CN203054848U - Software encryption lock - Google Patents

Software encryption lock Download PDF

Info

Publication number
CN203054848U
CN203054848U CN 201320050853 CN201320050853U CN203054848U CN 203054848 U CN203054848 U CN 203054848U CN 201320050853 CN201320050853 CN 201320050853 CN 201320050853 U CN201320050853 U CN 201320050853U CN 203054848 U CN203054848 U CN 203054848U
Authority
CN
China
Prior art keywords
software
nonvolatile memory
lock
configuration file
encryption lock
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 201320050853
Other languages
Chinese (zh)
Inventor
王光海
黄旭日
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JINYING XURI ENERGY TECHNOLOGY (BEIJING) Co Ltd
Original Assignee
JINYING XURI ENERGY TECHNOLOGY (BEIJING) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JINYING XURI ENERGY TECHNOLOGY (BEIJING) Co Ltd filed Critical JINYING XURI ENERGY TECHNOLOGY (BEIJING) Co Ltd
Priority to CN 201320050853 priority Critical patent/CN203054848U/en
Application granted granted Critical
Publication of CN203054848U publication Critical patent/CN203054848U/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The utility model discloses a software encryption lock which comprises a central processing unit (CPU), a nonvolatile memory and an interface unit. The interface unit is used for being connected with a host machine of operational software. The nonvolatile memory is used for storing configuration files, and the CPU is used for processing software commands and loading the configuration files from the nonvolatile memory. According to the software encryption technical scheme, a software interface and the functional configuration files are wrote into the encryption lock for protection. For pirated software, if only a software package is embezzled, software functions can not be configured even if an analog interruption method is used, and therefore the part expected to be confidential can not operate normally. Meanwhile, due to the fact that the software configuration files are highly professional, the software functions still can not be configured normally because of different paths even if the configuration files are copied, the software also can not be used normally, and thus reliability of software protection is guaranteed.

Description

A kind of software cryptography lock
Technical field
The utility model relates to Software Protection Technique, particularly a kind of software cryptography locking device.
Background technology
The software cryptography lock is a kind of security product that is inserted in the software and hardware combining on the computing machine.General have tens or the nonvolatile storage space of hundreds of byte can be for read-write, the encryption lock inside that has has now also comprised single-chip microcomputer.The software developer can carry out exchanges data (namely encryption lock being read and write) by interface function and encryption lock, checks whether encryption lock is inserted on the interface; Perhaps directly encrypt own EXE file (being commonly called as " involucrum ") with the subsidiary instrument of encryption lock.Like this, the software developer can arrange the many places software locks in software, utilizes encryption lock to open these locks as key; If it is not corresponding not insert encryption lock or encryption lock, software can not normally be carried out.Encryption lock is by realizing encrypting with the encryption lock swap data in software execute process.The built-in single chip circuit of encryption lock (also claiming CPU) makes the processing power that encryption lock has judgement, analyzes to have strengthened anti-decryption capabilities initiatively.Include the algorithm software that is exclusively used in encryption in the built-in single-chip microcomputer of encryption lock, after this software is written into single-chip microcomputer, just can not be read out again.
In addition, in the existing encryption lock, the encryption lock that also has a kind of being to use " code transplanting " mode to be encrypted, namely by with the partial code in the software through compiling, " transplantings " arrives encryption lock hardware inside, the copy of this section code not in the software.In use, application software can be instructed key code and data and return results in the encryption lock operation hardware by funcall, thereby still can finish the whole function of whole software.
The encryption lock that exists in the prior art, the single-chip microcomputer encryption lock is copied by hardware easily because its algorithm is simple, and storage space is little, and is same, use " code transplanting " though encryption lock improve to some extent, but still can't avoid above-mentioned defective.
Summary of the invention
For overcoming the above-mentioned problems in the prior art, the invention provides a kind of software cryptography lock, configuration file stores in encryption lock, is improved the reliability of software protection.
The technical scheme of software cryptography lock of the present invention comprises central processing unit CPU, nonvolatile memory and interface unit; Described interface unit is used for being connected with the main frame of operating software; Described nonvolatile memory is used for store configuration files; Described central processing unit CPU, for the treatment of software instruction, loading configuration file from described nonvolatile memory.When running software, send instruction to encryption lock, require to read configuration file; The central processing unit CPU of encryption lock is carried out instruction accordingly after receiving instruction, load software configuration file, and software normally moves.
In the technical scheme of software cryptography lock of the present invention, the configuration file of storing in the described nonvolatile memory is software function configuration file and/or software operation interface file.
In the technical scheme of software cryptography lock of the present invention, can also comprise a time controller, be used for the service time of control software.Described service time, refer to the time limit of licensing.When running software, send instruction to encryption lock, require read functions configuration file and/or software operation interface file; The central processing unit CPU of encryption lock is after receiving instruction, confirm at first whether software surpasses service time, if do not surpass service time, then carry out corresponding instruction, load software function configuration file and/or software operation interface file, software normally moves; If judge to surpass service time, then return " mistake " result, software can't normally move.
In the technical scheme of software cryptography lock of the present invention, described interface unit can be USB interface.
In the technical scheme of software cryptography lock of the present invention, described nonvolatile memory can be any one or more in electricallyerasable ROM (EEROM), ROM (read-only memory), random access memory or the flash memory.
Software cryptography lock technology scheme of the present invention writes encryption lock protection to software interface and functional configuration file.When running software, thereby in encryption lock, read the normal operation that configuration file is realized software.When usurping, if only usurp software package, even utilize the break simulation method, can't the configuration software function, thus the part of wishing in the software to maintain secrecy can't normally be moved.Simultaneously, because software configuration file has the professional of height, even copied configuration file, the difference in path still can't normal configuration, and software also can't normally use, thereby guarantees the reliability of software protection.
Description of drawings
Fig. 1 is the structural representation of the software cryptography lock of the invention;
Fig. 2 is the schematic flow sheet of the software cryptography lock of the invention.
Embodiment
Below in conjunction with accompanying drawing, the software cryptography of the invention lock is further described.
As shown in Figure 1, the software cryptography of the invention lock comprises central processing unit CPU, nonvolatile memory, interface unit and time controller.
Described interface unit is USB interface, is connected with the main frame of operating software.
Described nonvolatile memory is any in electricallyerasable ROM (EEROM) (EEPROM), ROM (read-only memory) (ROM), random access memory (RAM), the flash memory (FLASH).
Store the configuration file of software in the described nonvolatile memory, configuration file comprises software function configuration file and/or software operation interface file.
Described central processing unit CPU, for the treatment of software instruction, loading configuration file from described nonvolatile memory.
Time controller is used for the service time of control software.In described time controller, preset the time that soft ware authorization uses.
As shown in Figure 2, when software when main frame moves, send instruction to encryption lock, require functional configuration file and/or the software operation interface file of reading software; The central processing unit CPU of encryption lock is after receiving instruction, confirm at first whether software surpasses service time, if do not surpass service time, then carry out corresponding instruction, load software function configuration file and/or software operation interface file, software normally moves; If judge to surpass service time, then return " mistake " result, software can't normally move.
Software cryptography of the present invention lock writes software interface and functional configuration file in the encryption lock and to protect.When software when main frame moves, read in the encryption lock configuration file from and software can normally move.When usurping, if only usurp software package, even utilize method such as break simulation, also can't the configuration software function, thus the part of wishing in the software to maintain secrecy can't normally be moved.Simultaneously, because software configuration file has the professional of height, even copied configuration file, the difference in path still can't normal configuration, and software also can't normally use, thereby can be so that software protection has higher reliability.

Claims (6)

1. a software cryptography lock comprises central processing unit CPU, nonvolatile memory and interface unit, it is characterized in that, described interface unit is used for being connected with the main frame of operating software; Described nonvolatile memory is used for store configuration files; Described central processing unit CPU, for the treatment of software instruction, loading configuration file from described nonvolatile memory.
2. software cryptography lock as claimed in claim 1 is characterized in that the configuration file of storing in the described nonvolatile memory is the software function configuration file.
3. software cryptography lock as claimed in claim 2 is characterized in that the configuration file of storing in the described nonvolatile memory also comprises the software operation interface file.
4. software cryptography lock as claimed in claim 1 or 2 is characterized in that, also comprises a time controller, is used for the service time of control software.
5. software cryptography lock as claimed in claim 1 or 2 is characterized in that described interface unit is USB interface.
6. software cryptography lock as claimed in claim 1 or 2 is characterized in that described nonvolatile memory is any in electricallyerasable ROM (EEROM), ROM (read-only memory), random access memory or the flash memory.
CN 201320050853 2013-01-30 2013-01-30 Software encryption lock Expired - Fee Related CN203054848U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201320050853 CN203054848U (en) 2013-01-30 2013-01-30 Software encryption lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201320050853 CN203054848U (en) 2013-01-30 2013-01-30 Software encryption lock

Publications (1)

Publication Number Publication Date
CN203054848U true CN203054848U (en) 2013-07-10

Family

ID=48737780

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201320050853 Expired - Fee Related CN203054848U (en) 2013-01-30 2013-01-30 Software encryption lock

Country Status (1)

Country Link
CN (1) CN203054848U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107085676A (en) * 2017-05-11 2017-08-22 北京理工大学 The Software Intellectual Property Rights guard method of the various dimensions of software and hardware combining

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107085676A (en) * 2017-05-11 2017-08-22 北京理工大学 The Software Intellectual Property Rights guard method of the various dimensions of software and hardware combining

Similar Documents

Publication Publication Date Title
CN108269605B (en) Security device state apparatus and method
CN104156642B (en) A kind of security password input system and method based on safe touch screen control chip
CN112035152B (en) Secure processing system and method for upgrading firmware of SoC chip
US8572410B1 (en) Virtualized protected storage
JP5419776B2 (en) Semiconductor device and data processing method
WO2020037612A1 (en) Embedded program secure boot method, apparatus and device, and storage medium
KR100746012B1 (en) Method and apparatus for changing and booting code image securely
US20060177064A1 (en) Secure memory card with life cycle phases
US20120331218A1 (en) Flash memory storage system, and controller and anti-falsifying method thereof
KR101303278B1 (en) FPGA apparatus and method for protecting bitstream
CN1329787C (en) Method of preventing firmware piracy
US20070188183A1 (en) Secure memory card with life cycle phases
TW200832427A (en) Virtual secure on-chip one time programming
US20200293206A1 (en) Storage device and control method
CN204242180U (en) A kind of security password input system based on safe touch screen control chip
CN103258172A (en) Off-chip Nor Flash bus interface hardware encryption device
CN105095945A (en) SD card capable of securely storing data
JP6636028B2 (en) Secure element
KR20070121642A (en) Secure memory card with life cycle phases
CN106919858B (en) Chip, and data protection device and method of chip
JP2018190386A (en) Apparatus for managing secure integrated-circuit state and method of the same
CN112199740B (en) Encryption lock implementation method and encryption lock
US10157149B2 (en) Memory device and host device
CN203054848U (en) Software encryption lock
JP5759827B2 (en) MEMORY SYSTEM, INFORMATION PROCESSING DEVICE, MEMORY DEVICE, AND MEMORY SYSTEM OPERATION METHOD

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130710

Termination date: 20180130