Web3D encryption method based on dongle

An encryption method and dongle technology, applied in the direction of digital data authentication, etc., can solve the problems of inability to modify, poor flexibility, resource misappropriation, etc., to shorten the development cycle, prevent misappropriation and cracking, and enhance security strength.

Inactive Publication Date: 2013-06-05
FUZHOU UNIV
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 3. In terms of security, although web3d ultimately compresses all resources and codes into a single file, it is not easy to steal, but if third-party software or some cracked software is used, the resources will still be blocked. stolen
Therefore, in terms of the final packaging and release method of resources and security, this will depend on the selected software, which cannot be modified by secondary development technicians
[0011] 2. In the traditional web software encryption methods, there are network dongles specially designed by the manufacturer, and there are also dongles installed on a certain machine in the network, and the encrypted client programs are installed on all clients. Although these solutions Both can play a good role in protecting resources, but they all have the characteristics of high cost and poor flexibility.
In addition, since web3d is different from ordinary web, it also needs plug-ins and components, so the encryption method that directly refers to the traditional web will have obvious deficiencies in web3d

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web3D encryption method based on dongle
  • Web3D encryption method based on dongle
  • Web3D encryption method based on dongle

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0039] Such as figure 1 As shown, the main structure of the scheme may include three parts: dongle key processing part 10, web interface part 20, and application software verification part 30.

[0040] Among them, in order to prevent illegal copying of the program and the theft of dongle information, the dongle key processing part 10 of this solution encrypts key data by combining software and hardware.

[0041] 1. In terms of hardware, software developers must first understand the internal settings and usage methods, reading and writing tools and drivers of the dongle. You can directly use the API interface provided by the dongle manufacturer and the corresponding dynamic link library file DLL to carry out a new design for the seed and product identification number (PID). Finally, use the HAMC-MD5 key (seed) in the dongle hardware The HMAC-M...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a Web3D encryption method based on a dongle, in particular to a data encryption method through the USB (Universal Serial Bus) dongle under the condition of low costs. According to the encryption method, the whole Web3D operation interface is subjected to encryption protection by utilizing the USB dongle, namely, a user can perform a three-dimensional interactive operation on a browser only when the dongle is inserted into a client server, as long as no dongle is detected, the interface is locked, so that illegal embezzlement and access of data is prevented. Compared with other specialized dongles, ordinary dongles has low price. Besides, the Web3D encryption method based on the dongle is applicable to Web3D files of different formats and flexible.

Description

technical field [0001] The invention relates to encryption protection based on web3d, in particular to a data encryption method carried out through a USB dongle under the premise of low cost. Background technique [0002] Web3d, also known as virtual three-dimensional, is a kind of virtual reality technology based on virtual reality technology, using 3D Internet platform to display tangible objects in the real world through the Internet in virtual three-dimensional stereoscopic display and interactive browsing operation. Although there are many professional development solutions for the network virtual 3D environment and many web3d application software have been launched, they all have the following common characteristics: [0003] 1. In terms of packaging, web3d application software will eventually create a single file, and then transmit it on the website served by HTTP; [0004] 2. In terms of release, to enable 3D to run on the web, it is often necessary to install the 3...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/34
Inventor 陈国栋叶楠潘翔王杰雄陈怡
Owner FUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products