Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for protecting software distribution security by applying strong symmetric encryption

A symmetric encryption and software installation technology, applied in the direction of program/content distribution protection, etc., can solve the problem of not being able to apply software security methods, protection measures, and not providing keys, etc., to achieve the effect of increasing the difficulty of reverse and cracking

Active Publication Date: 2020-12-18
FOCUS EDUCATION TECHNOLOGY CO LTD
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing symmetric encryption technology does not provide protection measures for the key, that is, the security of the symmetric encryption key is a problem to be solved by software developers themselves
Patent 201810669993.X "A Security Method for Enhancing Java Distribution Software Based on JavaAgent and dll" provides encryption and decryption operations for applications through JavaAgent and dll dynamic link libraries without intrusion into the application, protecting the security of software distribution, but still There are deficiencies: (1) The key is easy to analyze with tools, such as strings tool; (2) The cracker can write the program by himself and directly call the dll dynamic link library to decrypt the file
[0006] Therefore, there is currently no security method suitable for protecting software written in dynamic languages ​​in this technical field.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting software distribution security by applying strong symmetric encryption
  • Method for protecting software distribution security by applying strong symmetric encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be further described below in conjunction with accompanying drawing and exemplary embodiment:

[0023] Such as figure 2 Shown is a system structure diagram that applies strong symmetric encryption to protect software distribution security, specifically including an encryption dynamic library, a decryption dynamic library, and an interpreter, wherein the key is built into the encryption and decryption dynamic library;

[0024] The encryption dynamic library is used for the encryption of the software installation package, and by calling, the key is obtained to encrypt the software installation package;

[0025] The decryption dynamic library is used for decrypting the software installation package, and by calling, the key is obtained to decrypt the software installation package;

[0026] The interpreter is used to translate and allow the executable program in the release package, including the JVM virtual machine of Java and the Python interpr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for protecting software distribution security by applying strong symmetric encryption. The method is characterized by comprising the following steps of: 1, generatingan encryption and decryption key based on a system timestamp by utilizing a pseudo random number generation algorithm; 2, compiling and integrating the encryption and decryption key, an encryption anddecryption algorithm function, a dynamic random number and an identity verification algorithm into an encryption and decryption dynamic library in a C language form; 3, automatically generating a secret key according to the step 1, and encrypting a software package by using the generated secret key; and 4, sequentially calling the identity verification algorithm and the encryption and decryptionalgorithm function of the encryption and decryption dynamic library to verify a software installer. Thus, decompilation is high in difficulty, an encryption and decryption module realizes multiple protection measures such as encryption, verification, confusion and the like, and the effect of preventing an application from being decompiled and illegally authorized to the greatest extent is achieved.

Description

technical field [0001] The invention relates to the field, in particular to a method for applying strong symmetric encryption to protect the security of software distribution. Background technique [0002] Dynamic languages ​​are a class of high-level programming languages ​​that have been widely used in computer science. It is a language whose structure can be changed at runtime: for example, new functions, objects, and even code can be introduced, such as existing functions are allowed to be deleted or other structural changes. At present, the main dynamic languages ​​are: PHP, Ruby, Python, JavaScript, etc. Large-scale web applications usually choose to write back-end applications in dynamic languages ​​such as Java / Python. When these back-end applications need to be deployed to other systems, an authorization mechanism needs to be developed accordingly, because application release packages developed in dynamic languages ​​are easy are decompiled, so in the context of s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 仇文超乔金松付衍志唐军
Owner FOCUS EDUCATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products