Unlock instant, AI-driven research and patent intelligence for your innovation.

Software and hardware combined program protecting method

A technology for protecting programs, software and hardware, applied in the field of protection programs combining software and hardware, can solve problems such as slow calculation speed, illegal cracking, and low speed, and achieve the effect of increasing speed and increasing difficulty

Active Publication Date: 2010-07-21
AEROSPACE INFORMATION
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 2. The serial number is required when the software is running, otherwise it is a trial version, which usually limits the functions or usable time;
[0007] 4. To encrypt the data used by the software, the encryption algorithm is usually implemented by the software; the security algorithm implemented by the software has a slow calculation speed and becomes the bottleneck of software security protection;
[0010] The dongle is usually the medium that carries the authority certificate and encryption algorithm. The speed of encryption and decryption is low. The speed of data transmission after encryption and decryption is also limited by hardware conditions such as USB interface or parallel interface. In addition, the communication protocol of USB interface or parallel interface It is public and vulnerable to the control of detection and monitoring programs, providing a breakthrough for illegal cracking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software and hardware combined program protecting method
  • Software and hardware combined program protecting method
  • Software and hardware combined program protecting method

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0042] According to a specific implementation manner, the authority judging unit 12 is an IC card reader, and the IC card inserted therein is the basis for judging whether the target program has execution authority;

Embodiment approach

[0043] According to another specific implementation manner, the authority judging unit 12 is a USB interface, and the USBkey inserted therein is the basis for judging whether the target program has the execution authority;

[0044] The encryption and decryption unit 13 is used for encrypting and decrypting the target program stored in the program running unit 11 .

[0045] According to another specific implementation manner, the encryption operation may be performed by the program execution unit 11 instead of the encryption and decryption unit 13 .

[0046] The encryption and decryption unit 13 can be a high-speed encryption and decryption chip, and the algorithm adopted by the high-speed encryption and decryption chip can be symmetric key algorithms such as SCB2, SSF33, DES, AES, or asymmetric key algorithms such as RSA; The high-speed encryption and decryption chip is completed by high-speed FPGA or dedicated ASIC chip, and has security mechanisms such as anti-cracking.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a program protecting method with software and hardware combined, comprising the following steps: (1) an encryption key is figured out; (2) a target program stored in a program running unit is enciphered by an encryption and decryption algorithm according to the encryption key; (3) the program running unit combines a program and data in a file group to generate a new target file; (4) the target file is run; (5) the encryption key is figured out and is sent to an encryption and decryption unit; (6) the encryption and decryption unit uses a decryption program and decrypts the enciphered target program by the encryption and decryption algorithm according to the encryption key; (7) the process is finished. The program protecting method with software and hardware combinedwhich is provided by the invention adopts a manner in which the software is combined with the hardware to protect the program, thus improving the running speed of the program and adding difficulty onthe program decryption.

Description

technical field [0001] The invention relates to the field of software safety protection, in particular to a method for protecting programs combining software and hardware. Background technique [0002] Software programs are often subject to illegal cracking, tampering and accidental damage, causing great losses to intellectual property rights and data and code security. Traditional software program protection strategies focus on the separate implementation of software algorithms or hardware, and fail to organically combine software and hardware. [0003] The current methods to prevent software piracy and cracking mainly include the following: [0004] 1. Protect the medium that carries the software—CD; [0005] 2. The serial number is required when the software is running, otherwise it is a trial version, which usually limits the functions or usable time; [0006] 3. Remove program debugging information and use software to encrypt the program; [0007] 4. To encrypt the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F21/22G06F21/12
Inventor 陈江宁甘景全崔志民李利王永志
Owner AEROSPACE INFORMATION