CN101211386A - Protection mode switch method and protection system - Google Patents

Protection mode switch method and protection system Download PDF

Info

Publication number
CN101211386A
CN101211386A CNA2006100637161A CN200610063716A CN101211386A CN 101211386 A CN101211386 A CN 101211386A CN A2006100637161 A CNA2006100637161 A CN A2006100637161A CN 200610063716 A CN200610063716 A CN 200610063716A CN 101211386 A CN101211386 A CN 101211386A
Authority
CN
China
Prior art keywords
encryption lock
protection mode
verification
protection
mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2006100637161A
Other languages
Chinese (zh)
Inventor
赵志勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNA2006100637161A priority Critical patent/CN101211386A/en
Publication of CN101211386A publication Critical patent/CN101211386A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention is suitable for being applied in the technical field of computers and provides a protection mode switching method and a protection system, wherein, the method includes that an encryption lock that is made correspondently according to the protection mode; when the encryption lock is detected to connect with a computer, a checkout is launched for the encryption lock; when the checkout is passed, the protection mode will be shifted into the corresponding mode. The invention can be used for making corresponding encryption locks according to the protection mode; when the encryption lock is detected, the protection mode will be switched into the corresponding mode according to the checkout results of the encryption lock. Therefore, it is possible to fulfill switching between a plurality of protection modes in protection software through the combination mode between software and hardware, so as to improve the declassification difficulty of the protection software, and besides, enhance reliability and safety of the software.

Description

A kind of changing method of protection mode and guard system
Technical field
The invention belongs to field of computer technology, relate in particular to a kind of changing method and a kind of guard system of protection mode.
Background technology
Along with popularizing fast of internet, many teenagers indulge in and chat on line and play, and the common heartfelt wishes that GreenNet becomes a lot of heads of a family are advocated in the growth that is threatening them that some unhealthy information are unbridled especially.So various securing softwares also arise at the historic moment, but the characteristics of these securing softwares are basic identical, for example, and operation automatically after start, and be divided into two kinds of protection modes usually, a kind of is holotype, another kind is a secondary mode.Under holotype, the user is unconfined to the operation of computing machine, and the user can only unload this securing software under holotype, the user can also carry out various restricted settings to the use of user under the secondary mode under holotype simultaneously, for example, browser can filter the pornographic violence network address that defines in the database or the page that comprises pornographic vocabulary, picture under the secondary mode, accesses network or computed time also can be controlled, and some are not suitable for the file directory that child checks and also can hide etc.
In such scheme, the user must be provided with password in advance in this securing software, in the use of computing machine, the protection mode of securing software acquiescence is a secondary mode, the holotype that the input password can enter this software, but the appearance of increasing Advanced Mailbox Password Recovery, the possibility that makes the mode of this soft encryption be cracked improves greatly, if password is cracked, restricted crowd also can enter the holotype of this software, unconfined using a computer, this will be unfavorable for teen-age growth etc. very much.
Summary of the invention
The purpose of the embodiment of the invention is to provide a kind of changing method of protection mode, is intended to solve the password easy crack that is used to switch protection mode that exists in the prior art, the problem of poor reliability.
Another purpose of the embodiment of the invention is to provide a kind of guard system.
The embodiment of the invention is achieved in that a kind of changing method of protection mode, and described method comprises:
Make corresponding encryption lock according to protection mode;
When detecting on computers encryption lock of connection, the verification encryption lock;
When verification by protection mode being switched to corresponding pattern.
The step of described verification encryption lock comprises:
Whether the rreturn value of judging power function in data in the encryption lock or the encryption lock is correct, is then by verification, otherwise can not be by verification.
Described detection connect on computers encryption lock and the step of verification realize by application programming interface.
The interface of described encryption lock and computing machine is parallel port, USB (universal serial bus) or cassette.
Described protection mode comprises holotype and secondary mode.
A kind of guard system, described system comprises:
Encryption lock is made module, is used for making corresponding encryption lock according to protection mode;
The encryption lock detection module is used to detect connection encryption lock on computers;
Encryption lock verification module is used for the encryption lock that connects is on computers carried out verification; And
Mode switch module is used for working as verification by protection mode being switched to corresponding pattern.
The embodiment of the invention is made corresponding encryption lock according to the protection mode of securing software, when detecting this encryption lock, according to the check results to this encryption lock securing software is switched to corresponding protection mode.Thereby the switching by between a plurality of protection modes of way of hardware and software combination realization securing software has improved the difficulty that securing software is cracked, and has strengthened the reliability and the security of this software.
Description of drawings
Fig. 1 is the realization flow figure of the protection mode changing method that provides of the embodiment of the invention;
Fig. 2 is the structural drawing of the guard system that provides of the embodiment of the invention.
Embodiment
In order to make purpose of the present invention, technical scheme and advantage clearer,, the present invention is further elaborated below in conjunction with drawings and Examples.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
Encryption lock is a kind of security product that is inserted in the software and hardware combining on the computer interface, generally all have tens or the nonvolatile storage space of hundreds of byte can be for read-write.The software developer can pass through application programming interface (Application Programming Interface, API) and encryption lock carry out exchanges data, so the software developer can be provided with the many places software locks in software, utilize encryption lock to open these locks as key, simple encryption lock is when a certain step is arrived in program run, just judge whether some data meets some condition in the encryption lock, and how determination procedure is carried out then; Complicated encryption lock is some power function in the program to be placed in the encryption lock move, and decides program how to carry out by the contrast rreturn value.
The embodiment of the invention is made corresponding encryption lock according to the protection mode of securing software, when detecting this encryption lock, according to the check results to this encryption lock protection mode is switched to corresponding pattern.
Fig. 1 shows the realization flow of the protection mode changing method that the embodiment of the invention provides, and details are as follows:
In step S101, make corresponding encryption lock according to protection mode;
Encryption lock can be made in the process of exploitation securing software, can also make in the process that securing software is installed.For example: be saved in some data in the securing software program in the encryption lock or some power function is placed in the encryption lock and move.
The interface of encryption lock and computing machine can be parallel port or USB (universal serial bus) (Universal SerialBus, USB), certainly can also so both strengthen the disguise of encryption lock for cassette directly is inserted in the mainboard expansion slot of computing machine, also improve the access speed of encryption lock.
In the computing machine use, when securing software has detected encryption lock and connects on computers by API or self-defining interface function, continue to carry out following step:
In step S102, encryption lock is carried out verification, when verification by protection mode being switched to corresponding pattern.
When securing software had only major and minor two kinds of protection modes, the protection mode of acquiescence was a secondary mode, and the rreturn value of some data or some power function is correct in judging encryption lock, then switched current protection mode to holotype; Otherwise continue to keep the secondary mode of securing software.
In another embodiment of the present invention, can when computing machine connects different encryption locks, then enter the corresponding protection mode of securing software, thereby realize the switching between a plurality of protection modes of securing software by making a plurality of unduplicated encryption locks.
For better explanation the present invention, be illustrated below by an example:
Suppose the exploitation securing software process in, in the program just like next the section:
......
A=Fx(3);
......
It is the value that program will obtain variables A according to constant 3.Can write following cryptographic algorithm this moment built-in in the encryption lock of CPU:
DogConvert(1)=12345;
Just can be rewritten into following form to original program A=Fx (3) this moment:
A=Fx(DogConvert(1)-12342);
Just constant 3 can not occur in the original program like this, and have only the software developer to know that just the actual constant that calls is 3.After installing this securing software, on computing machine, do not connect this encryption lock, then function DogConvert () just can not return correct result, and the result of formula A=Fx (DogConvert (1)-12342) certainly can be incorrect yet, so the protection mode of securing software remains secondary mode; Connected this encryption lock on computing machine, judged in the program that the operation result of A is correct, then the protection mode with securing software switches to holotype.In addition, can also also store 12342 in the above-mentioned formula in the internal storage of encryption lock, read function DogRead () by definition in encryption lock and read this data, make the value of A depend on function DogConvert () and DogRead () in the encryption lock fully, thereby make the deciphering difficulty more that becomes.
Accordingly, the embodiment of the invention also provides a kind of guard system 200 as shown in Figure 2, comprising: encryption lock is made module 201, encryption lock detection module 202, encryption lock verification module 203 and mode switch module 204.Encryption lock is made module 201 and is made corresponding encryption lock according to protection mode, after encryption lock detection module 202 detects encryption lock, 203 pairs of encryption locks of encryption lock verification module carry out verification, and when verification is passed through, mode switch module 204 switches to corresponding pattern with current protection mode.
The above only is preferred embodiment of the present invention, not in order to restriction the present invention, all any modifications of being done within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.

Claims (6)

1. the changing method of a protection mode is characterized in that, described method comprises:
Make corresponding encryption lock according to protection mode;
When detecting on computers encryption lock of connection, the verification encryption lock;
When verification by protection mode being switched to corresponding pattern.
2. the changing method of protection mode as claimed in claim 1 is characterized in that, the step of described verification encryption lock comprises:
Whether the rreturn value of judging power function in data in the encryption lock or the encryption lock is correct, is then by verification, otherwise can not be by verification.
3. the changing method of protection mode as claimed in claim 1 is characterized in that, described detection connect on computers encryption lock and the step of verification realize by application programming interface.
4. as the changing method of the described protection mode of the arbitrary claim of claim 1 to 3, it is characterized in that the interface of described encryption lock and computing machine is parallel port, USB (universal serial bus) or cassette.
5. the changing method of protection mode as claimed in claim 4 is characterized in that, described protection mode comprises holotype and secondary mode.
6. a guard system is characterized in that, described system comprises:
Encryption lock is made module, is used for making corresponding encryption lock according to protection mode;
The encryption lock detection module is used to detect connection encryption lock on computers;
Encryption lock verification module is used for the encryption lock that connects is on computers carried out verification; And
Mode switch module is used for working as verification by protection mode being switched to corresponding pattern.
CNA2006100637161A 2006-12-30 2006-12-30 Protection mode switch method and protection system Pending CN101211386A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2006100637161A CN101211386A (en) 2006-12-30 2006-12-30 Protection mode switch method and protection system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2006100637161A CN101211386A (en) 2006-12-30 2006-12-30 Protection mode switch method and protection system

Publications (1)

Publication Number Publication Date
CN101211386A true CN101211386A (en) 2008-07-02

Family

ID=39611410

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2006100637161A Pending CN101211386A (en) 2006-12-30 2006-12-30 Protection mode switch method and protection system

Country Status (1)

Country Link
CN (1) CN101211386A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102855422A (en) * 2012-08-21 2013-01-02 飞天诚信科技股份有限公司 Method and device for identifying pirated encryption lock
CN104751044A (en) * 2013-12-31 2015-07-01 环达电脑(上海)有限公司 Dynamic password identity authentication system and method
WO2016034047A1 (en) * 2014-09-01 2016-03-10 飞天诚信科技股份有限公司 Self-adaptive communication method for encryption dongle

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102855422A (en) * 2012-08-21 2013-01-02 飞天诚信科技股份有限公司 Method and device for identifying pirated encryption lock
WO2014029221A1 (en) * 2012-08-21 2014-02-27 飞天诚信科技股份有限公司 Recognition method and apparatus for pirated encryption lock
US10152593B2 (en) 2012-08-21 2018-12-11 Feitian Technologies Co., Ltd. Method and device for identifying pirated dongle
CN104751044A (en) * 2013-12-31 2015-07-01 环达电脑(上海)有限公司 Dynamic password identity authentication system and method
WO2016034047A1 (en) * 2014-09-01 2016-03-10 飞天诚信科技股份有限公司 Self-adaptive communication method for encryption dongle

Similar Documents

Publication Publication Date Title
CN100464313C (en) Mobile memory device and method for accessing encrypted data in mobile memory device
CA2799932C (en) Computer motherboard having peripheral security functions
CN101529366B (en) Identification and visualization of trusted user interface objects
CN102385671B (en) Software enciphering method and system
US20070006290A1 (en) USB-compliant personal key
CN101751524B (en) Device, method and computer for management of computer external equipment
US20100023650A1 (en) System and method for using a smart card in conjunction with a flash memory controller to detect logon authentication
CN101373437A (en) Accessing safety memory by embedded controller to increase system safety
US20070288689A1 (en) USB apparatus and control method therein
CN101968834A (en) Encryption method and device for anti-copy plate of electronic product
US20060085645A1 (en) Software application integrity verification method and device
CN1353365A (en) Use method of safety cipher in nonsafety programming environment
CN106650441A (en) Screen recording method and device
CN101490691A (en) Protecting users from malicious pop-up advertisements
US10037206B2 (en) Methods and systems for state switching
MX2010014464A (en) Secure memory management system and method.
Kang et al. USBWall: A novel security mechanism to protect against maliciously reprogrammed USB devices
US20140137266A1 (en) Access system and method thereof
CN107092836A (en) A kind of data guard method and device based on system encryption
CN101447009A (en) Method, device and system for installing software
CN101420299B (en) Method for enhancing stability of intelligent cipher key equipment and intelligent cipher key equipment
CN108229210A (en) A kind of method, terminal and computer readable storage medium for protecting data
CN101211386A (en) Protection mode switch method and protection system
CN110807186B (en) Method, device, equipment and storage medium for safe storage of storage equipment
CN101782948A (en) Switching method of protection mode and protection system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20080702