CN104834836A - Method for protecting software - Google Patents

Method for protecting software Download PDF

Info

Publication number
CN104834836A
CN104834836A CN201510288487.2A CN201510288487A CN104834836A CN 104834836 A CN104834836 A CN 104834836A CN 201510288487 A CN201510288487 A CN 201510288487A CN 104834836 A CN104834836 A CN 104834836A
Authority
CN
China
Prior art keywords
software
silicon microphone
speech data
malloc
hardware platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510288487.2A
Other languages
Chinese (zh)
Inventor
王晶晶
李超
田达亨
王植华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Gettop Acoustic Co Ltd
Original Assignee
Shandong Gettop Acoustic Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Gettop Acoustic Co Ltd filed Critical Shandong Gettop Acoustic Co Ltd
Priority to CN201510288487.2A priority Critical patent/CN104834836A/en
Publication of CN104834836A publication Critical patent/CN104834836A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Remote Sensing (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method for protecting software. The method comprises the steps that when a software calling instruction is received, voice data output by a silicon microphone within preset time according to a preset encryption method are read, and the silicon microphone is arranged on a recording card on an authorized hardware platform; the voice data are decrypted according to a preset decryption method, and a decryption result is obtained; the decryption result is compared with a preset expected value, if the decryption result is matched with the preset expected value, the software is called, and otherwise, calling failing is determined. According to the method, the operation complexity of software authorization is reduced, and batch authorization of the software can be achieved conveniently.

Description

A kind of method for protecting software
Technical field
The present invention relates to software technology field, particularly relate to a kind of method for protecting software.
Background technology
General, software needs to be encrypted software to protect the core technology of oneself, to carry out empowerment management when software application, but along with the production in enormous quantities of product, and can to authorizing the problem brought on a lot of management and cost.
At present; software utilizes the MAC Address of Network Card on hardware platform to carry out mandate protection; need the MAC Address of Network Card obtaining platform; MAC Address is utilized to generate authority; authority is arranged in software; namely MAC Address and software are bound, and the MAC Address on each hardware platform of mandate needs to bind with software.Software will run on a hardware platform; need to read MAC Address on a hardware platform; MAC Address is utilized to carry out certification to the authority in software; after authentication success, software could start normal operation, if software is not having authorized hardware platform runs; the MAC Address obtained can not carry out certification to authority; certification is unsuccessful, and software cannot run, so utilize MAC Address to complete software protection.
But; utilize the MAC Address of Network Card on hardware platform to carry out authorizing the process of protection, need to obtain the MAC Address of Network Card on each hardware platform, generate authority; workload is large; be not suitable for software to produce in enormous quantities, operation complexity is high, and; also there is certain leak in this software protection; although MAC Address of Network Card has uniqueness, make different network interface cards have identical MAC Address by amendment system layer, thus lose protective effect.
Summary of the invention
The object of this invention is to provide a kind of method for protecting software, to reduce the operation complexity of soft ware authorization, conveniently realize the mandate of the batch of software.
For solving the problems of the technologies described above, the invention provides a kind of method for protecting software, the method comprises:
When receiving software transfer instruction, read silicon microphone according to the speech data that predetermined encryption method exports in Preset Time, described silicon microphone is arranged on the recording sound card on the hardware platform of mandate;
According to default decryption method, described speech data is decrypted, obtains decrypted result;
Described decrypted result and default expectation value are compared, if both couplings, then calls software, otherwise determine malloc failure malloc.
Preferably, described silicon microphone comprises chip and register.
Preferably, described reading silicon microphone according to the speech data that predetermined encryption method exports, comprising in Preset Time:
Read the speech data that described chip utilizes the encrypted code in described register to export according to predetermined encryption method in Preset Time.
Preferably, described described decrypted result and default expectation value to be compared, if both couplings, then call software, otherwise determine malloc failure malloc, comprising:
Described decrypted result and default expectation value are compared, if both are identical, then calls software, otherwise determine malloc failure malloc.
Preferably, described silicon microphone comprises MEMS silicon microphone.
Preferably, described predetermined encryption method comprises Voice Encryption algorithm.
Preferably, described default decryption method comprises voice decipherment algorithm.
A kind of method for protecting software provided by the present invention, when receiving software transfer instruction, read silicon microphone according to the speech data that predetermined encryption method exports in Preset Time, described silicon microphone is arranged on the sound recorded book on the hardware platform of mandate; According to default decryption method, described speech data is decrypted, obtains decrypted result; Described decrypted result and default expectation value are compared, if both couplings, then calls software, otherwise determine malloc failure malloc.Then the method uses the silicon microphone be arranged on the recording sound card of hardware platform; silicon microphone is directly utilized to be encrypted; again speech data is decrypted; successful decryption then can call software; then software can run on this hardware platform; otherwise can not software be called; software can not run on this hardware platform; need not obtain network interface card MAC on each hardware platform in this way; do not need to generate authority; directly utilize silicon Mike to carry out software protection, reduce the operation complexity of soft ware authorization, conveniently realize the mandate of the batch of software.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only embodiments of the invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to the accompanying drawing provided.
The process flow diagram of a kind of method for protecting software that Fig. 1 provides for the embodiment of the present invention.
Embodiment
Core of the present invention is to provide a kind of method for protecting software, to reduce the operation complexity of soft ware authorization, conveniently realizes the mandate of the batch of software.
The present invention program is understood better in order to make those skilled in the art person, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
Please refer to Fig. 1, the process flow diagram of a kind of method for protecting software that Fig. 1 provides for the embodiment of the present invention, the method comprises:
Step S101: when receiving software transfer instruction, reads silicon microphone in Preset Time according to the speech data that predetermined encryption method exports;
Wherein, described silicon microphone is arranged on the recording sound card on the hardware platform of mandate, for recording.
Concrete, described silicon microphone comprises chip and register, and register can be used for storage encryption code, and chip is used for exporting speech data.Described silicon microphone also can utilize storer to carry out storage encryption code.Described silicon microphone just starts to power on after software startup, and be namely energized, then described silicon microphone is recorded, and within a period of time of presetting, export speech data according to predetermined encryption code method, described speech data is enciphered data.
Concrete, described predetermined encryption method comprises Voice Encryption algorithm.In Preset Time, silicon microphone is recorded, and Voice Encryption algorithm can be utilized to export speech data.In addition, software comprises speech processing software, interactive software or positioning software.Speech processing software comprises audio frequency and video and speech processes that is secondary, ultrasonic range.
It should be noted that, the executor of this method for protecting software is the program arranged in this software, also can be the program of the other setting of software outside.That is the executor of the method is the program that software itself is arranged, and may not be software itself, can be another program.All with software, this is stated as executor for this step and following process, and namely software is when receiving software transfer instruction, reads silicon microphone in Preset Time according to the speech data that predetermined encryption method exports.
Step S102: be decrypted described speech data according to default decryption method, obtains decrypted result;
Wherein, described default decryption method comprises voice decipherment algorithm.Software can utilize decrypted voice algorithm to be decrypted described speech data.Described speech data comprises enciphered data.
Concrete, the speech data that software reads comprises enciphered data.Except enciphered data, the voice signal that silicon microphone got in the recording stage can also be read, such as, containing infrasonic sound and ultrasonic voice signal.
Step S103: described decrypted result and default expectation value are compared, if both couplings, then calls software, otherwise determines malloc failure malloc.
Wherein, described decrypted result and default expectation value are compared, if both couplings, then call software, if both can not mate, then determine malloc failure malloc.Even decrypted result and default expectation value match, then successfully call software, if decrypted result can not mate with default expectation value, then determine to call software failure.Detailed, after software obtains decrypted result, judge that whether decrypted result is correct, if correct, software can run use, and namely the hardware platform at this software place is authorized by arranging of silicon microphone, so software can be used on authorized hardware platform.If mistake, software can not run use, and namely the hardware platform at this software place is not authorized to, so software can not be used on this hardware platform be not authorized to.
Concrete, the method uses the silicon microphone be arranged on recording sound card, directly utilizes silicon microphone to be encrypted process, need not obtain the network interface card MAC on each hardware platform, reduce the operation complexity of soft ware authorization, realize the mandate of the batch of software.Detailed, to realize the mandate of software on how many hardware platforms, only need to be provided with above-mentioned silicon microphone on this few hardware platform, needing the hardware platform of authorizing is provided with silicon microphone described above, software just can run on this hardware platform, just can realize the mandate of hardware platform, then need not obtain the network interface card MAC on each hardware platform, reduce the operation complexity of soft ware authorization, and need the mandate of the batch realizing software, then only need need the hardware platform of authorizing arranges above-mentioned silicon microphone, be more prone to the mandate of the batch realizing software like this, namely the mandate of the batch of software is conveniently realized.
Preferably, based in step S101: read silicon microphone according to the speech data that predetermined encryption method exports in Preset Time, this step preferably adopts following steps to realize:
Step S11: read the speech data that described chip utilizes the encrypted code in described register to export according to predetermined encryption method in Preset Time.
Preferably, based on step S103: describedly described decrypted result and default expectation value to be compared, if both couplings, then call software, otherwise determine malloc failure malloc, this step preferably adopts following steps to realize:
Step S12: described decrypted result and default expectation value are compared, if both are identical, then calls software, otherwise determine malloc failure malloc.
Wherein, described decrypted result and default expectation value are compared, if both are identical, then calls software, if both are not identical, determine malloc failure malloc.
Preferably, described silicon microphone comprises MEMS silicon microphone.MEMS microphone is the microphone manufactured based on MEMS technology, namely based on the microphone that MEMS techniques manufactures, be exactly briefly that a capacitor is integrated on micro-silicon wafer, Surface Mount technique can be adopted to manufacture, very high Reflow Soldering temperature can be born, easily with CMOS technology and other voicefrequency circuit mutually integrated, and there is the noise removing performance of improvement and good RF and EMI suppress whole potential of .MEMS microphone to need to excavate, but adopt the product of this technology to embody many advantages in numerous applications, particularly in the application of middle and high end mobile phone.
A kind of method for protecting software that the embodiment of the present invention provides, when receiving software transfer instruction, read silicon microphone according to the speech data that predetermined encryption method exports in Preset Time, described silicon microphone is arranged on the sound recorded book on the hardware platform of mandate; According to default decryption method, described speech data is decrypted, obtains decrypted result; Described decrypted result and default expectation value are compared, if both couplings, then calls software, otherwise determine malloc failure malloc.Then software can run on this hardware platform; otherwise can not software be called; software can not run on this hardware platform; need not obtain network interface card MAC on each hardware platform in this way; do not need to generate authority; directly utilize silicon Mike to carry out software protection, reduce the operation complexity of soft ware authorization, conveniently realize the mandate of the batch of software.
In addition, this software protection effect is strong, and the speech data exported in the schedule time after silicon microphone powers on is enciphered data, and only decrypt correct result, software can normally run, otherwise exits, and can not be used.And unlike MAC Address, MAC Address can realize change technically, and software protection effect is weak, this method for protecting software is avoided using MAC Address to protect, and solves the problem that software protection effect is weak, enhances the action effect of software protection.
Above a kind of method for protecting software provided by the present invention is described in detail.Apply specific case herein to set forth principle of the present invention and embodiment, the explanation of above embodiment just understands method of the present invention and core concept thereof for helping.It should be pointed out that for those skilled in the art, under the premise without departing from the principles of the invention, can also carry out some improvement and modification to the present invention, these improve and modify and also fall in the protection domain of the claims in the present invention.

Claims (7)

1. a method for protecting software, is characterized in that, comprising:
When receiving software transfer instruction, read silicon microphone according to the speech data that predetermined encryption method exports in Preset Time, described silicon microphone is arranged on the recording sound card on the hardware platform of mandate;
According to default decryption method, described speech data is decrypted, obtains decrypted result;
Described decrypted result and default expectation value are compared, if both couplings, then calls software, otherwise determine malloc failure malloc.
2. the method for claim 1, is characterized in that, described silicon microphone comprises chip and register.
3. method as claimed in claim 2, is characterized in that, described reading silicon microphone according to the speech data that predetermined encryption method exports, comprising in Preset Time:
Read the speech data that described chip utilizes the encrypted code in described register to export according to predetermined encryption method in Preset Time.
4. the method for claim 1, is characterized in that, describedly described decrypted result and default expectation value is compared, if both couplings, then calls software, otherwise determines malloc failure malloc, comprising:
Described decrypted result and default expectation value are compared, if both are identical, then calls software, otherwise determine malloc failure malloc.
5. the method for claim 1, is characterized in that, described silicon microphone comprises MEMS silicon microphone.
6. the method for claim 1, is characterized in that, described predetermined encryption method comprises Voice Encryption algorithm.
7. method as claimed in claim 6, it is characterized in that, described default decryption method comprises voice decipherment algorithm.
CN201510288487.2A 2015-05-29 2015-05-29 Method for protecting software Pending CN104834836A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510288487.2A CN104834836A (en) 2015-05-29 2015-05-29 Method for protecting software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510288487.2A CN104834836A (en) 2015-05-29 2015-05-29 Method for protecting software

Publications (1)

Publication Number Publication Date
CN104834836A true CN104834836A (en) 2015-08-12

Family

ID=53812719

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510288487.2A Pending CN104834836A (en) 2015-05-29 2015-05-29 Method for protecting software

Country Status (1)

Country Link
CN (1) CN104834836A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103077341A (en) * 2013-01-30 2013-05-01 广东欧珀移动通信有限公司 Application program unlocking method and device
CN103353973A (en) * 2013-06-17 2013-10-16 上海方付通商务服务有限公司 Banking transaction authentication method based on video verification, and banking transaction authentication system based on video verification

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103077341A (en) * 2013-01-30 2013-05-01 广东欧珀移动通信有限公司 Application program unlocking method and device
CN103353973A (en) * 2013-06-17 2013-10-16 上海方付通商务服务有限公司 Banking transaction authentication method based on video verification, and banking transaction authentication system based on video verification

Similar Documents

Publication Publication Date Title
CN106301774B (en) Safety chip, its encryption key generation method and encryption method
KR20200013057A (en) Service Authorization Method, Apparatus, and Device
TW201933223A (en) Method and device for associating equipment and account number, electronic device and system
CN104581472B (en) A kind of earphone with identity authentication function
CN103747443A (en) Multi-security domain device based on mobile phone user identification card and authentication method thereof
WO2017193750A1 (en) Processing method for presenting copy attack, and server and client
CN111339536B (en) Data verification method and device based on secure execution environment
CN109450620A (en) The method and mobile terminal of security application are shared in a kind of mobile terminal
CN103548373A (en) Methods and apparatuses for lawful interception through a subscription manager
CN111931209A (en) Contract information verification method and device based on zero knowledge certification
TW201539429A (en) A smart phone paired with a Bluetooth headset for voice data encryption and decryption
CN109858235B (en) Portable equipment and password obtaining method and device thereof
CN103888268A (en) Mobile phone earphone based on PUF identity authentication and information encryption
CN103974243B (en) A kind of data handling system of voice call
CN108134994A (en) The SIM card of Double-puzzle operation
CN106331282B (en) Mobile phone communication anti-eavesdropping system for implementing encryption and decryption at Bluetooth earphone end
CN105681256A (en) Audio communication method and audio communication application device
CN104834836A (en) Method for protecting software
US10637851B2 (en) Introducing an identity into a secure element
CN204761537U (en) Implement mobile communication anti -eavesdrop system of encryption and decryption in bluetooth headset end
CN105515773A (en) Portable device, user device, and data interaction method
CN111600882A (en) Block chain-based account password management method and device and electronic equipment
CN108964923B (en) Interactive SM2 signature method, system and terminal for hiding private key
CN106102053A (en) A kind of implementation method of voice communication authentication based on the close algorithm of state
CN105610580A (en) External speech encryption device based on smart phone and implementation method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150812