[go: up one dir, main page]

CN104484586B - Software copyright protecting method - Google Patents

Software copyright protecting method Download PDF

Info

Publication number
CN104484586B
CN104484586B CN201510002748.XA CN201510002748A CN104484586B CN 104484586 B CN104484586 B CN 104484586B CN 201510002748 A CN201510002748 A CN 201510002748A CN 104484586 B CN104484586 B CN 104484586B
Authority
CN
China
Prior art keywords
string
encryption
software
mainboard
expansion board
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510002748.XA
Other languages
Chinese (zh)
Other versions
CN104484586A (en
Inventor
刘阳新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Flyingvoice Technology Co ltd
Original Assignee
BEIJING FLYINGVOICE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING FLYINGVOICE TECHNOLOGY Co Ltd filed Critical BEIJING FLYINGVOICE TECHNOLOGY Co Ltd
Priority to CN201510002748.XA priority Critical patent/CN104484586B/en
Publication of CN104484586A publication Critical patent/CN104484586A/en
Application granted granted Critical
Publication of CN104484586B publication Critical patent/CN104484586B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2153Using hardware token as a secondary aspect

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Remote Sensing (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of software copyright protecting method, it is related to field of information security technology.To solve in the prior art by the way of encryption chip, the problem of complexity of hardware development is higher, and the cost of software copyright protection is higher and invent.Technical scheme provided in an embodiment of the present invention includes:S10, when software to be protected is being run on first mainboard, first mainboard obtains the first encryption string, and the first encryption string is generated by the MAC Address of the first mainboard in advance;S20, first mainboard are decrypted corresponding to being carried out to the described first encryption string, obtain the first decryption string;S30, first mainboard carry out MAC Address authentication to the described first decryption string, and it is legal to judge whether;If S40, illegal, the first mainboard software to be protected out of service.

Description

Software copyright protection method
Technical Field
The invention relates to the technical field of information security, in particular to a software copyright protection method.
Background
In the prior art, a mode of an encryption chip is generally adopted to protect the copyright of device software so as to limit the copying of the software.
However, the encryption chip mode is adopted, the complexity of hardware development is high, and the cost of software copyright protection is high.
Disclosure of Invention
The invention provides a software copyright protection method which can reduce the cost of software copyright protection.
The technical scheme adopted by the invention for solving the technical problems is as follows: a software copyright protection method, comprising: s10, when the software to be protected runs on the first mainboard, the first mainboard obtains a first encryption string, and the first encryption string is generated by the MAC address of the first mainboard in advance; s20, the first main board correspondingly decrypts the first encryption string to obtain a first decryption string; s30, the first mainboard performs MAC address authentication on the first decryption string and judges whether the first decryption string is legal or not; and S40, if the software to be protected is illegal, stopping running the software to be protected by the first mainboard.
Optionally, the software copyright protection method provided in this embodiment further includes: s50, when the software to be protected runs on the expansion board, the expansion board obtains a second encryption string and a random number, wherein the second encryption string is generated by the MAC address of the expansion board in advance; s60, the expansion board sends first information consisting of the second encryption string and the random number to a corresponding second main board; s70, the second main board receives the first information and extracts a random number from the first information; s80, the second mainboard acquires a third encryption string, and the third encryption string is generated by the MAC address of the second mainboard in advance; s90, the second main board sends second information consisting of the third encryption string and the extracted random number to the expansion board; s91, the expansion board receives second information sent by the second main board, authenticates according to the second information and judges whether the second information is legal or not; and S92, if the software to be protected is illegal, stopping running the software to be protected by the expansion board.
Optionally, the software copyright protection method provided in this embodiment further includes: s41, when the second mainboard is produced, encrypting the MAC address of the second mainboard by adopting a preset encryption tool to obtain a third encryption string; and S42, the second main board stores the third encryption string in a flash memory thereof. S43, when the expansion board is produced, encrypting the MAC address of the expansion board by adopting a preset encryption tool to obtain a second encryption string; s44, the expansion board stores the second encryption string in the flash memory thereof.
Optionally, in the software copyright protection method provided in this embodiment, S91 includes: s911, the expansion board extracts a third encryption string from the second information; s912, the expansion board correspondingly decrypts the third encryption string to obtain a third decryption string; s913, the expansion board determines whether the third decryption string is legal or not according to a preset MAC address base.
Optionally, in the software copyright protection method provided in this embodiment, S91 further includes: s914, the expansion board extracts a random number from the second information to obtain an extracted number; the expansion board determines whether the expansion board is legal or not according to the extracted number and the random number; or, in S915, the expansion board determines whether the MAC address is legal or not according to the third decryption string and the MAC address.
Optionally, the software copyright protection method provided in this embodiment further includes: s01, when the first mainboard is produced, encrypting the MAC address of the first mainboard by adopting a preset encryption tool to obtain a first encryption string; and S02, the first main board burns and writes the first encryption string into a flash memory of the first main board.
Optionally, in the software copyright protection method provided in this embodiment, S30 includes: s301, the first main board matches the first decryption string through a preset MAC address base, and whether the first decryption string is legal or not is judged.
Optionally, in the software copyright protection method provided in this embodiment, S30 further includes: s302, the first main board determines whether the first decryption string is legal or not according to whether the first decryption string conforms to a preset format or not.
Optionally, in the software copyright protection method provided in this embodiment, the first motherboard and the second motherboard are the same motherboard; or the first main board and the second main board are different main boards.
The invention has the following beneficial effects: and authenticating the running equipment of the software to be protected through the MAC address, thereby realizing the protection of the software copyright. The technical scheme provided by the embodiment of the invention reduces the cost of hardware and development, and solves the problems of higher complexity of hardware development and higher cost of software copyright protection in the prior art by adopting an encryption chip mode. In addition, the authentication is carried out through the MAC address, the software cracking difficulty is increased, and the legal MAC address cannot be provided by simple system copy.
Drawings
Fig. 1 is a flowchart of a software protection method according to embodiment 1 of the present invention;
fig. 2 is a first flowchart of a software protection method according to embodiment 2 of the present invention;
fig. 3 is a second flowchart of a software protection method according to embodiment 2 of the present invention;
fig. 4 is a flowchart of a software protection method according to embodiment 3 of the present invention.
Detailed Description
The technical solution of the present invention is further described below with reference to the following embodiments and the accompanying drawings.
Example 1
As shown in fig. 1, this embodiment provides a software copyright protection method, including:
step 101, when software to be protected runs on a first main board, the first main board obtains a first encryption string.
In this embodiment, the first encryption string is generated in advance from the MAC address of the first motherboard in step 101.
And 102, correspondingly decrypting the first encryption string by the first main board to obtain a first decryption string.
Step 103, the first motherboard performs MAC address authentication on the first decryption string to determine whether the first decryption string is legal.
In this embodiment, the authentication process performed in step 103 may only be: and the first mainboard matches the first decryption string through a preset MAC address base and judges whether the first decryption string is legal or not. In particular, to prevent the encryption of the MAC address from being broken, the step 103 may further include: and the first main board determines whether the first decryption string is legal or not according to whether the first decryption string conforms to the preset format or not.
And 104, if the software to be protected is illegal, stopping running the software to be protected by the first mainboard.
The invention has the following beneficial effects: and authenticating the running equipment of the software to be protected through the MAC address, thereby realizing the protection of the software copyright. The technical scheme provided by the embodiment of the invention reduces the cost of hardware and development, and solves the problems of higher complexity of hardware development and higher cost of software copyright protection in the prior art by adopting an encryption chip mode. In addition, the authentication is carried out through the MAC address, the software cracking difficulty is increased, and the legal MAC address cannot be provided by simple system copy.
Example 2
As shown in fig. 2, the software copyright protection method provided in the embodiment of the present invention is similar to that shown in fig. 1, and the difference is that the method further includes:
and 105, when the software to be protected runs on the expansion board, the expansion board acquires a second encryption string and a random number.
In this embodiment, the second encryption string is generated in advance from the MAC address of the expansion board in step 105.
And 106, the expansion board sends first information consisting of the second encryption string and the random number to the corresponding second main board.
In this embodiment, the expansion board may be connected to the second motherboard through a network interface, or may be connected to the second motherboard through other interfaces, which is not described in detail herein. Specifically, the second motherboard and the first motherboard may be the same motherboard or different motherboards, which is not limited herein.
Step 107, the second motherboard receives the first information and extracts a random number from the first information.
And step 108, the second main board acquires a third encryption string.
In this embodiment, the third encryption string is generated in advance from the MAC address of the second motherboard in step 108.
And step 109, the second mainboard sends second information consisting of the third encryption string and the extracted random number to the expansion board.
And step 110, the expansion board receives the second information sent by the second main board, authenticates according to the second information, and determines whether the second information is legal or not.
In this embodiment, the process of performing authentication in step 110 may include: the expansion board extracts a third encryption string from the second information; the expansion board decrypts the third encryption string to obtain a third decryption string; and the expansion board determines whether the third decryption string is legal or not according to a preset MAC address base. Further, in order to prevent the MAC address encryption from being broken, the authentication process may further include: the expansion board extracts the random number from the second information, and after the extraction number is obtained, the expansion board determines whether the random number is legal or not according to the extraction number and the random number; the process may compare the random number and the extracted number for the expansion board, and determine whether it is legal based on whether they are the same. Or, the expansion board can also determine whether the MAC address is legal or not according to the third decryption string; the process may compare the MAC address with the third decryption string for the expansion board, and determine whether it is legal based on whether they are the same.
And step 111, if the software to be protected is illegal, the expansion board stops running the software to be protected.
Further, as shown in fig. 3, the software copyright protection method provided in this embodiment further includes, before step 105:
and 112, when the second mainboard is produced, encrypting the MAC address of the second mainboard by using a preset encryption tool to obtain a third encryption string.
In this embodiment, the preset encryption tool in step 112 may use a Data Encryption Standard (DES) algorithm, or may use other encryption algorithms, which is not described in detail herein.
In step 113, the second motherboard stores the third encrypted string in its flash memory.
And step 114, when the expansion board is produced, encrypting the MAC address of the expansion board by adopting a preset encryption tool to obtain a second encryption string.
At step 115, the expansion board stores the second encrypted string in its flash memory.
In this embodiment, the second main board and the expansion board respectively store the data encrypted by their MAC addresses into their respective flash memories, so as to prevent illegal tampering and illegal copying of software.
The invention has the following beneficial effects: and authenticating the running equipment of the software to be protected through the MAC address, thereby realizing the protection of the software copyright. The technical scheme provided by the embodiment of the invention reduces the cost of hardware and development, and solves the problems of higher complexity of hardware development and higher cost of software copyright protection in the prior art by adopting an encryption chip mode. In addition, the authentication is carried out through the MAC address, the software cracking difficulty is increased, and the legal MAC address cannot be provided by simple system copy.
Example 3
As shown in fig. 4, an embodiment of the present invention provides a software copyright protection method, which is similar to that provided in embodiment 1 or 2 of the present invention, except that, before step 101, the method further includes:
and step 116, when the first mainboard is produced, encrypting the MAC address of the first mainboard by using a preset encryption tool to obtain a first encryption string.
In this embodiment, the preset encryption tool in step 116 may use a Data Encryption Standard (DES) algorithm, or may use other encryption algorithms, which is not described in detail herein.
Step 117, the first motherboard writes the first encrypted string to its memory.
The invention has the following beneficial effects: and authenticating the running equipment of the software to be protected through the MAC address, thereby realizing the protection of the software copyright. The technical scheme provided by the embodiment of the invention reduces the cost of hardware and development, and solves the problems of higher complexity of hardware development and higher cost of software copyright protection in the prior art by adopting an encryption chip mode. In addition, the authentication is carried out through the MAC address, the software cracking difficulty is increased, and the legal MAC address cannot be provided by simple system copy.
The sequence of the above embodiments is only for convenience of description and does not represent the advantages and disadvantages of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (9)

1. A software copyright protection method is characterized by comprising the following steps:
s10, when the software to be protected runs on the first mainboard, the first mainboard obtains a first encryption string, and the first encryption string is generated by the MAC address of the first mainboard in advance;
s20, the first main board correspondingly decrypts the first encryption string to obtain a first decryption string;
s30, the first mainboard performs MAC address authentication on the first decryption string and judges whether the first decryption string is legal or not;
and S40, if the software to be protected is illegal, stopping running the software to be protected by the first mainboard.
2. The software copyright protection method of claim 1, further comprising:
s50, when the software to be protected runs on the expansion board, the expansion board obtains a second encryption string and a random number, wherein the second encryption string is generated by the MAC address of the expansion board in advance;
s60, the expansion board sends first information consisting of the second encryption string and the random number to a corresponding second main board;
s70, the second main board receives the first information and extracts a random number from the first information;
s80, the second mainboard acquires a third encryption string, and the third encryption string is generated by the MAC address of the second mainboard in advance;
s90, the second main board sends second information consisting of the third encryption string and the extracted random number to the expansion board;
s91, the expansion board receives second information sent by the second main board, authenticates according to the second information and judges whether the second information is legal or not;
and S92, if the software to be protected is illegal, stopping running the software to be protected by the expansion board.
3. The software copyright protection method of claim 2, further comprising:
s41, when the second mainboard is produced, encrypting the MAC address of the second mainboard by adopting a preset encryption tool to obtain a third encryption string;
s42, the second main board stores the third encryption string in a flash memory of the second main board;
s43, when the expansion board is produced, encrypting the MAC address of the expansion board by adopting a preset encryption tool to obtain a second encryption string;
s44, the expansion board stores the second encryption string in the flash memory thereof.
4. The software copyright protection method of claim 2, wherein the S91 includes:
s911, the expansion board extracts a third encryption string from the second information;
s912, the expansion board correspondingly decrypts the third encryption string to obtain a third decryption string;
s913, the expansion board determines whether the third decryption string is legal or not according to a preset MAC address base.
5. The software copyright protection method of claim 4, wherein the S91 further comprises:
s914, the expansion board extracts a random number from the second information to obtain an extracted number; the expansion board determines whether the expansion board is legal or not according to the extracted number and the random number; or,
s915, the expansion board determines whether the third decryption string is legal or not according to the MAC address of the expansion board and the third decryption string.
6. The software copyright protection method of any one of claims 1 to 5, further comprising:
s01, when the first mainboard is produced, encrypting the MAC address of the first mainboard by adopting a preset encryption tool to obtain a first encryption string;
and S02, the first main board burns and writes the first encryption string into a flash memory of the first main board.
7. The software copyright protection method of any one of claims 1 to 5, wherein the S30 includes:
s301, the first main board matches the first decryption string through a preset MAC address base, and whether the first decryption string is legal or not is judged.
8. The software copyright protection method of claim 7, wherein the S30 further comprises:
s302, the first main board determines whether the first decryption string is legal or not according to whether the first decryption string conforms to a preset format or not.
9. The software copyright protection method according to any one of claims 1 to 5,
the first main board and the second main board are the same main board; or the first main board and the second main board are different main boards.
CN201510002748.XA 2015-01-05 2015-01-05 Software copyright protecting method Active CN104484586B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510002748.XA CN104484586B (en) 2015-01-05 2015-01-05 Software copyright protecting method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510002748.XA CN104484586B (en) 2015-01-05 2015-01-05 Software copyright protecting method

Publications (2)

Publication Number Publication Date
CN104484586A CN104484586A (en) 2015-04-01
CN104484586B true CN104484586B (en) 2017-11-24

Family

ID=52759127

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510002748.XA Active CN104484586B (en) 2015-01-05 2015-01-05 Software copyright protecting method

Country Status (1)

Country Link
CN (1) CN104484586B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106534163B (en) * 2016-12-05 2020-03-24 上海华测导航技术股份有限公司 Detection method of receiver
CN107704731B (en) * 2017-09-28 2021-03-09 成都安恒信息技术有限公司 Cloud platform mirror image anti-piracy method based on HOTP

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102411685A (en) * 2011-10-17 2012-04-11 无锡诺宝科技发展有限公司 Method for protecting copyright by combining with MAC (media access control) address
CN102982264A (en) * 2012-12-24 2013-03-20 上海斐讯数据通信技术有限公司 Method for protecting embedded type device software

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006229352A (en) * 2005-02-15 2006-08-31 Sii Network Systems Kk Communications equipment for executing handover and network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102411685A (en) * 2011-10-17 2012-04-11 无锡诺宝科技发展有限公司 Method for protecting copyright by combining with MAC (media access control) address
CN102982264A (en) * 2012-12-24 2013-03-20 上海斐讯数据通信技术有限公司 Method for protecting embedded type device software

Also Published As

Publication number Publication date
CN104484586A (en) 2015-04-01

Similar Documents

Publication Publication Date Title
US8972723B2 (en) Storage device and method for providing a partially-encrypted content file to a host device
CN107004083B (en) Device key protection
US9960914B2 (en) Semiconductor device and information processing system for encrypted communication
US8132015B1 (en) Method and system for loading a secure firmware update on an adapter device of a computer system
KR100792287B1 (en) Security method using self-generated encryption key and applied security device
US20080285747A1 (en) Encryption-based security protection method for processor and apparatus thereof
US9047445B2 (en) Memory device and method for updating a security module
US20180204004A1 (en) Authentication method and apparatus for reinforced software
JP7087172B2 (en) Unlock PQA
CN114785503B (en) Cipher card, root key protection method thereof and computer readable storage medium
JP2008287488A (en) Data distributing and preserving unit
KR101430861B1 (en) Security information sharing system and execution method thereof
WO2015176531A1 (en) Terminal data writing and reading methods and devices
CN111143784A (en) Copyright protection realization method and copyright protection storage device
CN104077243A (en) SATA hard disc device encryption method and system
TWI393006B (en) Security system and method for code dump protection
CN104484586B (en) Software copyright protecting method
CN101167301B (en) Confidential information processing host device and confidential information processing method
BR102015011937A2 (en) agent to provide cloud security service and security token device for cloud security service
US20060075254A1 (en) Smart card functionality from a security co-processor and symmetric key in ROM
CN110932853B (en) Key management device and key management method based on trusted module
US20240004559A1 (en) Restore to factory settings of a mobile data storage device
JP6471136B2 (en) Data encryption system using security key
CN109660355B (en) Method, device, storage medium and terminal for preventing POS terminal from being illegally tampered
Fukami et al. Exploiting RPMB authentication in a closed source TEE implementation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220727

Address after: 518000 1801 and 1802, building 1, Chongwen Park, Nanshan Zhiyuan, No. 3370 Liuxian Avenue, Fuguang community, Taoyuan Street, Nanshan District, Shenzhen, Guangdong Province

Patentee after: FLYINGVOICE TECHNOLOGY Co.,Ltd.

Address before: Room 202, building a, No. 12, Hongda North Road, Beijing Economic and Technological Development Zone, Fengtai District, Beijing 100176

Patentee before: BEIJING FLYINGVOICE TECHNOLOGY Co.,Ltd.