Method for protecting encrpytion software

An encryption software, encryption authentication technology, applied in the direction of program/content distribution protection, instruments, electrical digital data processing, etc., can solve the problems of slow access speed, affecting system performance, high risk of being cracked, to avoid performance loss, increase The effect of cracking the difficulty

Active Publication Date: 2010-11-03
广州芯德通信科技股份有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since access to the encryption chip is based on serial IO control, the access speed will be relatively slow, and the general interaction cycle will reach more than 20ms. In the traditional single-thread encryption protection method, the entire system must wait for the encryption authentication process to execute during the encryption authentication proc

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting encrpytion software
  • Method for protecting encrpytion software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Describe in detail below in conjunction with specific implementation plan:

[0021] The key function thread that adopts in this specific embodiment only adopts one, namely key function thread C, but this does not affect the scope of protection of the present invention, because can add a plurality of key function threads as required, carry out multiple nesting authentication by inter-thread communication , in order to increase protection.

[0022] This method is used to perform multi-threaded hardware encryption authentication by adopting a general encryption chip, and has an encryption memory chip. Its hardware connection is as follows figure 1 shown. Since the MCU and the encryption memory chip use a serial interface for communication, such as SPI or I2C, the recommended encryption memory chip has only 8 pins and is packaged in SOIC, which occupies a relatively small space (7mm×5.5mm) and is low in cost. , it is easy to increase, and it is also very convenient to tr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for protecting encryption software, which features multi-threading nesting and combination of flexibility, security and high performance. The method of the invention is an encryption authentication method which adopts encryption chips to carry out multithreads; the multithreads consist of a key thread, a key management thread and a key function thread, wherein, the key thread takes charge of encryption authentication process, and the key management thread and the key function thread take charge of post-authentication processing procedures; multi-nest authentication is carried out among the multithreads. The method of the invention can not only well avoid property loss but also greatly increase the difficulty of cracking software.

Description

technical field [0001] The invention relates to a software protection method for preventing illegal copying or plagiarism of software, in particular to a method for protecting encryption software. Background technique [0002] With the development of science and technology, software plays an increasingly important role in new products. In order to protect the intellectual property rights of products and prevent illegal copying and plagiarism, the industry has adopted various methods for encryption protection. [0003] In the traditional general-purpose encryption chip protection method, the encryption access program is generally embedded in a single thread, and the system accesses the encryption chip every time it executes to a specific position, and waits for the encrypted authentication information to return before executing the normal program flow. Since access to the encryption chip is based on serial IO control, the access speed will be relatively slow, and the general...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/22G06F21/12
Inventor 刘钢郭立谭文杰陈春明
Owner 广州芯德通信科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products