Process and device for preventing fraudulent use of terminal software

A terminal software and software technology, applied in the direction of computer security devices, instruments, program/content distribution protection, etc., can solve the problems affecting the profit margin of terminal solution providers and the lack of protection mechanism of terminal solution providers, so as to improve sales profits, The effect of preventing theft

Active Publication Date: 2009-05-20
LEADCORE TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the terminal solution provider, the terminal software produced must be bundled with the chip used for encryption, thus affecting the profit margin of the terminal solution provider
This encryption method is completely subject to the ciphers and algorithms provided by the chip developer, but the terminal solution provider does not have a completely independent set of protection mechanisms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Process and device for preventing fraudulent use of terminal software
  • Process and device for preventing fraudulent use of terminal software
  • Process and device for preventing fraudulent use of terminal software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. The preferred implementation scheme of the present invention is divided into two parts, the encryption process and the decryption process, which are specifically expressed as follows:

[0036] Encryption process: set a plain code, key 1 and key 2, use key 1 to encrypt the plain code to obtain a password, use key 2 to encrypt key 1 to obtain key 3, and store the password and key 3 in the micro In the processor, the key 2 is stored in a memory;

[0037] Decryption process: read the password and key 3 from the microprocessor, read the key 2 from the memory, use the reverse process of the encryption process to decrypt to obtain the plain code, and compare the obtained plain code with the preset plain code Compare the authentication to determine whether they are the same, if they are the same, the decryption is successful, otherwise the dec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method which can prevent the terminal software from being embezzled, the encryption flow is as follows: a plain code, a key1 and a key 2 are set, the key 1 is used to encrypt the plain code to get a password, the key 2 is used to encrypt the key 1 to get a key 3, at last, the password and the key3 are stored in a microprocessor, the key 2 is stored into a memory; the decryption flow is as follows: authentication software reads the password and the key 3 from the microprocessor, and the key2 is read from the memory, the decryption is performed to get the plain code, the plain code is used to judge whether the plain code is as same as the pre-set plain code, if the plain code is as same as the pre-set plain code, then the decryption is successful, otherwise, the decryption is failure. At the same time, a device which prevents the terminal software from being embezzled is disclosed, the device includes a microprocessor used to store the password and the key3; a memory used to store the key2, and a processor unit used to implement the authentication of terminal software. Through the present invention, the terminal scheme provider is enabled to possess a set of completely independent terminal software protection mechanisms.

Description

technical field [0001] The invention relates to a technique for preventing terminal software from being stolen, in particular to a software encryption and decryption method and device. Background technique [0002] As a special commodity, computer software is very easy to be copied and used, so software encryption has become a necessary means to protect software. In the field of mobile communication, the terminal software plays a decisive role in whether the relevant mobile equipment can start and run normally. Therefore, the protection of the terminal software has become a major focus in the field of mobile communication. [0003] The current popular terminal software encryption and decryption technology is the cooperation between the terminal solution provider and the chip developer to protect the terminal software. The chip developer writes the verification code inside the chip, and the terminal solution provider writes the verification code in the external FLASH. When t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F21/12
Inventor 陶小平
Owner LEADCORE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products