Program protection method and device
A program protection and encryption algorithm technology, applied in program/content distribution protection, computer security devices, instruments, etc., can solve the problem that software programs cannot be effectively protected, and achieve the effect of increasing the difficulty of cracking, improving efficiency, and protecting source code
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0073] Example one
[0074] figure 1 It is an exemplary flowchart of a method according to an embodiment of the present invention. This embodiment provides a program protection method, and the method may include:
[0075] In the program generation phase, perform the following encryption steps:
[0076] S101. Obtain a first key, where the first password includes a public key and a private key.
[0077] The first key is used to encrypt and protect the second key. The first key belongs to a fixed asymmetric key, including a public key and a private key. The public key is used for encryption and the private key is used for decryption. The private key is non-public, such as the RSA asymmetric encryption and decryption algorithm. The key length It can be 512, 1024, 2048. The larger the key length, the more likely it is to be cracked.
[0078] There are many ways to obtain the first key. For example, you can directly preset a first key, or receive the first key input from the outside, and y...
Example Embodiment
[0101] Example two
[0102] figure 2 It is an exemplary flowchart of the method in the second embodiment of the present invention. This embodiment is based on the foregoing embodiment, and is a further supplement and improvement on the basis of the foregoing embodiment. In principle, this embodiment adds a dynamic update mechanism for the second key on the basis of the previous embodiment, and introduces an expiration period of the second key, thereby further improving security.
[0103] In this embodiment, the second key attribute information further includes expiration period data of the second key;
[0104] Before using the public key of the first key to encrypt the second key attribute information, the method further includes:
[0105] S201. Obtain expiration period data of the second key.
[0106] The expiration period data of the second key may include the expiration period of the second key and the time when the second key expires next time (that is, the expiration time of the...
Example Embodiment
[0123] Example three
[0124] On the basis of the above-mentioned embodiments, the present invention will be further described below in combination with specific scenarios.
[0125] image 3 It is an exemplary flowchart of the method in Embodiment 3 of the present invention.
[0126] S301. Obtain seed data of the first key. For example, it can be obtained based on data input by the user.
[0127] S302. Use an asymmetric encryption and decryption algorithm (such as RSA) to generate a first key (including a public key and a private key).
[0128] S303. Use a private encryption algorithm to further encrypt the first key, and serialize the ciphertext of the first key to a disk file, where the public key is saved as a public.ks file, and the private key is saved as a private.ks file .
[0129] S304. Obtain the name of the specified class and the expiration period of the second key (for example, 90 days). For example, it can be obtained based on data input by the user.
[0130] S305. Use dyn...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap