Unlock instant, AI-driven research and patent intelligence for your innovation.

A security protection method for hidden operation of pre-installed software

A security protection and pre-installation technology, applied in internal/peripheral computer component protection, program/content distribution protection, etc., can solve the problems that pre-installed software and data are invisible to users, and users cannot intuitively perceive usage restrictions, etc.

Active Publication Date: 2021-09-10
BEIJING INST OF COMP TECH & APPL
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a pre-installed software security protection method and a solid-state hard disk to solve the problem that the pre-installed software and data are invisible to the user, and the user cannot intuitively perceive the use restriction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security protection method for hidden operation of pre-installed software
  • A security protection method for hidden operation of pre-installed software
  • A security protection method for hidden operation of pre-installed software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0022] figure 1 Shown is a flow chart of pre-installed software injection and hidden operation of the present invention, as figure 1 as shown, figure 2 Shown is a schematic diagram of the pre-installed software injection process, such as figure 2 as shown,

[0023] Step 1: In the factory environment host, bypass the host file system, directly call the NVMe driver, and issue NVMe private commands (private hidden area write commands);

[0024] Step 2: In the host machine in the factory environment, the master controller of the solid state disk receives and recognizes the private hidden area write command and executes it, and writes the protected file into the hidden area;

[0025] For the protected program that nee...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a safety protection method for hidden operation of pre-installed software, which includes: dividing the storage area of ​​a solid-state hard disk into a visible area and a hidden area, the host system can only recognize the visible area, and use the private hidden area command Operate the hidden area, inject protected programs and data files before leaving the factory, use a mapping tag stored in the visible area to store in the visible area, the hidden area contains protected executable programs, and the mapping tag is used to start the protected executable program. Execute the program, and perform data file operations by maintaining a file directory table with an unchanged location for each protected program. The invention solves the requirement that the pre-installed software and data are not visible to the user, and the user basically does not intuitively perceive the use restriction of the hard disk during use, and at the same time does not conflict with the existing security protection technology, and is a beneficial supplement to the existing software security protection technology , can be implemented at the same time, improve the security effect, and improve the security and reliability of data and system.

Description

technical field [0001] The invention relates to a special software security protection technology, in particular to a security protection method for software pre-installed in a solid-state hard disk by a manufacturer. Background technique [0002] With the development of computer technology, more and more attention has been paid to software intellectual property rights, and software has increasingly become the core asset of many hardware-software products. Comprehensive software security protection has become a must. In many fields, when the whole machine system is sold, the whole machine carries the seller's special software, and the user must use the special software to complete the use of the whole machine product, such as CNC machine tools and their special software, weapons and equipment If the software is copied, it will greatly damage the interests of the seller. [0003] Many existing security protection technologies have largely solved the problem of software copy ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/78G06F21/12
CPCG06F21/12G06F21/78
Inventor 邓威冯志华梁书万星罗重
Owner BEIJING INST OF COMP TECH & APPL