CN104484586B - Software copyright protecting method - Google Patents
Software copyright protecting method Download PDFInfo
- Publication number
- CN104484586B CN104484586B CN201510002748.XA CN201510002748A CN104484586B CN 104484586 B CN104484586 B CN 104484586B CN 201510002748 A CN201510002748 A CN 201510002748A CN 104484586 B CN104484586 B CN 104484586B
- Authority
- CN
- China
- Prior art keywords
- string
- encryption
- software
- mainboard
- expansion board
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 230000015654 memory Effects 0.000 claims description 10
- 239000000284 extract Substances 0.000 claims description 9
- 230000009286 beneficial effect Effects 0.000 description 4
- 238000013478 data encryption standard Methods 0.000 description 4
- 238000000605 extraction Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2153—Using hardware token as a secondary aspect
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Remote Sensing (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Radar, Positioning & Navigation (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of software copyright protecting method, it is related to field of information security technology.To solve in the prior art by the way of encryption chip, the problem of complexity of hardware development is higher, and the cost of software copyright protection is higher and invent.Technical scheme provided in an embodiment of the present invention includes:S10, when software to be protected is being run on first mainboard, first mainboard obtains the first encryption string, and the first encryption string is generated by the MAC Address of the first mainboard in advance;S20, first mainboard are decrypted corresponding to being carried out to the described first encryption string, obtain the first decryption string;S30, first mainboard carry out MAC Address authentication to the described first decryption string, and it is legal to judge whether;If S40, illegal, the first mainboard software to be protected out of service.
Description
Technical Field
The invention relates to the technical field of information security, in particular to a software copyright protection method.
Background
In the prior art, a mode of an encryption chip is generally adopted to protect the copyright of device software so as to limit the copying of the software.
However, the encryption chip mode is adopted, the complexity of hardware development is high, and the cost of software copyright protection is high.
Disclosure of Invention
The invention provides a software copyright protection method which can reduce the cost of software copyright protection.
The technical scheme adopted by the invention for solving the technical problems is as follows: a software copyright protection method, comprising: s10, when the software to be protected runs on the first mainboard, the first mainboard obtains a first encryption string, and the first encryption string is generated by the MAC address of the first mainboard in advance; s20, the first main board correspondingly decrypts the first encryption string to obtain a first decryption string; s30, the first mainboard performs MAC address authentication on the first decryption string and judges whether the first decryption string is legal or not; and S40, if the software to be protected is illegal, stopping running the software to be protected by the first mainboard.
Optionally, the software copyright protection method provided in this embodiment further includes: s50, when the software to be protected runs on the expansion board, the expansion board obtains a second encryption string and a random number, wherein the second encryption string is generated by the MAC address of the expansion board in advance; s60, the expansion board sends first information consisting of the second encryption string and the random number to a corresponding second main board; s70, the second main board receives the first information and extracts a random number from the first information; s80, the second mainboard acquires a third encryption string, and the third encryption string is generated by the MAC address of the second mainboard in advance; s90, the second main board sends second information consisting of the third encryption string and the extracted random number to the expansion board; s91, the expansion board receives second information sent by the second main board, authenticates according to the second information and judges whether the second information is legal or not; and S92, if the software to be protected is illegal, stopping running the software to be protected by the expansion board.
Optionally, the software copyright protection method provided in this embodiment further includes: s41, when the second mainboard is produced, encrypting the MAC address of the second mainboard by adopting a preset encryption tool to obtain a third encryption string; and S42, the second main board stores the third encryption string in a flash memory thereof. S43, when the expansion board is produced, encrypting the MAC address of the expansion board by adopting a preset encryption tool to obtain a second encryption string; s44, the expansion board stores the second encryption string in the flash memory thereof.
Optionally, in the software copyright protection method provided in this embodiment, S91 includes: s911, the expansion board extracts a third encryption string from the second information; s912, the expansion board correspondingly decrypts the third encryption string to obtain a third decryption string; s913, the expansion board determines whether the third decryption string is legal or not according to a preset MAC address base.
Optionally, in the software copyright protection method provided in this embodiment, S91 further includes: s914, the expansion board extracts a random number from the second information to obtain an extracted number; the expansion board determines whether the expansion board is legal or not according to the extracted number and the random number; or, in S915, the expansion board determines whether the MAC address is legal or not according to the third decryption string and the MAC address.
Optionally, the software copyright protection method provided in this embodiment further includes: s01, when the first mainboard is produced, encrypting the MAC address of the first mainboard by adopting a preset encryption tool to obtain a first encryption string; and S02, the first main board burns and writes the first encryption string into a flash memory of the first main board.
Optionally, in the software copyright protection method provided in this embodiment, S30 includes: s301, the first main board matches the first decryption string through a preset MAC address base, and whether the first decryption string is legal or not is judged.
Optionally, in the software copyright protection method provided in this embodiment, S30 further includes: s302, the first main board determines whether the first decryption string is legal or not according to whether the first decryption string conforms to a preset format or not.
Optionally, in the software copyright protection method provided in this embodiment, the first motherboard and the second motherboard are the same motherboard; or the first main board and the second main board are different main boards.
The invention has the following beneficial effects: and authenticating the running equipment of the software to be protected through the MAC address, thereby realizing the protection of the software copyright. The technical scheme provided by the embodiment of the invention reduces the cost of hardware and development, and solves the problems of higher complexity of hardware development and higher cost of software copyright protection in the prior art by adopting an encryption chip mode. In addition, the authentication is carried out through the MAC address, the software cracking difficulty is increased, and the legal MAC address cannot be provided by simple system copy.
Drawings
Fig. 1 is a flowchart of a software protection method according to embodiment 1 of the present invention;
fig. 2 is a first flowchart of a software protection method according to embodiment 2 of the present invention;
fig. 3 is a second flowchart of a software protection method according to embodiment 2 of the present invention;
fig. 4 is a flowchart of a software protection method according to embodiment 3 of the present invention.
Detailed Description
The technical solution of the present invention is further described below with reference to the following embodiments and the accompanying drawings.
Example 1
As shown in fig. 1, this embodiment provides a software copyright protection method, including:
step 101, when software to be protected runs on a first main board, the first main board obtains a first encryption string.
In this embodiment, the first encryption string is generated in advance from the MAC address of the first motherboard in step 101.
And 102, correspondingly decrypting the first encryption string by the first main board to obtain a first decryption string.
Step 103, the first motherboard performs MAC address authentication on the first decryption string to determine whether the first decryption string is legal.
In this embodiment, the authentication process performed in step 103 may only be: and the first mainboard matches the first decryption string through a preset MAC address base and judges whether the first decryption string is legal or not. In particular, to prevent the encryption of the MAC address from being broken, the step 103 may further include: and the first main board determines whether the first decryption string is legal or not according to whether the first decryption string conforms to the preset format or not.
And 104, if the software to be protected is illegal, stopping running the software to be protected by the first mainboard.
The invention has the following beneficial effects: and authenticating the running equipment of the software to be protected through the MAC address, thereby realizing the protection of the software copyright. The technical scheme provided by the embodiment of the invention reduces the cost of hardware and development, and solves the problems of higher complexity of hardware development and higher cost of software copyright protection in the prior art by adopting an encryption chip mode. In addition, the authentication is carried out through the MAC address, the software cracking difficulty is increased, and the legal MAC address cannot be provided by simple system copy.
Example 2
As shown in fig. 2, the software copyright protection method provided in the embodiment of the present invention is similar to that shown in fig. 1, and the difference is that the method further includes:
and 105, when the software to be protected runs on the expansion board, the expansion board acquires a second encryption string and a random number.
In this embodiment, the second encryption string is generated in advance from the MAC address of the expansion board in step 105.
And 106, the expansion board sends first information consisting of the second encryption string and the random number to the corresponding second main board.
In this embodiment, the expansion board may be connected to the second motherboard through a network interface, or may be connected to the second motherboard through other interfaces, which is not described in detail herein. Specifically, the second motherboard and the first motherboard may be the same motherboard or different motherboards, which is not limited herein.
Step 107, the second motherboard receives the first information and extracts a random number from the first information.
And step 108, the second main board acquires a third encryption string.
In this embodiment, the third encryption string is generated in advance from the MAC address of the second motherboard in step 108.
And step 109, the second mainboard sends second information consisting of the third encryption string and the extracted random number to the expansion board.
And step 110, the expansion board receives the second information sent by the second main board, authenticates according to the second information, and determines whether the second information is legal or not.
In this embodiment, the process of performing authentication in step 110 may include: the expansion board extracts a third encryption string from the second information; the expansion board decrypts the third encryption string to obtain a third decryption string; and the expansion board determines whether the third decryption string is legal or not according to a preset MAC address base. Further, in order to prevent the MAC address encryption from being broken, the authentication process may further include: the expansion board extracts the random number from the second information, and after the extraction number is obtained, the expansion board determines whether the random number is legal or not according to the extraction number and the random number; the process may compare the random number and the extracted number for the expansion board, and determine whether it is legal based on whether they are the same. Or, the expansion board can also determine whether the MAC address is legal or not according to the third decryption string; the process may compare the MAC address with the third decryption string for the expansion board, and determine whether it is legal based on whether they are the same.
And step 111, if the software to be protected is illegal, the expansion board stops running the software to be protected.
Further, as shown in fig. 3, the software copyright protection method provided in this embodiment further includes, before step 105:
and 112, when the second mainboard is produced, encrypting the MAC address of the second mainboard by using a preset encryption tool to obtain a third encryption string.
In this embodiment, the preset encryption tool in step 112 may use a Data Encryption Standard (DES) algorithm, or may use other encryption algorithms, which is not described in detail herein.
In step 113, the second motherboard stores the third encrypted string in its flash memory.
And step 114, when the expansion board is produced, encrypting the MAC address of the expansion board by adopting a preset encryption tool to obtain a second encryption string.
At step 115, the expansion board stores the second encrypted string in its flash memory.
In this embodiment, the second main board and the expansion board respectively store the data encrypted by their MAC addresses into their respective flash memories, so as to prevent illegal tampering and illegal copying of software.
The invention has the following beneficial effects: and authenticating the running equipment of the software to be protected through the MAC address, thereby realizing the protection of the software copyright. The technical scheme provided by the embodiment of the invention reduces the cost of hardware and development, and solves the problems of higher complexity of hardware development and higher cost of software copyright protection in the prior art by adopting an encryption chip mode. In addition, the authentication is carried out through the MAC address, the software cracking difficulty is increased, and the legal MAC address cannot be provided by simple system copy.
Example 3
As shown in fig. 4, an embodiment of the present invention provides a software copyright protection method, which is similar to that provided in embodiment 1 or 2 of the present invention, except that, before step 101, the method further includes:
and step 116, when the first mainboard is produced, encrypting the MAC address of the first mainboard by using a preset encryption tool to obtain a first encryption string.
In this embodiment, the preset encryption tool in step 116 may use a Data Encryption Standard (DES) algorithm, or may use other encryption algorithms, which is not described in detail herein.
Step 117, the first motherboard writes the first encrypted string to its memory.
The invention has the following beneficial effects: and authenticating the running equipment of the software to be protected through the MAC address, thereby realizing the protection of the software copyright. The technical scheme provided by the embodiment of the invention reduces the cost of hardware and development, and solves the problems of higher complexity of hardware development and higher cost of software copyright protection in the prior art by adopting an encryption chip mode. In addition, the authentication is carried out through the MAC address, the software cracking difficulty is increased, and the legal MAC address cannot be provided by simple system copy.
The sequence of the above embodiments is only for convenience of description and does not represent the advantages and disadvantages of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (9)
1. A software copyright protection method is characterized by comprising the following steps:
s10, when the software to be protected runs on the first mainboard, the first mainboard obtains a first encryption string, and the first encryption string is generated by the MAC address of the first mainboard in advance;
s20, the first main board correspondingly decrypts the first encryption string to obtain a first decryption string;
s30, the first mainboard performs MAC address authentication on the first decryption string and judges whether the first decryption string is legal or not;
and S40, if the software to be protected is illegal, stopping running the software to be protected by the first mainboard.
2. The software copyright protection method of claim 1, further comprising:
s50, when the software to be protected runs on the expansion board, the expansion board obtains a second encryption string and a random number, wherein the second encryption string is generated by the MAC address of the expansion board in advance;
s60, the expansion board sends first information consisting of the second encryption string and the random number to a corresponding second main board;
s70, the second main board receives the first information and extracts a random number from the first information;
s80, the second mainboard acquires a third encryption string, and the third encryption string is generated by the MAC address of the second mainboard in advance;
s90, the second main board sends second information consisting of the third encryption string and the extracted random number to the expansion board;
s91, the expansion board receives second information sent by the second main board, authenticates according to the second information and judges whether the second information is legal or not;
and S92, if the software to be protected is illegal, stopping running the software to be protected by the expansion board.
3. The software copyright protection method of claim 2, further comprising:
s41, when the second mainboard is produced, encrypting the MAC address of the second mainboard by adopting a preset encryption tool to obtain a third encryption string;
s42, the second main board stores the third encryption string in a flash memory of the second main board;
s43, when the expansion board is produced, encrypting the MAC address of the expansion board by adopting a preset encryption tool to obtain a second encryption string;
s44, the expansion board stores the second encryption string in the flash memory thereof.
4. The software copyright protection method of claim 2, wherein the S91 includes:
s911, the expansion board extracts a third encryption string from the second information;
s912, the expansion board correspondingly decrypts the third encryption string to obtain a third decryption string;
s913, the expansion board determines whether the third decryption string is legal or not according to a preset MAC address base.
5. The software copyright protection method of claim 4, wherein the S91 further comprises:
s914, the expansion board extracts a random number from the second information to obtain an extracted number; the expansion board determines whether the expansion board is legal or not according to the extracted number and the random number; or,
s915, the expansion board determines whether the third decryption string is legal or not according to the MAC address of the expansion board and the third decryption string.
6. The software copyright protection method of any one of claims 1 to 5, further comprising:
s01, when the first mainboard is produced, encrypting the MAC address of the first mainboard by adopting a preset encryption tool to obtain a first encryption string;
and S02, the first main board burns and writes the first encryption string into a flash memory of the first main board.
7. The software copyright protection method of any one of claims 1 to 5, wherein the S30 includes:
s301, the first main board matches the first decryption string through a preset MAC address base, and whether the first decryption string is legal or not is judged.
8. The software copyright protection method of claim 7, wherein the S30 further comprises:
s302, the first main board determines whether the first decryption string is legal or not according to whether the first decryption string conforms to a preset format or not.
9. The software copyright protection method according to any one of claims 1 to 5,
the first main board and the second main board are the same main board; or the first main board and the second main board are different main boards.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510002748.XA CN104484586B (en) | 2015-01-05 | 2015-01-05 | Software copyright protecting method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510002748.XA CN104484586B (en) | 2015-01-05 | 2015-01-05 | Software copyright protecting method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104484586A CN104484586A (en) | 2015-04-01 |
CN104484586B true CN104484586B (en) | 2017-11-24 |
Family
ID=52759127
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510002748.XA Active CN104484586B (en) | 2015-01-05 | 2015-01-05 | Software copyright protecting method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104484586B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106534163B (en) * | 2016-12-05 | 2020-03-24 | 上海华测导航技术股份有限公司 | Detection method of receiver |
CN107704731B (en) * | 2017-09-28 | 2021-03-09 | 成都安恒信息技术有限公司 | Cloud platform mirror image anti-piracy method based on HOTP |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102411685A (en) * | 2011-10-17 | 2012-04-11 | 无锡诺宝科技发展有限公司 | Method for protecting copyright by combining with MAC (media access control) address |
CN102982264A (en) * | 2012-12-24 | 2013-03-20 | 上海斐讯数据通信技术有限公司 | Method for protecting embedded type device software |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006229352A (en) * | 2005-02-15 | 2006-08-31 | Sii Network Systems Kk | Communications equipment for executing handover and network |
-
2015
- 2015-01-05 CN CN201510002748.XA patent/CN104484586B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102411685A (en) * | 2011-10-17 | 2012-04-11 | 无锡诺宝科技发展有限公司 | Method for protecting copyright by combining with MAC (media access control) address |
CN102982264A (en) * | 2012-12-24 | 2013-03-20 | 上海斐讯数据通信技术有限公司 | Method for protecting embedded type device software |
Also Published As
Publication number | Publication date |
---|---|
CN104484586A (en) | 2015-04-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8972723B2 (en) | Storage device and method for providing a partially-encrypted content file to a host device | |
CN107004083B (en) | Device key protection | |
US9960914B2 (en) | Semiconductor device and information processing system for encrypted communication | |
US8132015B1 (en) | Method and system for loading a secure firmware update on an adapter device of a computer system | |
KR100792287B1 (en) | Security method using self-generated encryption key and applied security device | |
US20080285747A1 (en) | Encryption-based security protection method for processor and apparatus thereof | |
US9047445B2 (en) | Memory device and method for updating a security module | |
US20180204004A1 (en) | Authentication method and apparatus for reinforced software | |
JP7087172B2 (en) | Unlock PQA | |
CN114785503B (en) | Cipher card, root key protection method thereof and computer readable storage medium | |
JP2008287488A (en) | Data distributing and preserving unit | |
KR101430861B1 (en) | Security information sharing system and execution method thereof | |
WO2015176531A1 (en) | Terminal data writing and reading methods and devices | |
CN111143784A (en) | Copyright protection realization method and copyright protection storage device | |
CN104077243A (en) | SATA hard disc device encryption method and system | |
TWI393006B (en) | Security system and method for code dump protection | |
CN104484586B (en) | Software copyright protecting method | |
CN101167301B (en) | Confidential information processing host device and confidential information processing method | |
BR102015011937A2 (en) | agent to provide cloud security service and security token device for cloud security service | |
US20060075254A1 (en) | Smart card functionality from a security co-processor and symmetric key in ROM | |
CN110932853B (en) | Key management device and key management method based on trusted module | |
US20240004559A1 (en) | Restore to factory settings of a mobile data storage device | |
JP6471136B2 (en) | Data encryption system using security key | |
CN109660355B (en) | Method, device, storage medium and terminal for preventing POS terminal from being illegally tampered | |
Fukami et al. | Exploiting RPMB authentication in a closed source TEE implementation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220727 Address after: 518000 1801 and 1802, building 1, Chongwen Park, Nanshan Zhiyuan, No. 3370 Liuxian Avenue, Fuguang community, Taoyuan Street, Nanshan District, Shenzhen, Guangdong Province Patentee after: FLYINGVOICE TECHNOLOGY Co.,Ltd. Address before: Room 202, building a, No. 12, Hongda North Road, Beijing Economic and Technological Development Zone, Fengtai District, Beijing 100176 Patentee before: BEIJING FLYINGVOICE TECHNOLOGY Co.,Ltd. |