Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Program protection method and device

A program protection and encryption algorithm technology, applied in program/content distribution protection, computer security devices, instruments, etc., can solve the problem that software programs cannot be effectively protected, and achieve the effect of increasing the difficulty of cracking, improving efficiency, and protecting source code

Active Publication Date: 2014-06-11
BEIJING AUTONAVI YUNMAP TECH CO LTD
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of the embodiments of the present invention is to provide a program protection method and device to solve the technical problem that software programs cannot be effectively protected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Program protection method and device
  • Program protection method and device
  • Program protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0074] figure 1 It is an exemplary flow chart of a method in Embodiment 1 of the present invention. This embodiment provides a program protection method, the method may include:

[0075] During the program generation phase, the following encryption steps are performed:

[0076] S101. Acquire a first key, where the first password includes a public key and a private key.

[0077] The first key is used to encrypt and protect the second key. The first key belongs to a fixed asymmetric key, including a public key and a private key, encrypted with the public key and decrypted with the private key, where the private key is not public, such as using the RSA asymmetric encryption and decryption algorithm, the length of the key It can be 512, 1024, or 2048. The larger the key length, the closer to zero the possibility of being cracked.

[0078] There are many ways to obtain the first key. For example, you can directly preset a first key, or receive the first key input from the outsi...

Embodiment 2

[0102] figure 2 It is an exemplary flow chart of the method in Embodiment 2 of the present invention. This embodiment is based on the foregoing embodiments, and is a further supplement and improvement on the basis of the foregoing embodiments. In principle, on the basis of the previous embodiment, this embodiment adds a dynamic update mechanism for the second key and introduces an expiration period for the second key, thereby further improving security.

[0103] In this embodiment, the second key attribute information further includes expiration period data of the second key;

[0104] Before using the public key of the first key to encrypt the attribute information of the second key, it further includes:

[0105] S201. Acquire expiration period data of the second key.

[0106] The expiration period data of the second key may include the expiration period of the second key and the next expiration time of the second key (that is, the termination time of the current validity ...

Embodiment 3

[0124] On the basis of the foregoing embodiments, the present invention will be further described below in conjunction with specific scenarios.

[0125] image 3 It is an exemplary flow chart of the method in Embodiment 3 of the present invention.

[0126] S301. Acquire seed data of the first key. For example, it may be obtained based on data input by the user.

[0127] S302. Generate a first key (including a public key and a private key) using an asymmetric encryption and decryption algorithm (such as RSA).

[0128] S303. Use a private encryption algorithm to further encrypt the first key, and serialize the ciphertext of the first key to a disk file, wherein the public key is saved as a public.ks file, and the private key is saved as a private.ks file .

[0129] S304. Obtain the name of the specified class and the expiration period of the second key (for example, 90 days). For example, it may be obtained based on data input by the user.

[0130] S305. Use the dynamic in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a program protection method and device. The method comprises the following steps of encryption at a program generation stage: acquiring a first secrete key; acquiring a second secrete key and a mark of a designated category; encrypting the designated category by utilizing the second secrete key; encrypting the attribute information of the second secrete key by utilizing a public key of the first secrete key; decryption at a program running stage: decrypting encrypted data of the attribute information of the second secrete key by utilizing a private key of the first secrete key; judging whether the to-be-loaded category belongs to the designated category or not according to the mark of the designated category, and decrypting the to-be-loaded category by utilizing the second secrete key if the to-be-loaded category belongs to the designated category. The first secrete key and the second secrete key are used for doubly encrypting the program, so that the source code of the program can be effectively protected; meanwhile, the program is also distinguished, and only the designated category is encrypted, so that the encryption and decryption efficiency can be improved; moreover, the mark of the encrypted category is further encrypted and protected by the second secrete key, so that the safety of the program is further protected.

Description

technical field [0001] The invention relates to the technical field of software encryption and decryption, in particular to a program protection method and device. Background technique [0002] The core algorithm of software is directly related to the competitiveness of software products, so the protection of the core algorithm of software has higher requirements than the protection of its source code. [0003] To ensure the security of the source code, the source code is generally encrypted when compiling software. For example, when compiling Java code, you can use the compiler's built-in compilation library to quickly implement code encryption. Since this encryption method implements encryption processing through a fixed library, it is very easy to be cracked by decompilation tools (such as using javap / jd-gui and other tools) when using this type of encryption method, resulting in the leakage of the core source code. There is still a lack of an effective method for protec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/12
CPCG06F21/125G06F21/46
Inventor 梁捷余延军
Owner BEIJING AUTONAVI YUNMAP TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products