Unlock instant, AI-driven research and patent intelligence for your innovation.

Implementation method of PMA software encryption technology

An implementation method and software encryption technology, applied in the direction of program/content distribution protection, instruments, electrical digital data processing, etc., can solve the problems of developers' later maintenance and confidentiality impact, hardware damage, unstable PMA performance, etc. Effectiveness of PMA safety, reduced maintenance costs, and improved safety

Pending Publication Date: 2022-03-01
LUOYANG INST OF ELECTRO OPTICAL EQUIP OF AVIC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the current design of PMA software is completely open to users. Users can directly use some functions by copying PMA software to other models of PMA. However, each model of PMA software and hardware complement each other. Unauthorized transplantation of other models of PMA software may lead to unstable performance of PMA or hardware damage, and will also have a certain degree of impact on the later maintenance and confidentiality of developers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method of PMA software encryption technology
  • Implementation method of PMA software encryption technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Embodiments of the present disclosure will be described in detail below in conjunction with the accompanying drawings.

[0022] Embodiments of the present disclosure are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present disclosure from the contents disclosed in this specification. Apparently, the described embodiments are only some of the embodiments of the present disclosure, not all of them. The present disclosure can also be implemented or applied through different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present disclosure. It should be noted that, in the case of no conflict, the following embodiments and features in the embodiments can be combined with each other. Based on the embodiments in the present disclosure, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of PMA encryption management, and particularly relates to a PMA software encryption technology implementation method, which is used for carrying out encryption protection on a PMA, and generating a machine code by using an algorithm after reading a CPU serial number and a hard disk serial number of the PMA; fusing the machine code with date information to generate a valid intermediate code of the day; executing an encryption algorithm on the intermediate code to generate a registration code; wherein the encryption algorithm executed by the intermediate coding comprises the steps of changing an ASCll code value, carrying out code system conversion and executing MD5 encryption which are carried out in sequence. According to the method, encryption management of the PMA software is realized through encryption, encryption protection of the PMA software is realized, and health and stability of equipment are guaranteed.

Description

technical field [0001] The invention belongs to the technical field of PMA encryption management, and in particular relates to a method for realizing PMA software encryption technology. Background technique [0002] With the rapid development of modern equipment technology, the requirements for PMA are becoming more and more stringent, and the encrypted management of equipment has become a very important link in the field of maintenance and guarantee. [0003] As an important part of PMA, PMA software plays a very important role in determining the efficiency, quality and other indicators. Most of the current design of PMA software is completely open to users. Users can directly use some functions by copying PMA software to other models of PMA. However, each model of PMA software and hardware complement each other. Unauthorized transplantation of other models of PMA software may lead to unstable performance of PMA or hardware damage, and will also have a certain degree of im...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/60
CPCG06F21/125G06F21/602
Inventor 张鹏武裕皓封思远辛战豪毕思明邵元元张凯旋吕涛涛何礼郑少军李艺辛
Owner LUOYANG INST OF ELECTRO OPTICAL EQUIP OF AVIC