Encryption method for program

A program and application technology, applied in the direction of instruments, electrical digital data processing, digital data processing components, etc., can solve the problems of not being able to guarantee that it will not be stolen, wasting money and time, and losing the rights of designers

Inactive Publication Date: 2008-04-30
MOXA INC
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since most of the software in the embedded Linux operating system (Embedded Linux System) is readable, when the designer designs the application program using the embedded Linux operating system (Embedded Linux System), the user only needs to After logging into the system, it can be copied (COPY) and used, so that the application program designed by the designer can be easily stolen on a similar or identical device, and the user can directly supply the device without going through the designer. The manufacturer purchases the device, and then loads the copied (COPY) application program to the device, and loses the designer's due rights
Therefore, most designers abandon the embedded Linux operating system (Embedded Linux System) and use a dedicated operating system, which will be a waste of money and time for designers, and there is no guarantee that it will not be stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method for program
  • Encryption method for program
  • Encryption method for program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Please refer to shown in Fig. 1, it is the action flowchart of the present invention in use, can clearly find out from the figure, the present invention utilizes embedded Linux operating system (Embedded Linux System) as design platform, on the designed application program , set the key (KEY), and this key (KEY) can only be written and cannot be read in the application program, but the Linux microkernel (Kernel) of the embedded Linux operating system (EmbeddedLinux System) can read this key (KEY) ), and then use the computer platform to encode the application program (Coding: convert the input message sequence into a code sequence) and compile (Compiler: translate the original program into an executable program), so that the application program becomes an executable file, and continue the application software Add another file header to the execution file, and all the content of this file header will be calculated according to the key (KEY) and the conversion table define...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The program enciphering method comprises: with embedded Linux OS as platform, setting the key fit to write only during application, while using the Linux micro-kernel to read the key; coding and compiling the program into executive file; adding a file head to the pre-defined conversion table to prevent copying by user.

Description

technical field [0001] The invention relates to a program encryption method, especially a method for encrypting an application program designed by a designer using an embedded Linux operating system (Embedded Linux System) as a design platform to prevent users from copying (Copy). Background technique [0002] According to the definition of the British Institute of Electrical Engineers, an embedded system (Embedded System) should be a device that controls, monitors or assists equipment, machines or even factory operations, and an embedded system is a system that combines computer software and hardware, and It can comply with the principle of "tailor-made", that is, a system developed based on a special purpose, and because the embedded system can improve product stability, portability, reduce product cost, and increase specific functions, etc., So it has been widely used. At present, common embedded operating systems include VxWORK, QNX, Palm OS, Windos CE, Linux, etc. Amon...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F1/00
Inventor 游胜义
Owner MOXA INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products