Machine software starting method and device and machine equipment

A software and machine technology, applied in the security field, can solve the problem of easy leakage of source code, and achieve the effect of ensuring security and copyright, and not easy to steal

Pending Publication Date: 2021-01-08
BEIJING NAURA MICROELECTRONICS EQUIP CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides a machine software startup method, device and machine equipment to solve the problem that the source code is easy to leak in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Machine software starting method and device and machine equipment
  • Machine software starting method and device and machine equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the above objects, features and advantages of the present application more obvious and comprehensible, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0043] refer to figure 1 , which shows a flow chart of a machine software startup method described in the embodiment of the present application, specifically including:

[0044] Step 101: Obtain inherent information in registry information of a specified terminal.

[0045] In practical applications, when the executable file of the machine software is deployed on the terminal, the inherent information in the registry information of the specified terminal is obtained, and then the inherent information is encrypted twice, thus ensuring that only one terminal is installed and corresponds to the terminal executable file.

[0046] Inherent information generally refers to information that will not change in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a machine software starting method and device and machine equipment. The machine software starting method comprises the steps: acquiring inherent information in registry information of a specified terminal; encrypting the inherent information in the registry information for the first time to generate first ciphertext data; splicing the first ciphertext data and the inherentinformation to generate first spliced data; encrypting the first spliced data for the second time to generate second ciphertext data; comparing the second ciphertext data with pre-generated ciphertextdata, and if the second ciphertext data is different from the pre-generated ciphertext data, forbidding starting machine software and clearing memory data of the machine software; and if the second ciphertext data is the same as the pre-generated ciphertext data, starting the machine software so as to solve the current source code leakage problem.

Description

technical field [0001] The present application relates to the field of security technology, in particular to a method and device for starting machine software, and machine equipment. Background technique [0002] In the prior art, there are two ways to encrypt the software source code. One way is: the company purchases external encryption software, and the management personnel with certain authority can decrypt the file into plain text, and at the same time, the relevant personnel of the encryption strategy company You also have the right to decrypt. Another way is to encrypt the software before leaving the factory, and then decrypt it through the dongle. [0003] In the current existing technology, a person with decryption authority can decrypt the code file into plain text, and then obtain all the source code files of the software through illegal copying. For the software released on the customer site, as long as there is a dongle, it can be decrypted. The executable file...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/10G06F21/12G06F21/57G06F21/60
CPCG06F21/105G06F21/121G06F21/575G06F21/602
Inventor 柴加加
Owner BEIJING NAURA MICROELECTRONICS EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products