encrypted information can also be different.
  • the above-mentioned user private area can additionally define two types of private encryption information, one of which is The private encrypted information corresponding to the software configuration information of the custom function software, and the other type is the private encrypted information corresponding to the result information generated after the custom function software is run, etc.
  • This embodiment is not limited one by one.
  • this embodiment implements encryption of associated data associated with the software through the encryption medium equipped with the software.
  • the associated data includes at least one of the following: when the target software is run The software configuration information, the result information generated after the target software is run, the software configuration information of the custom function software, and the result information generated after the custom function software is run, then in the above step 203, according to the user private area in the encrypted medium
  • the method further includes: upon receiving a loading trigger that requires loading the encrypted associated data to run on the target software, encrypting the associated data according to the overlapping encryption method.
  • the corresponding decryption method decrypts the encrypted associated data. The details are shown in Figure 5a.
  • the target software encryption information corresponding to the encrypted associated data is read from the encryption medium equipped with the target software. Private encrypted information, and verify the read encryption information and private encryption information of the target software respectively. If the verification passes, the encrypted associated data will be decrypted and loaded into the target software for running; otherwise, the loading failure will be displayed.
  • the target software encrypts the information.
  • the above-mentioned verification of the read target software encryption information and private encryption information may include: checking whether the currently read target software encryption information is the target that has been previously recorded in the above step 203 when encrypting the associated data.
  • the software encrypts the information, and checks whether the currently read private encrypted information is the previously recorded private encrypted information when encrypting the associated data in the above step 203. If so, it is determined that the verification passes, otherwise, the verification fails.
  • the above-mentioned associated data includes at least one of the following: software configuration information when the target software is run, result information generated after the target software has been run, software configuration information of custom function software , the result information generated after the custom function software has been run, although the private encryption information is used to encrypt the associated data in the above step 203, it implies overlapping encryption of the associated data.
  • the encrypted associated data needs to be decrypted according to the decryption method corresponding to overlapping encryption as described above.
  • the associated data at least includes: customized function software; then in the above step 203, after the associated data is encrypted according to the private encryption information corresponding to the associated data recorded in the user's private area in the encrypted medium, the method further Including: when receiving a trigger to use a function provided by the target software, providing the function according to the decryption corresponding to the distributed encryption.
  • the method further Including: when receiving a trigger to use a function provided by the target software, providing the function according to the decryption corresponding to the distributed encryption. The details are shown in Figure 5b.
  • the private encrypted information recorded in the user private area does not always remain unchanged and may be updated or deleted.
  • an externally input update message for updating the private encrypted information in the user's private area can be received through the external interface corresponding to the newly set target software, or through the software interaction interface corresponding to the target software, and the user can be updated according to the update message.
  • Private encrypted information recorded in the private area for example, updating the private encrypted information recorded in the user's private area with the private encrypted information carried in the update message, etc. This enables updating of private encrypted information in the user's private area.
  • the private encrypted information recorded in the user's private area can be deleted according to the deletion instruction. This achieves deletion of private encrypted information in the user's private area.
  • Figure 6 is a structural diagram of an encryption device provided by an embodiment of the present disclosure. As shown in Figure 6, the device may include:
  • Deployment unit configured to record private encryption information in the user's private area in the currently deployed encryption medium for encrypting and protecting the target software; the encryption medium also records a special encryption medium for encrypting and protecting the target software.
  • Target software encrypts information
  • a processing unit configured to, when an encryption trigger for encrypting the associated data associated with the target software is detected, perform an encryption step according to the private encryption information corresponding to the associated data recorded in the user private area of the encryption medium.
  • the associated data is encrypted
  • the encryption of the associated data is independent of the encryption of the target software, and the associated data includes at least one of the following: software configuration information of the target software, result information generated after the target software is run, customization Function software, software configuration information of the customized function software, and result information generated after the customized function software is run; the customized function software is implemented by adding a program for realizing the customized function to the target software.
  • the deployment unit when recording private encryption information in the user private area in the currently deployed encryption medium used for encryption protection of the target software, the deployment unit is configured to:
  • the private encrypted information to be written to the user private area input from the outside is received through the software interaction interface corresponding to the target software, and the private encrypted information is written into the user private area.
  • the processing unit further encrypts the associated data according to the private encryption information corresponding to the associated data recorded in the user private area in the encrypted medium, and then further When receiving a loading trigger to load the encrypted associated data to run on the target software, read the target software encryption information and the encrypted associated data corresponding to the encrypted medium. private encrypted information, and verify the read target software encrypted information and private encrypted information respectively. If the verification passes, the encrypted associated data will be decrypted and loaded into the target software for operation; otherwise, display Failed to load.
  • the processing unit encrypts the associated data according to the private encryption information corresponding to the associated data recorded in the user private area in the encrypted medium. , further when receiving a trigger to use the custom function provided by the custom function software, read the encrypted private encryption information corresponding to the custom function software from the encryption medium, and read the private encryption information The encrypted information is verified. If the verification passes, the custom function software is decrypted and the custom functions provided by the custom function software are allowed to be used. Otherwise, the use of the custom functions provided by the custom function software is prohibited. function; and, when receiving a trigger to use the original function provided by the target software, read the target software encryption information from the encryption medium, and verify the target software encryption information. If the verification If passed, the original functions provided by the target software are allowed to be used; otherwise, the original functions provided by the target software are prohibited from being used.
  • the deployment unit after the deployment unit records the private encrypted information in the user private area, it further receives external input for updating the user private information through an external interface corresponding to the target software, or through a software interactive interface corresponding to the target software.
  • Update message of the private encrypted information in the area update the private encrypted information recorded in the user private area according to the update message; or, through the external interface corresponding to the target software, or through the software interaction corresponding to the target software
  • the interface receives a deletion instruction and deletes the private encrypted information recorded in the user's private area according to the deletion instruction.
  • FIG. 7 is a structural diagram of an electronic device provided by an embodiment of the present disclosure.
  • the hardware structure may include: a processor and a machine-readable storage medium.
  • the machine-readable storage medium stores machine-executable instructions that can be executed by the processor; the processor is configured to execute machine-executable instructions. instructions to implement the methods disclosed in the above examples of the present disclosure.
  • embodiments of the present disclosure also provide a machine-readable storage medium.
  • Several computer instructions are stored on the machine-readable storage medium.
  • the present invention can be realized.
  • the methods disclosed in the above examples are disclosed.
  • machine-readable storage medium can be any electronic, magnetic, optical or other physical storage device, which can contain or store information, such as executable instructions, data, etc.
  • machine-readable storage media can be: RAM (Radom Access Memory, random access memory), volatile memory, non-volatile memory, flash memory, storage drive (such as hard drive), solid state drive, any type of storage disk (such as CDs, DVDs, etc.), or similar storage media, or a combination thereof.
  • a typical implementation device is a computer, which may be in the form of a personal computer, a laptop, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email transceiver, or a game controller. desktop, tablet, wearable device, or a combination of any of these devices.
  • embodiments of the present disclosure may be provided as methods, systems, or computer program products. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment that combines software and hardware aspects. Furthermore, embodiments of the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
  • computer-usable storage media including, but not limited to, disk storage, CD-ROM, optical storage, etc.
  • these computer program instructions may also be stored in a computer-readable memory that causes a computer or other programmable data processing apparatus to operate in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction means,
  • the instruction device implements the functions specified in one process or multiple processes of the flowchart and/or one block or multiple blocks of the block diagram.
  • These computer program instructions may also be loaded onto a computer or other programmable data processing device, causing a series of operating steps to be performed on the computer or other programmable device to produce a computer-implemented process, thereby executing on the computer or other programmable device.
  • Instructions provide steps for implementing the functions specified in a process or processes of a flowchart diagram and/or a block or blocks of a block diagram.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Remote Sensing (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

本公开提供了加密方法、装置及电子设备。本公开中,通过在目标软件被配备的加密媒介中的用户私有区中记录私有加密信息,通过该私有加密信息对目标软件相关联的关联数据进行加密,实现了目标软件、以及目标软件相关联的关联数据使用同一加密媒介加密,降低加密复杂度,提高加密便利。

Description

加密方法、装置及电子设备
相关申请的交叉引用
本公开要求于2022年3月21日递交的、申请号为202210280533.4的中国专利申请的优先权,其全部内容在此通过引用并入本文中。
技术领域
本公开涉及数据安全技术,特别涉及加密方法、装置及电子设备。
背景技术
通常,每一软件都单独配备有专用于对该软件进行加密的加密媒介。这里的软件可泛指实现至少一种功能的程序(可按照特定顺序组织计算机数据和指令)。这里的加密媒介是通过密码、系统密钥或硬件密钥等参数(通常加密参数)来“限制和保护用户对软件使用”的媒介。
在相关应用中,每一软件被配备的加密媒介仅被限定对该软件自身进行加密保护,并不能对该软件相关联的关联数据进行加密。这里,与软件相关联的关联数据比如为软件在被使用时待加载的软件配置信息、软件在被运行后产生的结果信息、在软件上新增加的功能等等。也即,上述关联数据虽然与软件相关联,但关联数据的加密均独立于软件自身的加密,不同关联数据的加密分别依赖于其被配备的对应的加密媒介进行加密,以软件依赖于加密媒介a加密为例,则软件在被使用时待加载的软件配置信息依赖于加密媒介b加密、软件在被运行后产生的结果信息依赖于加密媒介c加密、在软件上新增加的功能依赖于加密媒介d加密。如此,当软件加载上述软件配置信息、结果信息、软件上新增加的功能时,则需要加密媒介a融合加密媒介b、加密媒介c、加密媒介d,即同时需要有4个加密媒介,加密非常繁琐。
发明内容
本公开提供了加密方法、装置及电子设备,以实现软件、以及独立于该软件的其他软件使用同一加密媒介进行加密。
本公开实施例提供一种加密方法,该方法包括:在当前已部署的用于对目标软件进 行加密保护的加密媒介中的用户私有区中记录私有加密信息;所述加密媒介还记录有专用于对所述目标软件进行加密保护的目标软件加密信息;在检测到针对所述目标软件相关联的关联数据进行加密的加密触发时,依据所述加密媒介中所述用户私有区记录的与所述关联数据相对应的私有加密信息对所述关联数据进行加密;其中,所述关联数据的加密独立于所述目标软件的加密,所述关联数据包括以下至少一个:所述目标软件的软件配置信息、所述目标软件在被运行后产生的结果信息、自定义功能软件、自定义功能软件的软件配置信息、自定义功能软件在被运行后产生的结果信息;所述自定义功能软件通过在所述目标软件上增加用于实现自定义功能的程序实现。
本公开实施例提供一种加密装置,该装置包括:部署单元,用于在当前已部署的用于对目标软件进行加密保护的加密媒介中的用户私有区中记录私有加密信息;所述加密媒介还记录有专用于对所述目标软件进行加密保护的目标软件加密信息;处理单元,用于在检测到针对所述目标软件相关联的关联数据进行加密的加密触发时,依据所述加密媒介中所述用户私有区记录的与所述关联数据相对应的私有加密信息对所述关联数据进行加密;其中,所述关联数据的加密独立于所述目标软件的加密,所述关联数据包括以下至少一个:所述目标软件的软件配置信息、所述目标软件在被运行后产生的结果信息、自定义功能软件、自定义功能软件的软件配置信息、自定义功能软件在被运行后产生的结果信息;所述自定义功能软件通过在所述目标软件上增加用于实现自定义功能的程序实现。
本公开实施例还提供了一种电子设备。该电子设备包括:处理器和机器可读存储介质;所述机器可读存储介质存储有能够被所述处理器执行的机器可执行指令;所述处理器用于执行机器可执行指令,以实现上述公开的方法的步骤。
由以上技术方案可以看出,本公开中,通过在目标软件被配备的加密媒介中的用户私有区中记录私有加密信息,通过该私有加密信息对目标软件相关联的关联数据进行加密,实现了目标软件、以及目标软件相关联的关联数据使用同一加密媒介加密,降低加密复杂度,提高加密便利。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本公开的实施例,并与说明书一起用于解释本公开的原理。
图1为本公开实施例提供的加密媒介的示例图。
图2为本公开实施例提供的方法流程图。
图3为本公开实施例提供的加密媒介另一示例图。
图4a为本公开实施例提供的用户私有区记录私有加密信息的示例图。
图4b为本公开实施例提供的用户私有区记录私有加密信息的另一示例图。
图5a为本公开实施例提供的解密关联数据的示意图。
图5b为本公开实施例提供的解密关联数据的另一示意图。
图6为本公开实施例提供的装置结构图。
图7为本公开实施例提供的电子设备结构图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开相一致的所有实施方式。相反,它们仅是本公开的一些方面相一致的装置和方法的例子。
在本公开使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开。在本公开中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。
为了使本领域技术人员更好地理解本公开实施例提供的技术方案,下面先对本公开实施例涉及的加密媒介进行描述:
在应用中,如图1所示,加密媒介包含但不限于如下区域:
1)专有读写区:只被授权于原始开发人员,允许原始开发人员写入数据和读取数据。在应用中,专有读写区记录了专用于对与加密媒介相匹配的软件进行加密的加密信息(也称软件加密信息)。
2)公共只读区:允许原始开发人员写入数据和读取数据,允许用户进行数据读取。公共只读区一般作为记录原始开发人员对外表达的信息的途径,让用户知晓原始开发人员想让用户知晓的信息,如最常见的加密媒介的基本信息(型号、开发商等等)。
基于如上描述的加密媒介,在应用中,针对每一软件,可基于该软件被单独配备的 加密媒介在专有读写区记录的软件加密信息,比如密钥、密码等,对该软件进行加密,以对软件自身进行保护。但如背景技术中描述的,与软件相关联的关联数据虽然与软件关联,但其加密均独立于软件自身的加密,不同关联数据的加密分别依赖于其被配备的不同加密媒介进行加密,比如背景技术中描述的软件依赖于加密媒介a加密,软件在被使用时待加载的软件配置信息依赖于加密媒介b加密、软件在被运行后产生的结果信息依赖于加密媒介c加密、在软件上新增加的功能依赖于加密媒介d加密。
基于此,当软件加载其相关联的关联数据时,软件被配备的加密媒介就需要融合关联数据被配备的加密媒介,比如当上述软件融合上述软件配置信息、结果信息、软件上新增加的功能时,则需要加密媒介a融合加密媒介b、加密媒介c、加密媒介d,即同时需要有4个加密媒介,加密非常繁琐,也会引起极大的不便。
为解决上述技术问题,本实施例提供了能解决上述技术问题的加密方法。
图2举例示出了本公开实施例提供的加密方法。
参见图2,图2为本公开实施例提供的方法流程图。可选地,在本实施例中,该方法可应用于电子设备。这里,电子设备可为对软件进行管理或控制的设备,本实施例并不具体限定。
如图2所示,该流程可包括以下步骤:
步骤201,在当前已部署的用于对目标软件进行加密保护的加密媒介中的用户私有区中记录私有加密信息。
这里,目标软件可泛指任一软件。
可选地,在本实施例中,为了解决上述技术问题,则可针对目标软件配备的加密媒介进行如下改进:在加密媒介中设置用户私有区。图3示出了在如图1所示的加密媒介中增加了用户私有区。可选地,在本实施例中,用户私有区在加密媒介中的具体位置并不限定,只要保证不与加密媒介中现有已划分的区域比如专有读写区、公共只读区等冲突即可。
在本实施例中,用户私有区被授权于记录私有加密信息。
为了实现在上述用户私有区中记录私有加密信息,作为一个实施例,可针对上述目标软件配套增加相应的外部接口,以实现通过该外部接口在用户私有区中记录私有加密信息。具体地,如图4a所示,在用户私有区中记录私有加密信息可包括:通过新设置 的上述目标软件对应的外部接口,接收外部写入至用户私有区的私有加密信息。即实现了在用户私有区中记录私有加密信息。
作为另一实施例,还可借用目标软件对应的软件交互界面来实现在用户私有区中记录私有加密信息。具体地,如图4b所示,在用户私有区中记录私有加密信息可包括:通过目标软件对应的软件交互界面接收外部输入的待写入至用户私有区的私有加密信息,将该私有加密信息写入上述用户私有区。即最终实现了在用户私有区中记录私有加密信息。
需要说明的是,在本实施例中,用户私有区中记录的私有加密信息可基于实际需求被动态修改、删除等。
步骤202,在检测到针对目标软件相关联的关联数据进行加密的加密触发时,执行步骤203。
在本实施例中,上述关联数据与目标软件相关联,但关联数据的加密独立于目标软件的加密。可选地,在本实施例中,关联数据包括以下至少一个:目标软件的软件配置信息、目标软件在被运行后产生的结果信息、自定义功能软件、自定义功能软件的软件配置信息、自定义功能软件在被运行后产生的结果信息。需要说明的是,在本实施例中,上述与目标软件相关联的关联数据可根据实际需求定义,比如,上述关联数据也可不涵盖自定义功能软件,而仅涵盖自定义功能软件的软件配置信息、自定义功能软件在被运行后产生的结果信息,等等,本实施例并不一一限定。
在本实施例中,自定义功能软件通过在目标软件上新增加用于实现自定义功能的程序实现,比如在目标软件上新增用户自定义的工具、或者用户自定义的信息等,该新增加的用户自定义的工具、或者用户自定义的信息等可统称自定义功能软件。
按照相关技术中的加密方式,软件的每一关联数据在加密时需配备有对应的加密媒介。而本实施例中,不再针对软件的关联数据配备对应的加密媒介,通过在软件被配备的加密媒介中扩展用户私有区来实现对关联数据的加密,具体见步骤203。这里暂不赘述。
在本实施例中,上述电子设备会对外提供一个界面,该界面可为上述目标软件的交互界面,也可为对目标软件进行管理的管理界面(不同于该目标软件的交互界面)。但不管哪一界面,在本实施例中,在检测到针对目标软件相关联的关联数据进行加密的加密触发时(例如,在上述界面上设置关联数据相关联的触发标识(比如按钮等),如果 检测到上述触发标识被触发,则检测到对该关联数据进行加密的加密触发),可及时获知相对应的关联数据以进行加密。
步骤203,依据加密媒介中上述用户私有区记录的与该关联数据相对应的私有加密信息,对该关联数据进行加密。
作为一个实施例,上述用户私有区可记录一个私有加密信息。该私有加密信息可用于对目标软件相关联的所有关联数据进行加密。也就是说,上述用户私有区记录的私有加密信息与所有该目标软件的关联数据相对应。
作为一个实施例,上述用户私有区可记录两个以上私有加密信息,以对应至少两个不同关联数据,比如,上述用户私有区可记录以下三个私有加密信息:密钥a1、密钥a2、密钥a3,目标软件的软件配置信息与上述用户私有区记录的密钥a1对应,目标软件在被运行后产生的结果信息与密钥a2对应,自定义功能软件与密钥a3对应,则在针对目标软件相关联的关联数据进行加密时,先识别该关联数据具体是什么,比如关联数据为软件配置信息,则基于上述用户私有区记录的密钥a1对软件配置信息进行加密,再比如关联数据为上述结果信息,则基于上述用户私有区记录的密钥a2对结果信息进行加密,依次类推。
需要说明的是,在本实施例中,自定义功能软件的软件配置信息、自定义功能软件在被运行后产生的结果信息对应的私有加密信息可相同,比如都可为自定义功能软件对应的私有加密信息。当然,自定义功能软件的软件配置信息、自定义功能软件在被运行后产生的结果信息对应的私有加密信息也可不同,比如上述用户私有区可额外定义两类私有加密信息,其中一类为自定义功能软件的软件配置信息对应的私有加密信息,另一类为自定义功能软件在被运行后产生的结果信息所对应的私有加密信息,等,本实施例并不一一限定。
最终,通过上述步骤203,本实施例实现了通过软件被配备的加密媒介对与软件相关联的关联数据进行加密。
通过图2所示流程可以看出,在本实施例中,通过在目标软件被配备的加密媒介中的用户私有区中记录私有加密信息,通过该私有加密信息对目标软件相关联的关联数据进行加密,实现了目标软件、以及目标软件相关联的关联数据使用同一加密媒介加密,降低加密复杂度,提高加密便利。
可选地,在本实施例中,若所述关联数据包括以下至少一个:目标软件在被运行时 的软件配置信息、目标软件在被运行后产生的结果信息、自定义功能软件的软件配置信息、自定义功能软件在被运行后产生的结果信息,则在上述步骤203依据加密媒介中用户私有区记录的与关联数据相对应的私有加密信息对关联数据进行加密之后,该方法进一步包括:在接收到需将上述被加密的关联数据加载至所述目标软件上运行的加载触发时,按照重叠加密对应的解密方式对被加密的关联数据进行解密。具体如图5a所示。
如图5a所示,在按照重叠加密对应的解密方式对被加密的关联数据进行解密时,从上述目标软件被配备的加密媒介中读取目标软件加密信息和上述被加密的关联数据相对应的私有加密信息,并分别对读取的目标软件加密信息和私有加密信息进行校验,若校验通过,则将被加密的关联数据解密并加载至目标软件上运行;否则,显示加载失败。
可选地,在本实施例中,在上述步骤203依据加密媒介中用户私有区记录的与关联数据相对应的私有加密信息对关联数据进行加密时,会记录当前使用的私有加密信息以及当前记录的目标软件加密信息。基于此,上述对读取的目标软件加密信息和私有加密信息进行校验可包括:检查当前读取的目标软件加密信息是否为之前已记录的在上述步骤203在对关联数据进行加密时的目标软件加密信息,以及检查当前读取的私有加密信息是否为之前已记录的在上述步骤203在对关联数据进行加密时的私有加密信息,如果是,则确定校验通过,否则,校验失败。
可以看出,在本实施例中,若上述关联数据包括以下至少一个:目标软件在被运行时的软件配置信息、目标软件在已被运行后产生的结果信息、自定义功能软件的软件配置信息、自定义功能软件在已被运行后产生的结果信息,则在上述步骤203中虽然利用私用加密信息对关联数据进行加密,其隐含着关联数据的重叠加密。对应地,一旦需要加载该关联数据时,则需要如上描述,按照重叠加密对应的解密方式对被加密的关联数据进行解密。
在本实施例中,若关联数据至少包括:自定义功能软件;则在上述步骤203依据加密媒介中用户私有区记录的与关联数据相对应的私有加密信息对关联数据进行加密之后,该方法进一步包括:在接收到使用目标软件提供的功能的触发时,按照分布式加密对应的解密提供该功能。具体如图5b所示。
如图5b所示,当接收到使用基于目标软件新开发的自定义功能软件提供的自定义功能的触发时,从加密媒介中读取被加密的自定义功能软件相对应的私有加密信息,对读取的私有加密信息进行校验,若校验通过,则对自定义功能软件进行解密并允许使用自定义功能软件提供的自定义功能,否则,禁止使用自定义功能软件提供的自定义功能; 而当接收到使用目标软件提供的原有功能的触发时,从加密媒介中读取目标软件加密信息,对读取的目标软件加密信息进行校验,若校验通过,则允许使用目标软件提供的原有功能,否则,禁止使用目标软件提供的原有功能。这里,对读取的私有加密信息进行校验、对读取的目标软件加密信息进行校验如上描述,不再赘述。
在本实施例中,即使在用户私有区中记录私有加密信息,该用户私有区中记录的私有加密信息也并非一直不变,也可被更新或者删除。
本实施例中,可通过新设置的目标软件对应的外部接口,或者通过目标软件对应的软件交互界面接收外部输入的用于更新用户私有区中私有加密信息的更新消息,并依据更新消息更新用户私有区中已记录的私有加密信息;比如将用户私有区中已记录的私有加密信息更新为该更新消息携带的私有加密信息等。由此实现了更新用户私有区中的私有加密信息。
本实施例中,当通过新设置的目标软件对应的外部接口或者通过目标软件对应的软件交互界面,接收删除指令时,可依据删除指令删除用户私有区中已记录的私有加密信息。由此实现了删除用户私有区中的私有加密信息。
以上对本公开实施例提供的方法进行了描述,下面对本公开实施例提供的装置进行描述:
参见图6,图6为本公开实施例提供的加密装置结构图。如图6所示,该装置可包括:
部署单元,用于在当前已部署的用于对目标软件进行加密保护的加密媒介中的用户私有区中记录私有加密信息;所述加密媒介还记录有专用于对所述目标软件进行加密保护的目标软件加密信息;
处理单元,用于在检测到针对所述目标软件相关联的关联数据进行加密的加密触发时,依据所述加密媒介中所述用户私有区记录的与所述关联数据相对应的私有加密信息对所述关联数据进行加密;
其中,所述关联数据的加密独立于所述目标软件的加密,所述关联数据包括以下至少一个:所述目标软件的软件配置信息、所述目标软件在被运行后产生的结果信息、自定义功能软件、自定义功能软件的软件配置信息、自定义功能软件在被运行后产生的结果信息;所述自定义功能软件通过在所述目标软件上增加用于实现自定义功能的程序实现。
可选地,当在当前已部署的用于对目标软件进行加密保护的加密媒介中的用户私有区记录私有加密信息时,所述部署单元用于:
通过新设置的所述目标软件对应的外部接口,接收外部写入至所述用户私有区的所述私有加密信息;或者,
通过所述目标软件对应的软件交互界面接收外部输入的待写入至所述用户私有区的所述私有加密信息,将所述私有加密信息写入所述用户私有区。
可选地,若所述关联数据包括以下至少一个:所述目标软件在被运行时的软件配置信息、所述目标软件在被运行后产生的结果信息、自定义功能软件的软件配置信息、自定义功能软件在被运行后产生的结果信息,则处理单元在依据所述加密媒介中所述用户私有区记录的与所述关联数据相对应的私有加密信息对所述关联数据进行加密之后,进一步在接收到将被加密的所述关联数据加载至所述目标软件上运行的加载触发时,从所述加密媒介中读取所述目标软件加密信息、以及被加密的所述关联数据相对应的私有加密信息,并分别对读取的目标软件加密信息和私有加密信息进行校验,若校验通过,则将被加密的所述关联数据解密并加载至所述目标软件上运行;否则,显示加载失败。
若所述关联数据至少包括:所述自定义功能软件,处理单元在依据所述加密媒介中所述用户私有区记录的与所述关联数据相对应的私有加密信息对所述关联数据进行加密之后,进一步在接收到使用所述自定义功能软件提供的自定义功能的触发时,从所述加密媒介中读取被加密的所述自定义功能软件相对应的私有加密信息,对读取的私有加密信息进行校验,若校验通过,则对所述自定义功能软件进行解密并允许使用所述自定义功能软件提供的自定义功能,否则,禁止使用所述自定义功能软件提供的自定义功能;以及,在接收到使用所述目标软件提供的原有功能的触发时,从所述加密媒介中读取所述目标软件加密信息,对所述目标软件加密信息进行校验,若校验通过,则允许使用所述目标软件提供的原有功能,否则,禁止使用所述目标软件提供的原有功能。
可选地,部署单元在用户私有区中记录私有加密信息之后,进一步通过所述目标软件对应的外部接口,或者通过所述目标软件对应的软件交互界面接收外部输入的用于更新所述用户私有区中私有加密信息的更新消息;依据所述更新消息更新所述用户私有区中已记录的私有加密信息;或者,通过所述目标软件对应的外部接口,或者通过所述目标软件对应的软件交互界面,接收删除指令,依据所述删除指令删除所述用户私有区中已记录的私有加密信息。
本公开实施例还提供了图6所示装置的硬件结构。参见图7,图7为本公开实施例提供的电子设备结构图。如图7所示,该硬件结构可包括:处理器和机器可读存储介质,机器可读存储介质存储有能够被所述处理器执行的机器可执行指令;所述处理器用于执行机器可执行指令,以实现本公开上述示例公开的方法。
基于与上述方法同样的申请构思,本公开实施例还提供一种机器可读存储介质,所述机器可读存储介质上存储有若干计算机指令,所述计算机指令被处理器执行时,能够实现本公开上述示例公开的方法。
示例性的,上述机器可读存储介质可以是任何电子、磁性、光学或其它物理存储装置,可以包含或存储信息,如可执行指令、数据,等等。例如,机器可读存储介质可以是:RAM(Radom Access Memory,随机存取存储器)、易失存储器、非易失性存储器、闪存、存储驱动器(如硬盘驱动器)、固态硬盘、任何类型的存储盘(如光盘、dvd等),或者类似的存储介质,或者它们的组合。
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机,计算机的具体形式可以是个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件收发设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任意几种设备的组合。
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本公开时可以把各单元的功能在同一个或多个软件和/或硬件中实现。
本领域内的技术人员应明白,本公开的实施例可提供为方法、系统、或计算机程序产品。因此,本公开可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本公开实施例可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本公开是参照根据本公开实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可以由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其它可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其它可编程数据处理设备的处理器执行的指令 产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
而且,这些计算机程序指令也可以存储在能引导计算机或其它可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或者多个流程和/或方框图一个方框或者多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其它可编程数据处理设备上,使得在计算机或者其它可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其它可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
以上所述仅为本公开的实施例而已,并不用于限制本公开。对于本领域技术人员来说,本公开可以有各种更改和变化。凡在本公开的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本公开的权利要求范围之内。

Claims (16)

  1. 一种加密方法,包括:
    在当前已部署的用于对目标软件进行加密保护的加密媒介中的用户私有区记录私有加密信息;所述加密媒介还记录有专用于对所述目标软件进行加密的目标软件加密信息;
    在检测到针对所述目标软件相关联的关联数据进行加密的加密触发时,依据所述加密媒介中所述用户私有区记录的与所述关联数据相对应的私有加密信息对所述关联数据进行加密;
    其中,所述关联数据的加密独立于所述目标软件的加密,所述关联数据包括以下至少一个:所述目标软件的软件配置信息、所述目标软件在被运行后产生的结果信息、自定义功能软件、自定义功能软件的软件配置信息、自定义功能软件在被运行后产生的结果信息;所述自定义功能软件通过在所述目标软件上增加用于实现自定义功能的程序实现。
  2. 根据权利要求1所述的方法,其中,所述在当前已部署的用于对目标软件进行加密保护的加密媒介中的用户私有区记录私有加密信息包括:
    通过所述目标软件对应的外部接口,接收外部写入至所述用户私有区的所述私有加密信息;或者,
    通过所述目标软件对应的软件交互界面接收外部输入的待写入至所述用户私有区的所述私有加密信息,将所述私有加密信息写入所述用户私有区。
  3. 根据权利要求1所述的方法,其中,
    若所述关联数据包括以下至少一个:所述目标软件在被运行时的软件配置信息、所述目标软件在被运行后产生的结果信息、自定义功能软件的软件配置信息、自定义功能软件在被运行后产生的结果信息,则在依据所述加密媒介中所述用户私有区记录的与所述关联数据相对应的私有加密信息对所述关联数据进行加密之后,该方法进一步包括:
    在接收到将被加密的所述关联数据加载至所述目标软件上运行的加载触发时,从所述加密媒介中读取所述目标软件加密信息、以及被加密的所述关联数据相对应的私有加密信息,并分别对读取的目标软件加密信息和私有加密信息进行校验,若校验通过,则将被加密的所述关联数据解密并加载至所述目标软件上运行。
  4. 根据权利要求1所述的方法,其中,
    若所述关联数据至少包括:所述自定义功能软件;在依据所述加密媒介中所述用户私有区记录的与所述关联数据相对应的私有加密信息对所述关联数据进行加密之后,该 方法进一步包括:
    在接收到使用所述自定义功能软件提供的自定义功能的触发时,从所述加密媒介中读取被加密的所述自定义功能软件相对应的私有加密信息,对读取的私有加密信息进行校验,若校验通过,则对所述自定义功能软件进行解密并允许使用所述自定义功能软件提供的自定义功能,若校验不通过,禁止使用所述自定义功能软件提供的自定义功能。
  5. 根据权利要求4所述的方法,其中,该方法进一步包括:
    在接收到使用所述目标软件提供的原有功能的触发时,从所述加密媒介中读取所述目标软件加密信息,对所述目标软件加密信息进行校验,若校验通过,则对所述述目标软件解密并允许使用所述目标软件提供的原有功能,若校验不通过,禁止使用所述目标软件提供的原有功能。
  6. 根据权利要求1至5任一所述的方法,其中,在当前已部署的用于对目标软件进行加密保护的加密媒介中的用户私有区记录私有加密信息之后,该方法进一步包括:
    通过所述目标软件对应的外部接口,或者通过所述目标软件对应的软件交互界面接收外部输入的用于更新所述用户私有区中私有加密信息的更新消息;
    依据所述更新消息更新所述用户私有区中已记录的私有加密信息。
  7. 根据权利要求1至5任一所述的方法,其中,在当前已部署的用于对目标软件进行加密保护的加密媒介中的用户私有区记录私有加密信息之后,该方法进一步包括:
    通过所述目标软件对应的外部接口,或者通过所述目标软件对应的软件交互界面,接收删除指令;
    依据所述删除指令删除所述用户私有区中已记录的私有加密信息。
  8. 一种加密装置,包括:
    部署单元,用于在当前已部署的用于对目标软件进行加密保护的加密媒介中的用户私有区中记录私有加密信息;所述加密媒介还记录有专用于对所述目标软件进行加密的目标软件加密信息;
    处理单元,用于在检测到针对所述目标软件相关联的关联数据进行加密的加密触发时,依据所述加密媒介中所述用户私有区记录的与所述关联数据相对应的私有加密信息对所述关联数据进行加密;
    其中,所述关联数据的加密独立于所述目标软件的加密,所述关联数据包括以下至少一个:所述目标软件的软件配置信息、所述目标软件在被运行后产生的结果信息、自定义功能软件、自定义功能软件的软件配置信息、自定义功能软件在被运行后产生的结果信息;所述自定义功能软件通过在所述目标软件上增加用于实现自定义功能的程序实 现。
  9. 根据权利要求8所述的加密装置,其中,当在当前已部署的用于对目标软件进行加密保护的加密媒介中的用户私有区记录私有加密信息时,所述部署单元用于:
    通过所述目标软件对应的外部接口,接收外部写入至所述用户私有区的所述私有加密信息;或者,
    通过所述目标软件对应的软件交互界面接收外部输入的待写入至所述用户私有区的所述私有加密信息,将所述私有加密信息写入所述用户私有区。
  10. 根据权利要求8所述的加密装置,其中,
    若所述关联数据包括以下至少一个:所述目标软件在被运行时的软件配置信息、所述目标软件在被运行后产生的结果信息、自定义功能软件的软件配置信息、自定义功能软件在被运行后产生的结果信息,则所述处理单元在依据所述加密媒介中所述用户私有区记录的与所述关联数据相对应的私有加密信息对所述关联数据进行加密之后,进一步用于在接收到将被加密的所述关联数据加载至所述目标软件上运行的加载触发时,从所述加密媒介中读取所述目标软件加密信息、以及被加密的所述关联数据相对应的私有加密信息,并分别对读取的目标软件加密信息和私有加密信息进行校验,若校验通过,则将被加密的所述关联数据解密并加载至所述目标软件上运行。
  11. 根据权利要求8所述的加密装置,其中,
    若所述关联数据至少包括:所述自定义功能软件,所述处理单元在依据所述加密媒介中所述用户私有区记录的与所述关联数据相对应的私有加密信息对所述关联数据进行加密之后,进一步用于在接收到使用所述自定义功能软件提供的自定义功能的触发时,从所述加密媒介中读取被加密的所述自定义功能软件相对应的私有加密信息,对读取的私有加密信息进行校验,若校验通过,则对所述自定义功能软件进行解密并允许使用所述自定义功能软件提供的自定义功能,若校验不通过,禁止使用所述自定义功能软件提供的自定义功能。
  12. 根据权利要求11所述的加密装置,其中,
    所述处理单元进一步用于在接收到使用所述目标软件提供的原有功能的触发时,从所述加密媒介中读取所述目标软件加密信息,对所述目标软件加密信息进行校验,若校验通过,则允许使用所述目标软件提供的原有功能,若校验不通过,禁止使用所述目标软件提供的原有功能。
  13. 根据权利要求8至12任一所述的加密装置,其中,部署单元在用户私有区中记录私有加密信息之后,进一步通过所述目标软件对应的外部接口,或者通过所述目标 软件对应的软件交互界面接收外部输入的用于更新所述用户私有区中私有加密信息的更新消息;依据所述更新消息更新所述用户私有区中已记录的私有加密信息。
  14. 根据权利要求8至12任一所述的加密装置,其中,部署单元在用户私有区中记录私有加密信息之后,进一步通过所述目标软件对应的外部接口,或者通过所述目标软件对应的软件交互界面,接收删除指令,依据所述删除指令删除所述用户私有区中已记录的私有加密信息。
  15. 一种电子设备,包括:处理器和机器可读存储介质;
    所述机器可读存储介质存储有能够被所述处理器执行的机器可执行指令;
    所述处理器用于执行机器可执行指令,以实现权利要求1-7任一项的方法步骤。
  16. 一种非易失性存储介质,其上存储有计算机指令,当所述计算机指令被处理器调用时,所述处理器执行权利要求1-7任一项所述的方法步骤。
PCT/CN2023/080773 2022-03-21 2023-03-10 加密方法、装置及电子设备 WO2023179378A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210280533.4A CN114676394A (zh) 2022-03-21 2022-03-21 加密方法、装置及电子设备
CN202210280533.4 2022-03-21

Publications (1)

Publication Number Publication Date
WO2023179378A1 true WO2023179378A1 (zh) 2023-09-28

Family

ID=82074570

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/080773 WO2023179378A1 (zh) 2022-03-21 2023-03-10 加密方法、装置及电子设备

Country Status (2)

Country Link
CN (1) CN114676394A (zh)
WO (1) WO2023179378A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114676394A (zh) * 2022-03-21 2022-06-28 杭州海康机器人技术有限公司 加密方法、装置及电子设备
CN117992991B (zh) * 2024-04-03 2024-06-25 深圳九有数据库有限公司 基于多粒度的数据库数据加密方法及设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH05298085A (ja) * 1992-04-24 1993-11-12 Fujitsu Ltd ソフトウェア記憶媒体、ソフトウェア読取装置及びソフトウェア管理システム
JPH0695871A (ja) * 1992-04-24 1994-04-08 Fujitsu Ltd ソフトウェア記憶媒体、ソフトウェア読取装置及びソフトウェア管理システム
CN109840435A (zh) * 2017-11-27 2019-06-04 深圳市朗科科技股份有限公司 一种存储设备的数据保护方法
US20220067179A1 (en) * 2020-08-10 2022-03-03 Sap Se Executing encrypted data using secure enclave
CN114676394A (zh) * 2022-03-21 2022-06-28 杭州海康机器人技术有限公司 加密方法、装置及电子设备

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH05298085A (ja) * 1992-04-24 1993-11-12 Fujitsu Ltd ソフトウェア記憶媒体、ソフトウェア読取装置及びソフトウェア管理システム
JPH0695871A (ja) * 1992-04-24 1994-04-08 Fujitsu Ltd ソフトウェア記憶媒体、ソフトウェア読取装置及びソフトウェア管理システム
CN109840435A (zh) * 2017-11-27 2019-06-04 深圳市朗科科技股份有限公司 一种存储设备的数据保护方法
US20220067179A1 (en) * 2020-08-10 2022-03-03 Sap Se Executing encrypted data using secure enclave
CN114676394A (zh) * 2022-03-21 2022-06-28 杭州海康机器人技术有限公司 加密方法、装置及电子设备

Also Published As

Publication number Publication date
CN114676394A (zh) 2022-06-28

Similar Documents

Publication Publication Date Title
WO2023179378A1 (zh) 加密方法、装置及电子设备
CN109416720B (zh) 跨重置维护操作系统秘密
US8856553B2 (en) Managing self-encrypting drives in decentralized environments
US6834333B2 (en) Data processing device, data storage device, data processing method, and program providing medium for storing content protected under high security management
TWI312952B (en) Method of protecting information in a data storage device and data storage device for use with a host computer
KR101888712B1 (ko) 운영 체제 구성 값 보호 기법
US7912223B2 (en) Method and apparatus for data protection
US20100058066A1 (en) Method and system for protecting data
EP3103048B1 (en) Content item encryption on mobile devices
KR102030858B1 (ko) 디지털 서명 권한자 의존형 플랫폼 기밀 생성 기법
JP2007207239A (ja) セキュリティ応用のための柔軟性を有し保護されたアクセスを与える記憶装置
US9660986B2 (en) Secure access method and secure access device for an application program
US10592679B2 (en) Support for changing encryption classes of files
CN105612715A (zh) 具有可配置访问控制的安全处理单元
WO2015176531A1 (zh) 终端数据写入、读取的方法及装置
US20190377878A1 (en) Secure Drive
KR102446985B1 (ko) 암호화폐 지갑을 위한 키 관리 메커니즘
US9003201B2 (en) Hardware protection for encrypted strings and protection of security parameters
US7694154B2 (en) Method and apparatus for securely executing a background process
EP2689367A1 (en) Data protection using distributed security key
US20090119744A1 (en) Device component roll back protection scheme
US9411984B2 (en) Cryptographic processing apparatus, cryptographic processing system, and cryptographic processing method
US7249260B2 (en) Method and apparatus for implementing a pluggable password obscuring mechanism
US9251382B2 (en) Mapping encrypted and decrypted data via key management system
JPH09282235A (ja) アクセス制御方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23773627

Country of ref document: EP

Kind code of ref document: A1