Nothing Special   »   [go: up one dir, main page]

CN104346543A - Encryption method for identifying computer intelligently - Google Patents

Encryption method for identifying computer intelligently Download PDF

Info

Publication number
CN104346543A
CN104346543A CN201310322741.7A CN201310322741A CN104346543A CN 104346543 A CN104346543 A CN 104346543A CN 201310322741 A CN201310322741 A CN 201310322741A CN 104346543 A CN104346543 A CN 104346543A
Authority
CN
China
Prior art keywords
software
password
computer
user
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310322741.7A
Other languages
Chinese (zh)
Inventor
王丰
王猛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changsha Microscopic Information Science And Technology Ltd
Original Assignee
Changsha Microscopic Information Science And Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changsha Microscopic Information Science And Technology Ltd filed Critical Changsha Microscopic Information Science And Technology Ltd
Priority to CN201310322741.7A priority Critical patent/CN104346543A/en
Publication of CN104346543A publication Critical patent/CN104346543A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to an encryption method for identifying a computer intelligently. Encryption software is enabled to have a function of identifying the computer automatically; the encryption software can automatically select multiple characteristic parameters of the computer to generate a password based on configuration condition of hardware or software of a user's machine; when a user runs the software for the first time, the computer detects and displays the characteristic parameters C automatically; the user informs a software publisher of the characteristic parameters according to a prompt and pays a fee for registration. In comparison with the prior art, the encryption software has the function of identifying the computer automatically, the encryption software can automatically select multiple characteristic parameters of the computer to generate the password based on configuration condition of hardware or software of the user's machine; as the parameters such as serial number and version number of the hardware of the computer and the software of an operating system are different, passwords of different computers are different after the parameters are processed to be used as passwords. Therefore, piracy is prevented efficiently and pirating difficulty is added. The encryption method for identifying the computer intelligently is simple and practical, and is worthy of generalization and application.

Description

A kind of encryption method of Intelligent Recognition computing machine
Technical field
The present invention relates to a kind of encryption method of Intelligent Recognition computing machine.
Background technology
Current software cryptography mainly contains two large classes: first hardware encipher, i.e. so-called " house dog ".Due to hardware encipher costly, add the financial burden of software purchasers.So the method for present hardware encipher, only use the encryption of software for enterprise, civilian software seldom adopts.It two is pre-set a fixing sequence number or password in a program, and the sequence number in sequence number user inputted during operation or password and software or password compare, to reach the object of software cryptography.This method due to the sequence number in software or password be fixing, as long as therefore had correct sequence number or password, then software can use on any computing machine.Therefore bootlegger can buy a copyrighted software, after obtaining sequence number or password, software is made CD together with sequence number and sells.Such encryption is performed practically no function, and does not play a part stolen at all.
Summary of the invention
The object of the invention is to overcome defect that above-mentioned prior art exists and a kind of encryption method of Intelligent Recognition computing machine is provided.
Object of the present invention can be achieved through the following technical solutions: the present invention allows encryption software have the function automatically identifying computing machine, encryption software can according to the configuring condition of the hardware of subscriber computer or software, automatically several characteristic parameter generating ciphers of computing machine are chosen, user first operating software time have computer auto-detection and demonstrate characteristic parameter C, user informs software publisher by prompting this characteristic parameter, and payment registration.Characteristic parameter is substituted into self-defining encryption function F1 (c) of developer by developer, calculates password M=F (c), and this password is informed registered user.During the first operating software of user, computer auto-detection characteristic parameter C, and C is substituted into the decryption function F2 (c) be preset in application software, calculate decoding N=F2 (c), due to F1 (c)=F2 (c), the N so password M=decodes, password correctly allows to use software, automatically proceed to master routine, and remember password, just do not need to repeat input password when reusing software.If the password of a computing machine is used for other computing machines, then due to C1 ≠ C2, therefore M ≠ N, software is closed automatically, ensures that software is not stolen.
Compared with prior art, this encryption software has the function automatically identifying computing machine, encryption software can according to the configuring condition of the hardware of subscriber computer or software, automatically several characteristic parameter generating ciphers of computing machine are chosen, because the parameter such as sequence number, version number of the hardware of computing machine, operating system software is different, using after these parameter processing as password, then the password of different computing machine is all different, therefore effectively can prevent piracy, and add pirate difficulty.The method is simple, practical, is worthy of popularization.
Embodiment
The present invention allows encryption software have the function automatically identifying computing machine, encryption software can according to the configuring condition of the hardware of subscriber computer or software, automatically several characteristic parameter generating ciphers of computing machine are chosen, user first operating software time have computer auto-detection and demonstrate characteristic parameter C, user informs software publisher by prompting this characteristic parameter, and payment registration.Characteristic parameter is substituted into self-defining encryption function F1 (c) of developer by developer, calculates password M=F (c), and this password is informed registered user.During the first operating software of user, computer auto-detection characteristic parameter C, and C is substituted into the decryption function F2 (c) be preset in application software, calculate decoding N=F2 (c), due to F1 (c)=F2 (c), the N so password M=decodes, password correctly allows to use software, automatically proceed to master routine, and remember password, just do not need to repeat input password when reusing software.If the password of a computing machine is used for other computing machines, then due to C1 ≠ C2, therefore M ≠ N, software is closed automatically, ensures that software is not stolen.
Computer characteristic parameter mainly comprises various hardware and software parameter, can with the various function checks in WindowsAPI out, but because the hardware configuration of each computing machine and operating system can not be completely the same, need, by the method for some intelligence, various parameter is carried out integrated encode, characteristic parameter code should comprise hardware, the specification information of software and version information, software after such encryption could run on any computing machine, in addition, different software developers can formulate different characteristic parameter forms, comprising characteristic parameter code length, character implication etc.Software upgrading or for different developers, only need change encrypting and decrypting function, does not need to make other changes to encryption software.
Encrypted software is loaded Intel PDC G2020CPU, 500G hard disk, 2G internal memory, the Dell desktop computer that has network interface card, Windows7 operating system, computer name to be user, operating software indicating characteristic C=172153 first, by F1 (c)=(C*2+110) * 2, calculating password is 688832, again run application software, input password 688832, enters master routine smoothly.If input other codes, then all can not enter, encrypt successfully.Encrypted software is loaded the operating system of i5-3317U CPU, 500G Large ca-pacity and high speed hard-disk, 4G internal memory, Intel's core core video card, Windows8, computer name is association's notebook of user, indicating characteristic C=207211, by F1 (c)=(C*2+110) * 2, calculating password is 829064, again run application software, input password 829064, enters master routine smoothly.If input other codes, then all can not enter, encrypt successfully.By the operating system of encrypted software i3-3227U CPU, 500G Large ca-pacity and high speed hard-disk, 4G internal memory, Intel's core core video card, Windows8, computer name is also association's notebook of user, input password 829064, master routine can not be entered, this illustrates that encryption method can distinguish the quite similar computing machine of configuration, and that usurps has a remote possibility.

Claims (1)

1. an encryption method for Intelligent Recognition computing machine, is characterized in that: user first operating software time have computer auto-detection and demonstrate characteristic parameter C, user by prompting this characteristic parameter is informed software publisher, and payment registration.Characteristic parameter is substituted into self-defining encryption function F1 (c) of developer by developer, calculates password M=F (c), and this password is informed registered user.During the first operating software of user, computer auto-detection characteristic parameter C, and C is substituted into the decryption function F2 (c) be preset in application software, calculate decoding N=F2 (c), due to F1 (c)=F2 (c), the N so password M=decodes, password correctly allows to use software, automatically proceed to master routine, and remember password, just do not need to repeat input password when reusing software.
CN201310322741.7A 2013-07-29 2013-07-29 Encryption method for identifying computer intelligently Pending CN104346543A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310322741.7A CN104346543A (en) 2013-07-29 2013-07-29 Encryption method for identifying computer intelligently

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310322741.7A CN104346543A (en) 2013-07-29 2013-07-29 Encryption method for identifying computer intelligently

Publications (1)

Publication Number Publication Date
CN104346543A true CN104346543A (en) 2015-02-11

Family

ID=52502127

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310322741.7A Pending CN104346543A (en) 2013-07-29 2013-07-29 Encryption method for identifying computer intelligently

Country Status (1)

Country Link
CN (1) CN104346543A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1591333A (en) * 2003-09-01 2005-03-09 许必熙 Intelligent encryption method capable of identifying computer
CN101082950A (en) * 2007-07-10 2007-12-05 侯同济 Software encrypting registration piracy-preventing method
US20100169962A1 (en) * 2006-03-22 2010-07-01 Axalto Sa Method of Securely Logging Into Remote Servers

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1591333A (en) * 2003-09-01 2005-03-09 许必熙 Intelligent encryption method capable of identifying computer
US20100169962A1 (en) * 2006-03-22 2010-07-01 Axalto Sa Method of Securely Logging Into Remote Servers
CN101082950A (en) * 2007-07-10 2007-12-05 侯同济 Software encrypting registration piracy-preventing method

Similar Documents

Publication Publication Date Title
US10284372B2 (en) Method and system for secure management of computer applications
US9262598B1 (en) Digital rights management for applications
CN103210396B (en) Comprise the method and apparatus of the framework for the protection of sensitive code and data
US8966653B2 (en) Method and apparatus for provisioning a mobile application
US20030221116A1 (en) Security framework for protecting rights in computer software
CN109992987B (en) Script file protection method and device based on Nginx and terminal equipment
TWI514186B (en) User controllable platform-level trigger to set policy for protecting platform from malware
CN107077540B (en) Method and system for providing cloud-based application security services
TWI526869B (en) Method, device, system and non-transitory machine-readable medium to enable a value-added storage service of a storage system coupled to a client
KR20200099041A (en) Apparatus and method for managing content access rights based on blockchain
US20130067240A1 (en) Content protection via online servers and code execution in a secure operating system
Zhang et al. A novel approach to rights sharing-enabling digital rights management for mobile multimedia
KR100755708B1 (en) Method and apparatus for consuming contents using temporary license
EP2460068A1 (en) System and method for limiting execution of software to authorized users
CN108737444A (en) Micro services authorization management method and device applied to intelligent robot
Zhang et al. Security and trust in digital rights management: A survey.
US7577849B2 (en) Keyed-build system for controlling the distribution of software
CN107391970B (en) Function access control method and device in Flash application program
US20150262084A1 (en) Methods for defending static and dynamic reverse engineering of software license control and devices thereof
US8904508B2 (en) System and method for real time secure image based key generation using partial polygons assembled into a master composite image
Bahaa-Eldin et al. A comprehensive software copy protection and digital rights management platform
NL2034177A (en) Method for protecting deep learning model based on confidential computing
US20180107997A1 (en) Managing software licensing cost information
CN104346543A (en) Encryption method for identifying computer intelligently
CN114357384A (en) Method for activating software based on authorization file, computing device and computer readable medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150211