CN101833629B - Software area authorization encryption method and implementing device therefor - Google Patents

Software area authorization encryption method and implementing device therefor Download PDF

Info

Publication number
CN101833629B
CN101833629B CN2009100258510A CN200910025851A CN101833629B CN 101833629 B CN101833629 B CN 101833629B CN 2009100258510 A CN2009100258510 A CN 2009100258510A CN 200910025851 A CN200910025851 A CN 200910025851A CN 101833629 B CN101833629 B CN 101833629B
Authority
CN
China
Prior art keywords
encryption
software
encrypted
encryption device
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2009100258510A
Other languages
Chinese (zh)
Other versions
CN101833629A (en
Inventor
江剑
孔德仁
狄长安
牛国柱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Science and Technology
Original Assignee
Nanjing University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Science and Technology filed Critical Nanjing University of Science and Technology
Priority to CN2009100258510A priority Critical patent/CN101833629B/en
Publication of CN101833629A publication Critical patent/CN101833629A/en
Application granted granted Critical
Publication of CN101833629B publication Critical patent/CN101833629B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a software area authorization encryption method, which comprises the following steps of: extracting machine fingerprint of a computer, encrypting the fingerprint to form a registration code, and sending registration data and the registration code to a registration center; after checking the registration data by using the registration center, performing encryption key initialization on an authorization encryption device; connecting the authorization encryption device with a computer with encrypted software; encrypting data information to be transmitted by using the authorization encryption device, and sending an encrypted message to the computer regularly; and finally, receiving the data sent by the authorization encryption device regularly by using the computer, decrypting the data by using a key, and judging whether the current area and time are within the limited range, if so, normally running the encrypted software, otherwise, exiting the encrypted software. The authorization encryption device comprises a GPS receiving chip, an embedded controller, and an E2PROM. The method can realize the area authorization of the software.

Description

Software area authorization encryption method and implement device thereof
Technical field
The present invention relates to a kind of software encryption technique and implement device thereof, particularly a kind of encryption method and implement device thereof that is used for software area authorization.
Background technology
The encryption method of software is varied, can be divided into hardware encryption method that relies on hardware and the soft encryption method that does not rely on hardware according to method for protecting software.The hardware encryption method is that enciphered message is solidificated on the hardware, and as software security dog, software is when each the startup, and the corresponding information on the first detection hardware is if by detecting, then start software systems, otherwise can not normally start software systems.The soft encryption sharpest edges are extremely low encryption cost, do not rely on special hardware to realize encryption with software approach to software, guarantee that by in software, inserting encrypting module software is not illegally used, mainly contain close Stop watch method, software self checking method, key floppy disc method, now commonly used is etc. needs just can use to software developer's licensing the licence method of software after user software installs.The hardware encryption technology is along with encryption hardware exceeds the zone and can also continue to use; Software cryptography be owing to can't judge exceeding of zone, also can continue to use exceeding the zone.So above-mentioned soft encryption and hardware encryption technology are not subjected to the restriction of region,, just can use anywhere without restriction as long as have corresponding information.
Need some software in the zone of appointment, to use now, this zone might be bigger as a city, also might be smaller as a plant area or office, if the usable range of software has surpassed this zone then should use, we are referred to as software area authorization.But adopt existing encryption technology can't realize area authorization.
Summary of the invention
The object of the present invention is to provide a kind of software area authorization encryption method and implement device thereof.
The technical solution that realizes the object of the invention is: a kind of software area authorization encryption method may further comprise the steps: the machine fingerprint of step 1, extraction computing machine, and the machine fingerprint comprises the hard disk sequence number of computing machine and the physical address of network interface card;
Step 2, above-mentioned machine fingerprint is encrypted, formed registration code, and materials for registration (information such as software user's title, address, contact method, service time) and registration code are sent to registration center;
After step 3, registration center examine materials for registration, utilize registration code to carry out the encryption key initialization to authorizing encryption device;
Step 4, will authorize encryption device to be connected with computing machine in the step 1;
Step 5, mandate encryption device are encrypted the data message that will transmit by the encryption key of step 3, and ciphertext are regularly mail to computing machine; Wherein, the data message of transmission comprises GPS location, time data, default use regional extent, time bar, the concrete steps of encrypting are: step 5.1, mandate encryption device receive gps satellite signal by antenna, processing through the GPS receiving chip, regularly form location and time data, output GGA GPS locating information, the inside comprises location and time data; Step 5.2, embedded controller are from E 2Take out encryption key among the PROM, location, time data, default use regional extent and time bar are encrypted;
Step 6, computing machine regularly receive the data of authorizing encryption device to send, the key that forms with this machine machine fingerprint is decrypted data, and judge current zone and time whether in restricted portion, if encrypted software normally move, otherwise encrypted software withdraws from; Wherein, authorize encryption device to comprise GPS receiving chip, embedded controller, E 2PROM; The GPS receiving chip receives gps satellite signal by antenna and this signal is handled, and the signal that will handle is transferred to embedded controller afterwards, and embedded controller is from E 2Take out encryption key among the PROM signal that will transmit is encrypted, the information after will encrypting then mails to the computing machine that encrypted software is housed.
Mandate encryption device based on above-mentioned software area authorization encryption method comprises GPS receiving chip, embedded controller, E 2PROM (programmable storage); The GPS receiving chip receives gps satellite signal by antenna and this signal is handled, and the signal that will handle is transferred to embedded controller afterwards, and embedded controller is from E 2Take out encryption key among the PROM signal that will transmit is encrypted, the information after will encrypting then mails to the computing machine that encrypted software is housed.
The present invention compared with prior art, its remarkable advantage is the area authorization that can realize software, make its can only appointment the zone in the use, surpassed and should then can't use in the zone; Even the hardware unit that connects with computing machine is illegally accessed or utilizes other technologies to simulate the identical information of transmission, connect the uniqueness of computer machine fingerprint owing to presetting, software also can't use, and has played good encryption effect.
Description of drawings
Fig. 1 is the process flow diagram of software area authorization encryption method of the present invention.
Fig. 2 is a mandate encryption device hardware structure diagram of the present invention.
Embodiment
Below in conjunction with accompanying drawing the present invention is described in further detail.
A kind of software area authorization encryption method of the present invention may further comprise the steps:
The machine fingerprint of step 1, extraction computing machine, the machine fingerprint comprises the hard disk sequence number of computing machine and the physical address of network interface card; Extracting the machine fingerprint of computing machine realizes by the Windows interface function, (the Windows interface function as seen: Ju Binshan etc., utilize computer fingerprint to realize software cryptography principle and method, University Of Qingdao's journal (natural science edition), 2005 (9): 63-66) be specially and may further comprise the steps:
Step 1.1, utilize GetVolumeInformation (obtaining hard disk label information) function to obtain the parameter information (sequence number of hard disk) of hard disk;
Step 1.2, utilize NetApi32.DLL (network interface dynamic link library) function to obtain the physical address of network interface card;
Step 2, above-mentioned machine fingerprint is encrypted, formed registration code, and materials for registration and registration code are sent to registration center; Materials for registration comprises information such as software user's title, address, contact method, service time.The machine fingerprint encrypted utilizes IDEA (International Data Encryption Algorithm) algorithm to realize, specifically may further comprise the steps:
Step 2.1, the physical address of the network interface card of the hard disk sequence number of 4 bytes in the step 1.1 and 6 bytes in the step 1.2 is combined into 10 bytes the machine fingerprint expressly;
Step 2.2, according to adding fixed byte, the machine fingerprint that the machine fingerprint of 10 bytes expressly is varied to 16 bytes expressly to be 8 multiple, makes things convenient for the calculating of algorithm;
Step 2.3, with 128 secret keys the machine fingerprint of 16 bytes expressly is encrypted to the registration code of 16 bytes;
After step 3, registration center examine registration code, utilize registration code to carry out the encryption key initialization to authorizing encryption device; Utilize registration code to realize by IDEA (International Data EncryptionAlgorithm) algorithm to authorizing encryption device to carry out the encryption key initialization, be specially with 128 secret key and encrypt once more, form 128 mandate encryption device data transmission encryption keys.
Step 4, will authorize encryption device to be connected with computing machine in the step 1;
Step 5, mandate encryption device are encrypted the data message that will transmit by the encryption key of step 3, and ciphertext are regularly mail to computing machine;
The data message that transmits comprises GPS location, time data, default use regional extent, time bar, and the concrete steps of encryption are:
Step 5.1, mandate encryption device receive gps satellite signal by antenna, processing through the GPS receiving chip, regularly form location and time data, output GGA (Global Positioning System Fix Data) GPS locating information, the inside comprises location and time data, and separates mutually with comma;
Step 5.2, embedded controller are from E 2Take out encryption key among the PROM, location, time data, default use regional extent and time bar are encrypted;
Step 6, computing machine regularly receive the data of authorizing encryption device to send, the key that forms with this machine machine fingerprint is decrypted data, and judge current zone and time whether in restricted portion, if encrypted software normally move, otherwise encrypted software withdraws from.
Mandate encryption device based on above-mentioned software area authorization encryption method comprises GPS receiving chip, embedded controller, E 2PROM (programmable storage), the GPS receiving chip receives gps satellite signal by antenna and this signal is handled, and the signal that will handle is transferred to embedded controller afterwards, and embedded controller is from E 2Take out encryption key among the PROM signal that will transmit is encrypted, the information after will encrypting then mails to the computing machine that encrypted software is housed.Authorize encryption device to adopt the USB power supply of computing machine, do not need external power supply or battery.
The present invention is described further below in conjunction with embodiment:
With a notebook computer is example, and its NIC address is that 6 bytes, 16 systems are counted 00-16-D3-AF-57-7D, and the hard disk sequence number is A06A-0D27.Add 6 fixed byte FF, form the machine fingerprint plaintext of 16 bytes: A0-6A-0D-27-00-16-D3-AF-57-7D-FF-FF-FF-FF-FF-FF.Use the IDEA algorithm, machine fingerprint plain text encryption is become 16 byte registration code: 4C-B8-97-25-D6-6D-C7-1B-0D-E4-FB-D9-5B-CD-0B-0B with 128 secret keys 1 (be assumed to be 16 systems and count 31-32-33-34-35-36-37-38-31-32-33-34-35-36-37-38).Registration code is reused the IDEA algorithm, with 128 secret keys 2 (be assumed to be 16 systems and count 38-37-36-35-34-33-32-31-31-32-33-34-35-36-37-38), encrypted result is: 53-E2-89-62-00-86-0C-12-35-6D-B8-DE-F5-1F-1C-EA, the ASCII character of therefrom getting 5E86080136BDF11E is for authorizing 128 bit encryption keys of encryption device.The data message of transmission comprises GPS location, time data, default use regional extent and time bar, be assumed to be 4250.5589-14718.5084-092204-4250.5589-14718.5084-10-04, represent real-time latitude-real-time longitude-real-time time-setting latitude center-setting longitude center-preset range-Preset Time respectively, wherein set the subscriber computer position that the longitude and latitude center refers to, scope can be used within 10 meters of 10 expressions, and 04 expression does not allow above 4 months accumulated running time.It is as follows to authorize encryption device with encryption key it to be encrypted to 16 system ciphertexts: A7-0F-ED-F4-96-6A-C8-BF-BA-2D-8A-73-07-22-75-25-00-3E-F3-18-5F-32-89-2D-4D-BB-50-52-61-A4-A3-63-F9-0F-28-85-5C-8F-36-2A-85-A9-65-60-64-EF-A2-D5, transmit then.Computing machine receives the above-mentioned ciphertext of authorizing encryption device to send, and 5E86080136BDF11E is decrypted data with key, and calculates the back and judge current zone and time in restricted portion, and software normally moves.

Claims (5)

1. a software area authorization encryption method is characterized in that, may further comprise the steps:
The machine fingerprint of step 1, extraction computing machine, the machine fingerprint comprises the hard disk sequence number of computing machine and the physical address of network interface card;
Step 2, above-mentioned machine fingerprint is encrypted, formed registration code, and materials for registration and registration code are sent to registration center;
After step 3, registration center examine materials for registration, utilize registration code to carry out the encryption key initialization to authorizing encryption device;
Step 4, will authorize encryption device to be connected with computing machine in the step 1;
Step 5, mandate encryption device are encrypted the data message that will transmit by the encryption key of step 3, and ciphertext are regularly mail to computing machine; Wherein, the data message of transmission comprises GPS location, time data, default use regional extent, time bar, the concrete steps of encrypting are: step 5.1, mandate encryption device receive gps satellite signal by antenna, processing through the GPS receiving chip, regularly form location and time data, output GGA GPS locating information, the inside comprises location and time data; Step 5.2, embedded controller are from E 2Take out encryption key among the PROM, location, time data, default use regional extent and time bar are encrypted;
Step 6, computing machine regularly receive the data of authorizing encryption device to send, the key that forms with this machine machine fingerprint is decrypted data, and judge current zone and time whether in restricted portion, if encrypted software normally move, otherwise encrypted software withdraws from; Wherein, authorize encryption device to comprise GPS receiving chip, embedded controller, E 2PROM; The GPS receiving chip receives gps satellite signal by antenna and this signal is handled, and the signal that will handle is transferred to embedded controller afterwards, and embedded controller is from E 2Take out encryption key among the PROM signal that will transmit is encrypted, the information after will encrypting then mails to the computing machine that encrypted software is housed.
2. software area authorization encryption method according to claim 1 is characterized in that, extracts the machine fingerprint of computing machine in the step 1 and realizes by the Windows interface function, is specially may further comprise the steps:
Step 1.1, utilize the GetVolumeInformation function to obtain the sequence number of hard disk;
Step 1.2, utilize the NetApi32.DLL function to obtain the physical address of network interface card.
3. software area authorization encryption method according to claim 2 is characterized in that, in the step 2 the machine fingerprint is encrypted and utilizes the IDEA algorithm to realize, specifically may further comprise the steps:
Step 2.1, the physical address of the network interface card of the hard disk sequence number of 4 bytes in the step 1.1 and 6 bytes in the step 1.2 is combined into 10 bytes the machine fingerprint expressly;
Step 2.2, according to adding fixed byte, the machine fingerprint that the machine fingerprint of 10 bytes expressly is varied to 16 bytes is expressly;
Step 2.3, with 128 secret keys the machine fingerprint of 16 bytes expressly is encrypted to the registration code of 16 bytes.
4. software area authorization encryption method according to claim 1, it is characterized in that, utilize registration code to realize by the IDEA algorithm in the step 3 to authorizing encryption device to carry out the encryption key initialization, be specially with 128 secret key and encrypt once more, form 128 mandate encryption device data transmission encryption keys.
5. software area authorization encryption method according to claim 1 is characterized in that, step 6 pair data are decrypted and are specially: the secret key with 128 is decrypted ciphertext, forms original plaintext.
CN2009100258510A 2009-03-11 2009-03-11 Software area authorization encryption method and implementing device therefor Expired - Fee Related CN101833629B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009100258510A CN101833629B (en) 2009-03-11 2009-03-11 Software area authorization encryption method and implementing device therefor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100258510A CN101833629B (en) 2009-03-11 2009-03-11 Software area authorization encryption method and implementing device therefor

Publications (2)

Publication Number Publication Date
CN101833629A CN101833629A (en) 2010-09-15
CN101833629B true CN101833629B (en) 2011-10-26

Family

ID=42717696

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100258510A Expired - Fee Related CN101833629B (en) 2009-03-11 2009-03-11 Software area authorization encryption method and implementing device therefor

Country Status (1)

Country Link
CN (1) CN101833629B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103259652B (en) * 2012-05-07 2015-12-16 中国交通通信信息中心 A kind of information decryption method based on timeliness parameter
CN103259646B (en) * 2012-05-07 2015-11-18 中国交通通信信息中心 A kind of information decryption method based on satellite navigation system
CN104819097A (en) * 2015-04-03 2015-08-05 北京天诚同创电气有限公司 Protection method and device for programmable controller program of wind generating set
CN107749837A (en) * 2017-09-26 2018-03-02 甘肃万维信息技术有限责任公司 A kind of E-Government Resource Security guard system and its method
CN109388940B (en) * 2018-09-20 2020-12-01 斑马网络技术有限公司 Vehicle machine system access method and device, server and engineering U disk
CN113572600B (en) * 2020-12-31 2024-03-01 广东国腾量子科技有限公司 Quantum key safe storage system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1786867A (en) * 2005-09-22 2006-06-14 深圳市江波龙电子有限公司 Method for ciphering and diciphering of file, safety managing storage apparatus and system method thereof

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1786867A (en) * 2005-09-22 2006-06-14 深圳市江波龙电子有限公司 Method for ciphering and diciphering of file, safety managing storage apparatus and system method thereof

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
JP特开2001-118333A 2001.04.27

Also Published As

Publication number Publication date
CN101833629A (en) 2010-09-15

Similar Documents

Publication Publication Date Title
GB2538052B (en) Encoder, decoder, encryption system, encryption key wallet and method
CN101262599B (en) Method and system for data processing
CN101833629B (en) Software area authorization encryption method and implementing device therefor
HK1095452A1 (en) A method of encrypting and transferring data between a sender and a receiver using a network
CN103235906A (en) Method and device for encrypting and decrypting application program
US20160323100A1 (en) Key generation device, terminal device, and data signature and encryption method
CN102882683A (en) Synchronizable RFID (radio-frequency identification) security authentication method
CN103731266B (en) Method and system for authenticating electronic certificate
CN111970114B (en) File encryption method, system, server and storage medium
CN101394280B (en) Mobile terminal and data service message protecting method
TW200622623A (en) Memory information protection system, semiconductor memory and method of protecting memory information
KR101541165B1 (en) Mobile message encryption method, computer readable recording medium recording program performing the method and download server storing the method
US20170316217A1 (en) Multi-factor authentication based content management
CN104936172A (en) Beidou positioning data transmission encryption system
CN102750479A (en) Method and system for layered software copyright protection
KR20080099631A (en) Method for using contents with a mobile card, host device, and mobile card
KR102585405B1 (en) Data security apparatus
KR20100114321A (en) Digital content transaction-breakdown the method thereof
CN104683355A (en) Anti-repudiation dynamic password generating method and dynamic password verification system
CN103731828B (en) A kind of terminal unit and method for electronic certificate authentication
US10057054B2 (en) Method and system for remotely keyed encrypting/decrypting data with prior checking a token
CN102647277A (en) Password protection method based on position information
CN203289647U (en) Handheld audio communication equipment for electronic certificate authentication
CN106210240B (en) A kind of encryption and decryption method and system based on intelligent terminal gyroscope
CN107707357A (en) Using secondary packing detection method, storage medium, electronic equipment and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20111026

Termination date: 20130311