Software and hardware combined program protecting method
A technology for protecting programs, software and hardware, applied in the field of protection programs combining software and hardware, can solve problems such as slow calculation speed, illegal cracking, and low speed, and achieve the effect of increasing speed and increasing difficulty
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment approach
[0042] According to a specific implementation manner, the authority judging unit 12 is an IC card reader, and the IC card inserted therein is the basis for judging whether the target program has execution authority;
Embodiment approach
[0043] According to another specific implementation manner, the authority judging unit 12 is a USB interface, and the USBkey inserted therein is the basis for judging whether the target program has the execution authority;
[0044] The encryption and decryption unit 13 is used for encrypting and decrypting the target program stored in the program running unit 11 .
[0045] According to another specific implementation manner, the encryption operation may be performed by the program execution unit 11 instead of the encryption and decryption unit 13 .
[0046] The encryption and decryption unit 13 can be a high-speed encryption and decryption chip, and the algorithm adopted by the high-speed encryption and decryption chip can be symmetric key algorithms such as SCB2, SSF33, DES, AES, or asymmetric key algorithms such as RSA; The high-speed encryption and decryption chip is completed by high-speed FPGA or dedicated ASIC chip, and has security mechanisms such as anti-cracking.
[...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 