Unlock instant, AI-driven research and patent intelligence for your innovation.

A software encryption implementation method based on virtual memory hard disk

A technology of virtual memory and implementation method, applied in the fields of instruments, computing, electrical digital data processing, etc., can solve problems such as decryption software leakage, and achieve the effect of ensuring security and increasing running speed

Active Publication Date: 2021-09-21
中勍科技股份有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The hard disk itself is recoverable, and the decryption software has a risk of leaking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The invention provides a method for implementing software encryption based on a virtual memory hard disk. The virtual memory hard disk is a storage space obtained by mapping the memory of a host computer into a virtual memory hard disk. Lost when power off, not recoverable. The memory realizes the virtual memory hard disk, which is to realize the continuous operation of a piece of memory space, which is mostly used for fast reading of files and speeding up the Internet. It is planned to use the virtual memory hard disk to realize software encryption, and realize the unrecoverable decryption software through the power-off loss of the virtual memory hard disk.

[0030] The present invention comprises the steps:

[0031] Step 1, build a virtual memory hard disk:

[0032] To map the memory as a virtual memory hard disk, sufficient memory space is required.

[0033] The 32-bit system can only use 3.2G memory, so a computer with 8G memory can use the remaining 4G space to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for implementing software encryption based on a virtual memory hard disk, which uses a virtual disk to run encryption software, and after the encryption software runs, formats the virtual disk, copies the encryption software to the virtual disk, and implements software encryption through the virtual memory hard disk. Encryption ensures software security. The present invention utilizes the data non-recoverable characteristic of the virtual memory hard disk to format the virtual memory hard disk so that the decryption software is invisible. Realizing software encryption through the virtual memory hard disk can guarantee the security of the software. After the device is lost or the product is damaged, some confidential files or software will not be leaked. This encryption method also ensures that the running speed of the software is increased.

Description

technical field [0001] The invention relates to the technical field of software security, in particular to a software encryption implementation method based on a virtual memory hard disk. Background technique [0002] Existing executable file encryption patents are mainly realized by using PE file packing and virtual machines. Among them, PE file packing is to add a field in the PE format of the current executable file, and replace the program entry with the function in the new field. However, since the PE file format is becoming more and more complex, and many executable files have been protected by anti-packing, the probability of encryption failure is high and the reliability is insufficient; virtual machine encryption is to translate the program code into a machine that cannot be recognized by humans or humans. Pseudo-code byte stream, when the program is executed, these pseudo-codes are translated one by one, and the execution is gradually restored. Because virtual ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/53
CPCG06F21/53G06F21/602G06F2221/2107
Inventor 陈瑞祥闫海明杨绒高学意刘铭严晓东
Owner 中勍科技股份有限公司