Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for directly and arbitrary separating code to encryption lock from software to implement protection of software protection

A technology of copyright protection and encryption lock, which is applied in the field of computer security, can solve the problems of a large amount of cost, the interface of the development environment does not fully support the program development environment, and few codes with pure operations, so as to achieve the effect of improving the encryption strength

Inactive Publication Date: 2007-09-19
吴晓栋
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But most of the software rarely has codes of pure operation, even if there are codes, they can be used by decryptors to prevent real or simulate;
[0007] 2. Software authors need to spend a lot of time to learn and master the use of encryption locks and software encryption technology
[0008] 3. The development environment interface provided by the encryption lock using this technology does not fully support various program development environments on the market today.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for directly and arbitrary separating code to encryption lock from software to implement protection of software protection
  • Method for directly and arbitrary separating code to encryption lock from software to implement protection of software protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The present invention is described in detail below in conjunction with accompanying drawing and specific embodiment:

[0016] The smart card encryption lock L proposed by the present invention adds a clock timer and a random number generator on the original basis, and mainly includes CPU, RAM, EEPROM, FLASH, I / O, a clock timer and a random number generator. Among them, the function of the clock timer is used to calculate the time between the release of the current block of code by the dongle and the arrival of the request for the next block of code that needs to be continuously executed; the function of the random number generator is used to generate random numbers.

[0017] In Figure 1, a program file F is usually composed of data segment, stack segment and code segment, all or part of the code in the code segment is separated, and divided into various functional modules according to different functions, that is, initialization module A, event Process modules B, C and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for separating code to an encryption lock from an executable file directly comprising separating code to an encryption lock from an executable file directly, setting a clock timer and a random number generator in the intelligent card encryption lock, filling an interactive code for communication with the encryption lock in the vacancy of the executable file after the code is separated, the encryption lock dynamically decomposing, encrypting and protecting the code that is separated into the lock and needed to be executed continuously by using a specific protocol and algorithm, wherein a plurality of blocks are generated and the release of the block is determined by the normal executed time of the previous block, if the request for demanding the next block sent from the interactive code arrives in the encryption lock in the normal time period, an effective information will be released from the encryption lock, if not, an ineffective information is released. Moreover, a layer of encryption lock filter drive program is added to the encryption lock and the interactive code. Thereby, the illegal monitor and interception of the communication data in the communication link and system are prevented.

Description

technical field [0001] The invention belongs to the field of computer security, in particular to an encryption lock for copyright protection of computer software. Background technique [0002] In today's information age, information processing technology with computers as the core is in an absolute leadership position, which has a huge impact on the development of human society, the improvement of the national economy and the changes in people's lives. The computer software is the soul of the computer system, controlling and directing various operations of the machine. [0003] Since the birth of software, software piracy has accompanied it, seriously damaging the legitimate interests of workers and disrupting the social and economic order. At the same time, software copyright protection products to fight against software piracy have also emerged, mainly the initial pure software encryption and the later encryption lock. With the continuous progress and development of tech...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F21/12
Inventor 吴晓栋
Owner 吴晓栋
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products