CN101539978B - Software protection method based on space - Google Patents
Software protection method based on space Download PDFInfo
- Publication number
- CN101539978B CN101539978B CN2009100833160A CN200910083316A CN101539978B CN 101539978 B CN101539978 B CN 101539978B CN 2009100833160 A CN2009100833160 A CN 2009100833160A CN 200910083316 A CN200910083316 A CN 200910083316A CN 101539978 B CN101539978 B CN 101539978B
- Authority
- CN
- China
- Prior art keywords
- address
- key
- intelligent key
- key apparatus
- intelligent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 238000004891 communication Methods 0.000 claims description 52
- 230000005540 biological transmission Effects 0.000 abstract description 6
- 238000005516 engineering process Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000012797 qualification Methods 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a software protection method based on space and belongs to the technical field of information security. The technical proposal is that a first intelligent cipher key device is connected with a server computer; a second intelligent cipher key device is connected with a client computer; the client computer starts up the software installed inside the client computer; the software transmits an IP address obtaining request to the server computer; the server computer reads a self IP address, encrypts the IP address through the first intelligent cipher key device and transmits the IP address to the client computer; the client computer decrypts the encrypted IP address through the second intelligent cipher key device, judges whether the IP address is a legal IP address, if so, the second intelligent cipher key device is available, otherwise, the second intelligent cipher key device is unavailable. The invention binds the client software with the server IP address in the network, where the client software is, improves the security of the client software, and further increases software decryption difficulty after the IP address is encrypted for transmission.
Description
Technical field
The invention belongs to field of information security technology, relate in particular to a kind of method for protecting software based on the space.
Background technology
Intelligent key apparatus is a kind of small hardware device that has processor and storer, and it can be connected with computing machine by the data communication interface of computing machine.It has the key systematic function, but and the safe storage key, can preset the cryptographic algorithm function.The intelligent key apparatus computing relevant with key be fully at the device internal operation, and intelligent key apparatus has anti-characteristic of attacking, and security is high.USB Key is a kind of intelligent key apparatus of USB interface, and its built-in single-chip microcomputer or intelligent card chip can be stored user's key or digital certificate.
In Information technology flourishing day by day today, more and more comprising data message moves in computing machine with the software that relates to individual privacy and secret of the trade, and software that moves in the computing machine or software itself is artificially illegally distorted easily or because pirate and illegally duplicate, bring enormous economic loss for software users or developer, simultaneously further work can't be proceeded.
In the practical application, the example that has existed software that moves in the computing machine and the intelligent key apparatus binding that is connected in computing machine to use, to improve the security of the software that moves in the computing machine, yet, at present some softwares that contain high security information can only allow to move in the computing machine in certain computer or particular range, therefore, if illegal user by improper means obtained software and with the intelligent key apparatus of software binding, then can on other computing machine, use security software, bring massive losses to software users and security information.
Summary of the invention
For solving in the prior art, the invention provides a kind of method for protecting software based on the space in the problem that exists aspect the protecting computer software.
Technical scheme of the present invention is that a kind of method for protecting software based on the space is characterized in that described method comprises the following steps:
Steps A: first intelligent key apparatus is connected in the service end computing machine, and second intelligent key apparatus is connected in client computer;
Step B: described client computer starts its inner installed software, and described software sends and obtains the IP Address requests to described service end computing machine;
Step C: described service end computing machine reads himself IP address, passes to described first intelligent key apparatus, and described first intelligent key apparatus is encrypted described IP address and sent to described client computer;
Step D: described client computer receives the IP address of described encryption, pass to described second intelligent key apparatus, after described second intelligent key apparatus is deciphered the IP address of described encryption, judge whether described IP address is legal IP address, if then described second intelligent key apparatus can be used; Otherwise described second intelligent key apparatus is unavailable.
First key has been preset in the described first intelligent key apparatus inside, and described first intelligent key apparatus is encrypted described IP address and is specially: described first intelligent key apparatus is with its described IP of first secret key encryption address of presetting;
Second key with described first key match has been preset in the described second intelligent key apparatus inside, and described second intelligent key apparatus is deciphered described encryption IP address and is specially: described second intelligent key apparatus is with the IP address of its described encryption of second secret key decryption of presetting.
Described first key and described second key are that identical symmetric key or unsymmetrical key inequality are right.
After described client computer started its inner installed software, described software sent and obtains the IP Address requests to before the described service end computing machine, also comprises:
Described software sends the obtaining communication key request to described service end computing machine;
Described service end computer random generates communication key, is stored in first intelligent key apparatus, and sends client computer after first secret key encryption of first intelligent key apparatus;
Described client computer receives the communication key after the described encryption, after described second intelligent key apparatus, second secret key decryption, is stored in second intelligent key apparatus.
The described IP of obtaining Address requests also comprises communication key, then before described service end computing machine reads himself IP address, also comprise: described client computer generates described communication key at random and is stored in second intelligent key apparatus, and second secret key encryption in described second intelligent key apparatus comprises the concurrent service end computing machine that send of the described IP of the obtaining Address requests of communication key;
Described service end computing machine receive described encryption comprise communication key obtain the IP Address requests, after described first intelligent key apparatus, first secret key decryption, store described communication key in first intelligent key apparatus.
Described first intelligent key apparatus is encrypted described IP address, also is specially: described first intelligent key apparatus is encrypted described IP address with the communication key of its storage.
Described second intelligent key apparatus is deciphered the IP address of described encryption, also is specially: described second intelligent key apparatus is deciphered the IP address of described encryption with the communication key of its storage.
The legitimate ip address tabulation has been preset in the described second intelligent key apparatus inside.
Describedly judge whether described IP address is legal IP address, be specially: after described second intelligent key apparatus deciphering obtains described IP address, the legitimate ip address tabulation that more described IP presets with it address, if described IP address is in described legitimate ip address tabulation scope, then described IP address is legal; Otherwise described IP address is illegal.
A kind of method for protecting software provided by the invention based on the space; realized the binding of service end Computer IP address in the client computer software network of living in it; make the software of protecting can only provide at the service end computing machine in its belonging network under the situation of service and could move; the support of leaving service end then can not move; improved the security of client software; the transmission of IP address simultaneously needs the encryption of intelligent key apparatus, has further improved software and has cracked difficulty.
Description of drawings
Fig. 1 is the process flow diagram of a kind of method for protecting software based on the space of providing of the embodiment of the invention one.
Fig. 2 is the process flow diagram of a kind of method for protecting software based on the space of providing of the embodiment of the invention two.
Embodiment
Below in conjunction with accompanying drawing, preferred embodiment is elaborated.Should be emphasized that following explanation only is exemplary, rather than in order to limit the scope of the invention and to use.
The technology that the software that moves in the present protection client computer generally uses comprises: encryption, software combine operation etc. with client computer binding, software with software protecting equipment; the present invention aims to provide a kind of new software protection thought: based on the method for protecting software in space; promptly be communicated with client computer and service end computing machine with certain internetwork connection mode; make the software that moves in the client computer and the IP address binding of service end computing machine, be elaborated below in conjunction with specific embodiment.
Embodiment one:
Fig. 1 is the process flow diagram of a kind of method for protecting software based on the space of providing of the embodiment of the invention.Among Fig. 1, running software is in client computer, and client computer and service end computing machine all are connected in intelligent key apparatus, transmits the IP address by intelligent key apparatus, specifically comprises:
Embodiment one,
Particularly, preset first key in first intelligent key apparatus, preset second key in second intelligent key apparatus with first key match, first key, second key is generated by first (two) intelligent key apparatus, and with second (the first) key transmission, second (one) intelligent key apparatus, or first key, second key is generated by cryptographic algorithm storehouses such as Openssl, send first key then to first intelligent key apparatus, second key sends to second intelligent key apparatus, wherein, above-mentioned several first key, the second key generating mode is the preferable implementation of present embodiment, can not be as limitation of the present invention.
Wherein, first key, second key can be identical symmetric keys, as 3DES, also can be that unsymmetrical key inequality is right, as: RSA.
Wherein, the process of encryption IP address is given an example in conjunction with above-mentioned in the inner realization of first intelligent key apparatus, and this step implementation procedure is as follows:
First intelligent key apparatus is parameter portion's encryption within it with the first key FirstKey and service end IP address Server Ip, and service end IP address, output encryption back, and reference function is:
Encrypt?Use?FirstKey(FirstKey,ServerIp,&EncryptedServerIp)
Wherein, carry out in second intelligent key apparatus IP address of enabling decryption of encrypted, gives an example in conjunction with above-mentioned, and this step implementation procedure is as follows:
Client computer receives the IP address of encrypting, and reference function is:
Receive(&EncryptedServerIp);
Service end IP address EncryptedServerIp is the parameter deciphering to second intelligent key apparatus with the second key SecondKey and after encrypting, and output service end IP, and reference function is:
DecryptUseSecondKey(SecondKey,EncryptedServerIp,&ServerIp)
In the present embodiment, first key can not leave first intelligent key apparatus, and second key can not leave second intelligent key apparatus.
In the practical application, do not receive the IP address of encryption in the time range that client computer is being preset, then second intelligent key apparatus is unavailable, and the operation of client computer software anomaly is with step 107.
Wherein, preset the legitimate ip address tabulation in second intelligent key apparatus, stored the legal IP address scope in the form, judge by it whether legal process is for service end Computer IP address expressly: the second intelligent key apparatus relatively legitimate ip address that presets with it of this plaintext service end Computer IP address is tabulated, if comprise the plaintext service end Computer IP address that deciphering obtains in the legitimate ip address scope of storage in the legitimate ip address that second intelligent key apparatus presets tabulation, then, second intelligent key apparatus can be used, execution in step 106, otherwise, execution in step 107, wherein, can also only store a fixed IP addresses in the above-mentioned legitimate ip address tabulation, relatively decipher the plaintext service end Computer IP address that obtains, judge whether second intelligent key apparatus is available by this fixed ip address.
Embodiment two,
As shown in Figure 2, a kind of method for protecting software that the embodiment of the invention provides based on the space, wherein; running software is in client computer; client computer and service end computing machine all are connected in intelligent key apparatus, transmit the IP address by intelligent key apparatus, also specifically comprise:
Particularly, preset first key in first intelligent key apparatus, preset second key in second intelligent key apparatus with first key match.First key, the second key generative process repeat no more with step 101.。
Wherein, first key, second key can be identical symmetric keys, as 3DES, also can be that unsymmetrical key inequality is right, as: RSA.
Wherein, communication key is the DES key of the 3DES key of 16 bytes that generate at random of first intelligent key apparatus of service end or 8 bytes or other, and communication key is specially the 3DES key of 16 bytes in the present embodiment, and then actual implementation procedure is as follows:
Generate communication key, coded communication key at random all in the inner realization of first intelligent key apparatus, process is as follows:
First intelligent key apparatus generates communication key at random, and reference function is:
Generate3DES?Key(3DES?Key);
First intelligent key apparatus is that parameter is encrypted with the communication key 3DES Key and the first key FirstKey, and output encryption back communication key 3DES Key, and reference function is:
Encrypt(FirstKey,3DES?Key,&Encrypted3DES?Key)。
Wherein, decrypting process carries out in the second intelligent key apparatus inside, gives an example in conjunction with above-mentioned, and this step implementation procedure is as follows:
Communication key after the encryption of client computer reception service end computing machine output, reference function is: Receive (﹠amp; Encrypted3DES Key);
Second intelligent key apparatus is the parameter deciphering to encrypt the back communication key 3DES Key and the second key SecondKey, and the communication key after the output deciphering, and reference function is:
Decrypt(SecondKey,Encrypted3DES?Key,&3DES?Key)。
Wherein, the process of encrypting self IP address realizes in that first intelligent key apparatus is inner, in conjunction with above-mentioned for example, this step implementation procedure is as follows:
First intelligent key apparatus is that parameter is encrypted and back service end Computer IP address EncryptedServerIp is encrypted in output with communication key 3DES Key and service end Computer IP address ServerIp, and its reference function is:
EncryptUse3DES?Des(3DES?Key,ServerIp,&EncryptedServerIp)。
Wherein, carry out in second intelligent key apparatus IP address of enabling decryption of encrypted, gives an example in conjunction with above-mentioned, and this step implementation procedure is as follows:
Client computer receives the service end Computer IP address of encryption, and reference function is: Receive (﹠amp; EncryptedServerIp);
Second intelligent key apparatus is with communication key 3DesKey, and encrypting service end Computer IP address, back is the parameter deciphering, and output service end Computer IP address, and reference function is:
DecryptUse3DES?Key(3DES?Key,EncryptedServerIp,&ServerIp)。
In the present embodiment, first key can not leave first intelligent key apparatus, and second key can not leave second intelligent key apparatus.
In the practical application, do not receive the IP address of encryption in the time range that client computer is being preset, then second intelligent key apparatus is unavailable, and client computer software is out of service, with step 209.
Wherein, preset the legitimate ip address tabulation in second intelligent key apparatus, stored the legal IP address scope in the form, judge by it whether legal process is for service end Computer IP address expressly: the second intelligent key apparatus relatively legitimate ip address that presets with it of this plaintext service end Computer IP address is tabulated, if comprise the plaintext service end Computer IP address that deciphering obtains in the legitimate ip address scope of storage in the legitimate ip address that second intelligent key apparatus presets tabulation, then second intelligent key apparatus can be used, execution in step 208; Otherwise, execution in step 209.Wherein, can also only store a fixed IP addresses in the above-mentioned legitimate ip address tabulation, relatively decipher the plaintext service end Computer IP address that obtains, judge whether second intelligent key apparatus is available by this fixed ip address.
In the present embodiment, set up on their own when the IP address and be judged as after relatively when illegal, second intelligent key apparatus is unavailable, so when the client computer running software, in the time of need visiting second intelligent key apparatus frequently, (such as, client computer software section function writes second intelligent key apparatus, then need call the function that writes in second intelligent key apparatus during client computer running software) and second intelligent key apparatus is unavailable, then client computer software is out of service.In the practical application; can also set up on their own when the IP address and be judged as after relatively when illegal; second intelligent key apparatus returns error code or not by computer Recognition; then; software anomaly operates to and returns error code or the above-mentioned just preferable implementation of present embodiment of giving an example of system crash; can not be as restriction of the present invention, the replacement in its practical application still belongs to protection scope of the present invention.
Replaceable, step 202 to step 204 can also be following step:
Step 202 ', client computer generates communication key at random, second secret key encryption that client computer presets in the service end computing machine sends by its second intelligent key apparatus comprise communication key obtain the IP Address requests.
Step 203 ', the service end computing machine receives after this obtains the IP Address requests, with first secret key decryption of storing in connected first intelligent key apparatus, obtains this and obtains the communication key that comprises in the IP Address requests, is stored in first intelligent key apparatus.
Wherein, communication key is the DES key of the 3DES key of 16 bytes that generate at random of second intelligent key apparatus of client or 8 bytes or other, and communication key is specially the 3DES key of 16 bytes in the present embodiment.Generate communication key, coded communication key at random all in the inner realization of second intelligent key apparatus, process is as follows:
Second intelligent key apparatus generates communication key at random, and the reference function that generates random key is: Generate3DES Key (3DES Key);
Second intelligent key apparatus is that parameter is encrypted with the communication key 3DES Key and the second key SecondKey, and the communication key 3DES Key after the output encryption, and its reference function is:
Encrypt(SecondKey,3DES?Key,&Encrypted3DES?Key)。
In the practical application, can also communication key and IP address be formed a string data,, carry out the IP address and transmit by sending client after first secret key encryption by the service end computing machine.
In the practical application, can also in service end first intelligent key apparatus, preset the legitimate client IP address list, spendable client computer in the restriction service end network of living in.
The embodiment of the invention, preset the legitimate ip address tabulation in second intelligent key apparatus that client computer connects, when the IP Address requests is obtained in the transmission of client computer software to service end, send client computer behind the IP address encryption of service end with himself, making this software can only provide at the service end computing machine in its belonging network under the situation of service could move, its legitimacy also will be judged by the legitimate ip address tabulation by second intelligent key apparatus in the IP address of service end computing machine transmission simultaneously, guarantee that client computer is the legal computing machine in the service end genus network of living in.
A kind of method for protecting software that the embodiment of the invention provides based on the space; realized the binding of service end Computer IP address in client computer software and its belonging network; make the software of protecting can only provide at the service end computing machine in its belonging network under the situation of service and could move; the support of leaving service end then can not move; improved the security of client software; the transmission of IP address simultaneously needs the encryption of intelligent key apparatus, has further improved software and has cracked difficulty.
The above; only for the preferable embodiment of the present invention, but protection scope of the present invention is not limited thereto, and anyly is familiar with those skilled in the art in the technical scope that the present invention discloses; the variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection domain of claim.
Claims (7)
1. the method for protecting software based on the space is characterized in that, described method comprises the following steps:
Steps A: first intelligent key apparatus is connected in the service end computing machine, and second intelligent key apparatus is connected in client computer;
Step B: described client computer starts its inner installed software, and described software sends and obtains the IP Address requests to described service end computing machine;
Step C: described service end computing machine reads self IP address, passes to described first intelligent key apparatus, and described first intelligent key apparatus is encrypted described IP address and sent to described client computer;
Step D: described client computer receives the IP address of described encryption, pass to described second intelligent key apparatus, after described second intelligent key apparatus is deciphered the IP address of described encryption, judge whether described IP address is legal IP address, if, then described second intelligent key apparatus can be used, and client computer is in conjunction with the second intelligent key apparatus operating software; Otherwise described second intelligent key apparatus is unavailable;
The legitimate ip address tabulation has been preset in the described second intelligent key apparatus inside;
Describedly judge whether described IP address is that legal IP address is: after described second intelligent key apparatus deciphering obtains described IP address, the legitimate ip address tabulation that more described IP presets with it address, if described IP address is in described legitimate ip address tabulation scope, then described IP address is legal; Otherwise described IP address is illegal.
2. a kind of method for protecting software according to claim 1 based on the space, it is characterized in that, first key has been preset in the described first intelligent key apparatus inside, and described first intelligent key apparatus is encrypted described IP address and is specially: described first intelligent key apparatus is with its described IP of first secret key encryption address of presetting;
Second key with described first key match has been preset in the described second intelligent key apparatus inside, and described second intelligent key apparatus is deciphered described encryption IP address and is specially: described second intelligent key apparatus is with the IP address of its described encryption of second secret key decryption of presetting.
3. a kind of method for protecting software based on the space according to claim 2 is characterized in that, described first key and described second key are that identical symmetric key or unsymmetrical key inequality are right.
4. a kind of method for protecting software based on the space according to claim 1 is characterized in that, after described client computer started its inner installed software, described software sent and obtains the IP Address requests to before the service end computing machine, also comprises:
Described software sends the obtaining communication key request to described service end computing machine;
Described service end computer random generates communication key, is stored in first intelligent key apparatus, and sends client computer after first secret key encryption of first intelligent key apparatus;
Described client computer receives the communication key after the described encryption, after described second intelligent key apparatus, second secret key decryption, is stored in second intelligent key apparatus.
5. a kind of method for protecting software according to claim 1 based on the space, it is characterized in that, the described IP of obtaining Address requests also comprises communication key, then before described service end computing machine reads self IP address, also comprise: described client computer generates described communication key at random and is stored in second intelligent key apparatus, and second secret key encryption in described second intelligent key apparatus comprises that the described IP of the obtaining Address requests of communication key sends the service end computing machine;
Described service end computing machine receive described encryption comprise communication key obtain the IP Address requests, after described first intelligent key apparatus, first secret key decryption, store described communication key in first intelligent key apparatus.
6. a kind of method for protecting software based on the space according to claim 1 is characterized in that, described first intelligent key apparatus is encrypted described IP address, also is specially: described first intelligent key apparatus is encrypted described IP address with the communication key of its storage.
7. a kind of method for protecting software according to claim 1 based on the space; it is characterized in that; described second intelligent key apparatus is deciphered the IP address of described encryption, also is specially: described second intelligent key apparatus is deciphered the IP address of described encryption with the communication key of its storage.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009100833160A CN101539978B (en) | 2009-04-29 | 2009-04-29 | Software protection method based on space |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009100833160A CN101539978B (en) | 2009-04-29 | 2009-04-29 | Software protection method based on space |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101539978A CN101539978A (en) | 2009-09-23 |
CN101539978B true CN101539978B (en) | 2011-08-17 |
Family
ID=41123162
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2009100833160A Expired - Fee Related CN101539978B (en) | 2009-04-29 | 2009-04-29 | Software protection method based on space |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101539978B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102752311B (en) * | 2012-07-16 | 2016-04-06 | 天地融科技股份有限公司 | A kind of authentication method, system and device |
CN106663151A (en) | 2015-06-04 | 2017-05-10 | 华为技术有限公司 | Software security protection method and device |
CN105354447B (en) * | 2015-11-01 | 2018-09-04 | 广州安士维信息科技有限公司 | A method of protecting computer software is realized based on network communication |
CN105426704B (en) * | 2015-11-01 | 2018-05-01 | 佛山市电子政务科技有限公司 | A kind of method that protecting computer software is realized based on network service |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1900941A (en) * | 2006-04-28 | 2007-01-24 | 傅玉生 | Computer safety protective method based on software identity identifying technology |
CN1940801A (en) * | 2005-09-28 | 2007-04-04 | 鸿富锦精密工业(深圳)有限公司 | Software encryption system and method |
CN101005361A (en) * | 2007-01-22 | 2007-07-25 | 北京飞天诚信科技有限公司 | Server and software protection method and system |
CN101132282A (en) * | 2007-09-13 | 2008-02-27 | 天津市天锻压力机有限公司 | Control method for binding hardware login of user computer in LAN |
-
2009
- 2009-04-29 CN CN2009100833160A patent/CN101539978B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1940801A (en) * | 2005-09-28 | 2007-04-04 | 鸿富锦精密工业(深圳)有限公司 | Software encryption system and method |
CN1900941A (en) * | 2006-04-28 | 2007-01-24 | 傅玉生 | Computer safety protective method based on software identity identifying technology |
CN101005361A (en) * | 2007-01-22 | 2007-07-25 | 北京飞天诚信科技有限公司 | Server and software protection method and system |
CN101132282A (en) * | 2007-09-13 | 2008-02-27 | 天津市天锻压力机有限公司 | Control method for binding hardware login of user computer in LAN |
Also Published As
Publication number | Publication date |
---|---|
CN101539978A (en) | 2009-09-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5815294B2 (en) | Secure field programmable gate array (FPGA) architecture | |
CN101539977B (en) | Method for protecting computer software | |
US20030074562A1 (en) | Authentication receipt | |
CN1659821A (en) | Method for secure data exchange between two devices | |
CN110996319B (en) | System and method for performing activation authorization management on software service | |
CN110868291B (en) | Data encryption transmission method, device, system and storage medium | |
CN104253694A (en) | Encrypting method for network data transmission | |
CN103678174A (en) | Data safety method, storage device and data safety system | |
CN108809936B (en) | Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof | |
CN109684129B (en) | Data backup recovery method, storage medium, encryption machine, client and server | |
CN111970114B (en) | File encryption method, system, server and storage medium | |
CN107465665A (en) | A kind of file encryption-decryption method based on fingerprint identification technology | |
CN104270242A (en) | Encryption and decryption device used for network data encryption transmission | |
US20020021804A1 (en) | System and method for data encryption | |
CN111884814B (en) | Method and system for preventing intelligent terminal from being counterfeited | |
US9571273B2 (en) | Method and system for the accelerated decryption of cryptographically protected user data units | |
CN103177225B (en) | A kind of data managing method and system | |
CN104767766A (en) | Web Service interface verification method, Web Service server and client side | |
CN101539978B (en) | Software protection method based on space | |
CN111224958A (en) | Data transmission method and system | |
CN110611679A (en) | Data transmission method, device, equipment and system | |
CN102056156B (en) | Computer Data Security is downloaded to the method and system of mobile terminal | |
CN109726584B (en) | Cloud database key management system | |
CN100561913C (en) | A kind of method of access code equipment | |
CN101325486B (en) | Method and apparatus for transferring field permission cryptographic key |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C56 | Change in the name or address of the patentee |
Owner name: FEITIAN TECHNOLOGIES CO., LTD. Free format text: FORMER NAME: BEIJING FEITIAN CHENGXIN TECHNOLOGY CO., LTD. |
|
CP03 | Change of name, title or address |
Address after: 100085 Beijing city Haidian District Xueqing Road No. 9 Ebizal building B block 17 layer Patentee after: Feitian Technologies Co.,Ltd. Address before: 100083, Haidian District, Xueyuan Road, No. 40 research, 7 floor, 5 floor, Beijing Patentee before: FEITIAN TECHNOLOGIES Co.,Ltd. |
|
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20110817 |
|
CF01 | Termination of patent right due to non-payment of annual fee |