[go: up one dir, main page]

CN103605919A - Method and device for generating software authentication files and method and device for authenticating software - Google Patents

Method and device for generating software authentication files and method and device for authenticating software Download PDF

Info

Publication number
CN103605919A
CN103605919A CN201310615819.4A CN201310615819A CN103605919A CN 103605919 A CN103605919 A CN 103605919A CN 201310615819 A CN201310615819 A CN 201310615819A CN 103605919 A CN103605919 A CN 103605919A
Authority
CN
China
Prior art keywords
hardware information
encrypting
encrypted
encryption
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310615819.4A
Other languages
Chinese (zh)
Inventor
杜志波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ruian Technology Co Ltd
Original Assignee
Beijing Ruian Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ruian Technology Co Ltd filed Critical Beijing Ruian Technology Co Ltd
Priority to CN201310615819.4A priority Critical patent/CN103605919A/en
Publication of CN103605919A publication Critical patent/CN103605919A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1011Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a device for generating software authentication files and a method and a device for authenticating software. The method for generating the software authentication files includes acquiring hardware information to be encrypted; performing RSA (Rivest-Shamir-Adleman) encryption on the hardware to be encrypted so as to generate initial encrypted authentication files; performing RC (Rivest cipher) 4 encryption on the initial encrypted authentication files to generate the encrypted authentication files. The method and the device for generating the software authentication files and the method and the device for authenticating the software have the advantages that the hardware information to be encrypted is encrypted doubly by the method and the device for generating the software authentication files, the encrypted authentication files are doubly decrypted by the method and the device for authenticating the software, and accordingly the safety can be improved in software authentication procedures.

Description

Software authentication document generating method and device, software authentication method and device
Technical field
The present invention relates to field of information security technology, relate in particular to a kind of software authentication document generating method and device, software authentication method and device.
Background technology
In today of information-based high development, software copyright and information security have become the problem that each software vendor extremely pays close attention to.In order to protect the copyright of software product, combat copyright piracy, software vendor all can be used identifying algorithm in software product, and the function that only can could use software product to provide by the user of authentication is provided.
Common authentication mode has sequence number authentication, register-file authentication and dongle authentication.In prior art, no matter adopt which kind of mode to authenticate software, software information to be verified has all only passed through the encryption of a cryptographic algorithm.Although the information after processing has like this been passed through encryption, has certain security guarantee, such authentication information security is poor, easily by disabled user, is cracked.
Summary of the invention
In view of this, the present invention proposes a kind of software enciphering method and device, software decryption method and apparatus, to have strengthened the security of software authentication information.
First aspect, the embodiment of the present invention provides a kind of software authentication document generating method, and described method comprises:
Obtain hardware information to be encrypted;
Hardware information to be encrypted is carried out to rsa encryption, generate initial encryption authentication document;
Described initial encryption authentication document is carried out to RC4 encryption, generate encrypting and authenticating file.
Second aspect, the embodiment of the present invention provides a kind of software authentication method, and described method comprises:
Obtain encrypting and authenticating file;
Described encrypting and authenticating file is carried out to RC4 deciphering, reduction initial encryption authentication document;
Described initial encryption authentication document is carried out to RSA deciphering, restore hardware information;
The hardware information of reduction and original hardware information are compared, if the hardware information of reduction is identical with original hardware information, authentication success, otherwise, authentification failure.
The third aspect, the embodiment of the present invention provides a kind of software authentication file creating apparatus, and described device comprises:
Hardware information acquisition module, for obtaining hardware information to be encrypted;
Rsa encryption module, carries out rsa encryption for the hardware information to be encrypted, generates initial encryption authentication document;
RC4 encrypting module, for described initial encryption authentication document is carried out to RC4 encryption, generates encrypting and authenticating file.
Fourth aspect, the embodiment of the present invention provides a kind of software certification device, and described device comprises:
Encrypting and authenticating file acquisition module, for obtaining encrypting and authenticating file;
RC4 deciphering module, for described encrypting and authenticating file is carried out to RC4 deciphering, reduction initial encryption authentication document;
RSA deciphering module, for carrying out RSA deciphering to described initial encryption authentication document, restore hardware information;
Hardware information comparison module, for the hardware information of reduction and original hardware information are compared, if the hardware information of reduction is identical with original hardware information, authentication success, otherwise, authentification failure.
The software authentication document generating method that the embodiment of the present invention provides and device, software authentication method and device carry out two infill layers by the hardware information to be encrypted and generate authentication document, when being authenticated, software again encrypting and authenticating file is carried out to two-layer deciphering, improve the difficulty that disabled user cracks authentication document, strengthened the security of software authentication information.
Accompanying drawing explanation
By reading the detailed description that non-limiting example is done of doing with reference to the following drawings, it is more obvious that other features, objects and advantages of the present invention will become:
Fig. 1 is the process flow diagram of the software cryptography authentication document generation method that provides of first embodiment of the invention;
Fig. 2 is the process flow diagram of the rsa encryption of the software cryptography authentication document generation method that provides of first embodiment of the invention;
Fig. 3 is the form schematic diagram of the initial encryption authentication document that provides of first embodiment of the invention;
Fig. 4 is the form schematic diagram of the encrypting and authenticating file that provides of first embodiment of the invention;
Fig. 5 is the process flow diagram of the software cryptography authentication document generation method that provides of second embodiment of the invention;
Fig. 6 is the process flow diagram of the software authentication method that provides of third embodiment of the invention;
Fig. 7 is the process flow diagram of the software authentication method that provides of fourth embodiment of the invention;
Fig. 8 is the structural drawing of the software cryptography authentication document generating apparatus that provides of fifth embodiment of the invention;
Fig. 9 is the structural drawing of the software certification device that provides of sixth embodiment of the invention.
Embodiment
Below in conjunction with drawings and Examples, the present invention is described in further detail.Be understandable that, specific embodiment described herein is only for explaining the present invention, but not limitation of the invention.It also should be noted that, for convenience of description, in accompanying drawing, only show part related to the present invention but not full content.
Fig. 1 to Fig. 4 shows the first embodiment of the present invention.
Fig. 1 is the process flow diagram of the software cryptography authentication document generation method that provides of first embodiment of the invention.Referring to Fig. 1, described software cryptography authentication document generation method comprises:
Step S110, obtains hardware information to be encrypted.
Described hardware information to be encrypted is to generate the object being encrypted in the process of software cryptography authentication document.It comprises CPU sequence number ,CPU manufacturer, CPU title, hard disk drive, hard disk model, hard disk sequence number, equipment term of life, device hardware version number, device software major version number etc.Example, described hardware information to be encrypted is as follows:
CPU SERIAL-NUM:000206A7-00100800-17BAE3BF-BFEBFBFF
CPU SERIAL-NUM:000206A7-02100800-17BAE3BF-BFEBFBFF
CPU SERIAL-NUM:000206A7-01100800-17BAE3BF-BFEBFBFF
CPU SERIAL-NUM:000206A7-03100800-17BAE3BF-BFEBFBFF
CPU VECTOR:GenuineIntel
CPU NAME: Intel(R)Core(TM)i5-2410M CPU@2.30GHz
DISK NAME:/dev/sda
DISK MODEL:LITEONIT LMT-128M6M
DISK FW_REV:DM70106
DISK SERIAL_NUM:002321114386
DEVICE LIMIT:365
DEVICE HARDWARE VERSION:****_1.0
DEVICE SOFTWARE VERSION:****_1.0
Described hardware information to be encrypted can be to be stored on the hard disk of computing machine, in ROM (read-only memory) (ROM), or is stored in the peripherals that can communicate with computing machine.
Because the memory address of described hardware information to be encrypted is different with storage mode, obtaining hardware information to be encrypted can be to obtain described hardware information to be encrypted by reading the hard disk of computing machine, also can be to obtain described hardware information to be encrypted by reading ROM (read-only memory) (ROM), can also be to be communicated and obtained described hardware information to be encrypted by the peripherals with computing machine.
Step S120, carries out rsa encryption to hardware information to be encrypted, generates initial encryption authentication document.
Fig. 2 is the process flow diagram of the rsa encryption of the software cryptography authentication document generation method that provides of first embodiment of the invention.Referring to Fig. 2, the rsa encryption of described software cryptography authentication document generation method comprises:
Sub-step S121, carries out piecemeal to described hardware information to be encrypted with the byte number of regular length.
In the software cryptography authentication document generation method that the present embodiment provides, hardware information to be encrypted is carried out to rsa encryption to have the Kuai Wei unit of fixed word joint number, therefore when described hardware information to be encrypted is carried out to rsa encryption, first described hardware information to be encrypted is carried out to piecemeal with the byte number of regular length.
Preferably, described hardware information to be encrypted be take to every 100 bytes as a piece, described hardware information to be encrypted is carried out to piecemeal.Concrete, described hardware information to be encrypted be take to 100 bytes and carry out order piecemeal as unit.That is to say, using top 100 bytes of described hardware information to be encrypted as first piece, then 100 bytes after described first piece are as second, by that analogy.
If the total bytes of described hardware information to be encrypted can not be divided exactly by 100, first at the end of described hardware information to be encrypted, supplement the byte that value is 0, the total bytes of described hardware information to be encrypted can be divided exactly by 100, and then described hardware information to be encrypted is carried out to piecemeal.
Sub-step S122 ,Yi Kuaiwei unit carries out rsa encryption to described hardware information to be encrypted.
After described hardware information to be encrypted is carried out to piecemeal, ,Yi Kuaiwei unit carries out rsa encryption to described hardware information to be encrypted, namely each piece after piecemeal is carried out to rsa encryption.
When each piece is carried out to rsa encryption, first generate the RSA key pair that each piece is encrypted.Described RSA key is to comprising RSA PKI and RSA private key.Then utilize the RSA private key generating to carry out rsa encryption to each piece of described hardware information to be encrypted.After using RSA private key to be encrypted each piece of described hardware information to be encrypted, RSA private key is abandoned.Described RSA PKI is stored in described initial encryption authentication document.
Sub-step S123, carries out scramble by the hardware information Yi Kuaiwei unit to be encrypted after rsa encryption.
The piece of regular length is carried out after rsa encryption, the hardware information Yi Kuaiwei unit to be encrypted after rsa encryption is carried out to scramble.It can be that the hardware information Yi Kuaiwei unit to be encrypted after described rsa encryption is carried out to random scramble that hardware information to be encrypted after rsa encryption is carried out to scramble, can be also that the hardware information Yi Kuaiwei unit to be encrypted after described rsa encryption is carried out to scramble according to predetermined scramble order.It should be noted that no matter take which kind of scramble mode, all need the original sequence number table of comparisons of the process record cryptographic block of scramble.The described cryptographic block original sequence number table of comparisons has recorded the contrast relationship of the sequence number of cryptographic block after the original sequence number of cryptographic block before scramble and scramble.
Sub-step S124, generates initial encryption authentication document according to hardware information to be encrypted after scramble.
Hardware information to be encrypted after rsa encryption is carried out after scramble, by the original sequence number table of comparisons of hardware information to be encrypted, cryptographic block after scramble and other information recordings to initial encryption authentication document.
Fig. 3 is the form schematic diagram of the initial encryption authentication document that provides of first embodiment of the invention.Referring to Fig. 3, described initial encryption authentication document comprises: file header information 301, loose order cryptographic block 302 and Public Key 303.
In described file header information 301, canned data comprises: cryptographic block number, the original sequence number table of comparisons of cryptographic block, cryptographic block data total length and Public Key length.Described loose order cryptographic block 302 is the enciphered messages after utilizing the PKI of RSA cryptographic algorithms to be encrypted hardware information to be encrypted.Described Public Key is exactly the PKI of described RSA cryptographic algorithms.
Step S130, carries out RC4 encryption to described initial encryption authentication document, generates encrypting and authenticating file.
Utilize RSA cryptographic algorithms to be encrypted hardware information to be encrypted, generate after initial encryption authentication document, described initial encryption authentication document is carried out to RC4 encryption, generate encrypting and authenticating file.
Fig. 4 is the form schematic diagram of the encrypting and authenticating file that provides of first embodiment of the invention.Referring to Fig. 4, described encrypting and authenticating file comprises: the first enciphered message 401, key seed 402 and the second enciphered message 403.
Described the first enciphered message 401 is the information after described initial encryption authentication document being encrypted again by RC4 algorithm, and byte number is 100 bytes.Described key seed 402 is key seed of using while using RC4 algorithm to be encrypted, has 8 bytes, is used for generating the key while using RC4 algorithm to be encrypted and to decipher.Described the second enciphered message 403 is remainder bytes that the file after encrypting by RC4 deducts described the first enciphered message.
The present embodiment carries out two infill layers by the hardware information to be encrypted, has generated the higher encrypting and authenticating file of security, makes encrypting and authenticating file more be difficult to crack, and has strengthened the security of software authentication information.
Fig. 5 shows the second embodiment of the present invention.
Fig. 5 is the process flow diagram of the software cryptography authentication document generation method that provides of second embodiment of the invention.Described software cryptography authentication document generation method be take above-described embodiment as basis, further, described initial encryption authentication document is being carried out to RC4 encryption, before generating encrypting and authenticating file, the software cryptography authentication document generation method of the present embodiment also comprises: the step by the encrypting and authenticating burning file generating to mobile certificate equipment.
Referring to Fig. 5, described software cryptography authentication document generation method comprises:
Step S510, obtains hardware information to be encrypted.
Step S520, carries out rsa encryption to hardware information to be encrypted, generates initial encryption authentication document.
Step S530, carries out RC4 encryption to described initial encryption authentication document, generates encrypting and authenticating file.
Step S540, by the encrypting and authenticating burning file generating to mobile certificate equipment.
Described mobile certificate equipment is otherwise known as by " electronic intelligence key ", is the high security intensity certificate that a kind of profile is similar to USB flash disk.To described mobile certificate equipment, can make the right to use of equipment separated with administrative power the encrypting and authenticating burning file generating, can further improve the security of the encrypting and authenticating file of generation.
To the burning of described encrypting and authenticating file, be that described encrypting and authenticating file is write to described mobile certificate equipment.
The present embodiment is by after two infill layers generate encrypting and authenticating file, further by the encrypting and authenticating burning file generating to mobile certificate equipment, make the right to use of equipment separated with administrative power, further strengthened the security of the encrypting and authenticating file generating.
Fig. 6 shows the third embodiment of the present invention.
Fig. 6 is the process flow diagram of the software authentication method that provides of third embodiment of the invention.Referring to Fig. 6, described software authentication method comprises:
Step S610, obtains encrypting and authenticating file.
Described encrypting and authenticating file can be to be stored on the hard disk of computing machine, in ROM (read-only memory) (ROM), or is stored in the peripherals that can communicate with computing machine.
Because the memory address of described encrypting and authenticating file is different with storage mode, obtaining encrypting and authenticating file can be to obtain described encrypting and authenticating file by reading the hard disk of computing machine, also can be to obtain described encrypting and authenticating file by reading ROM (read-only memory) (ROM), can also be to be communicated and obtained described encrypting and authenticating file by the peripherals with computing machine.
Step S620, carries out RC4 deciphering to described encrypting and authenticating file, reduction initial encryption authentication document.
When described encrypting and authenticating file is carried out to RC4 deciphering, first from described encrypting and authenticating file, read RC4 key seed, utilize described RC4 key seed to calculate RC4 decruption key.Because RC4 cryptographic algorithm is a kind of symmetric encipherment algorithm, the RC4 encryption key that the RC4 decruption key calculating is used while being exactly RC4 encryption.
Obtain, after described RC4 decruption key, from described encrypting and authenticating file, reading the first enciphered message and the second enciphered message.Described the first enciphered message and described enciphered message are sued for peace, obtain the file after encrypting by RC4.
Finally, utilize RC4 decruption key to be decrypted described file after encrypting by RC4.
Step S630, carries out RSA deciphering to described initial encryption authentication document, restore hardware information.
When described initial encryption authentication document is carried out to RSA deciphering, first according to the original sequence number table of comparisons of the cryptographic block in the file header information of described initial encryption authentication document, loose order cryptographic block is adjusted into the cryptographic block of normal sequence, then from described initial encryption authentication document, restore RSA PKI, finally utilize RSA decipherment algorithm to carry out RSA deciphering to described initial encryption authentication document.Described initial encryption authentication document is carried out after RSA deciphering, obtain the hardware information of reduction.
Step S640, compares the hardware information of reduction and original hardware information, if the hardware information of reduction is identical with original hardware information, and authentication success, otherwise, authentification failure.
After RC4 deciphering and RSA decipher, reduced encrypted hardware information.After hardware information is reduced, the hardware information of reduction and original hardware information are compared.If the hardware information of reduction is identical with original hardware information, authentication success; If the hardware information of reduction is different from original hardware information, authentification failure.
The present embodiment is by the two-layer deciphering to encrypting and authenticating file, reduced original hardware information from the encrypting and authenticating file of high safety, realized the authentication to software application in certain hardware device, strengthened the security of software authentication information.
Fig. 7 shows the fourth embodiment of the present invention.
Fig. 7 is the process flow diagram of the software authentication method that provides of fourth embodiment of the invention.Described software cryptography authentication document generation method be take above-described embodiment as basis, further, described encrypting and authenticating file is being carried out to RC4 deciphering, and before reduction initial encryption authentication document, the software authentication method that the present embodiment provides comprises from mobile certificate equipment and obtains encrypting and authenticating file.
Referring to Fig. 7, described software authentication method comprises:
Step S710, obtains encrypting and authenticating file from mobile certificate equipment.
Described encrypting and authenticating file storage is in the present embodiment in mobile certificate equipment that computing machine is connected.Therefore,, when obtaining described encrypting and authenticating file, need to obtain described encrypting and authenticating file from described mobile certificate equipment.
Step S720, carries out RC4 deciphering to described encrypting and authenticating file, reduction initial encryption authentication document.
Step S730, carries out RSA deciphering to described initial encryption authentication document, restore hardware information.
Step S740, compares the hardware information of reduction and original hardware information, if the hardware information of reduction is identical with original hardware information, and authentication success, otherwise, authentification failure.
The present embodiment is by obtaining the encrypting and authenticating file being stored on mobile certificate equipment, encrypting and authenticating file is carried out to two-layer deciphering, from the encrypting and authenticating file of high safety, reduced original hardware information, realize the authentication to software application in certain hardware device, strengthened the security of software authentication information.
Fig. 8 shows the fifth embodiment of the present invention.
Fig. 8 is the structural drawing of the software cryptography authentication document generating apparatus that provides of fifth embodiment of the invention.Referring to Fig. 8, described software cryptography authentication document generating apparatus comprises: hardware information acquisition module 810, rsa encryption module 820 and RC4 encrypting module 830.
Described hardware information acquisition module 810 is for obtaining hardware information to be encrypted.
Described rsa encryption module 820 is carried out rsa encryption for the hardware information to be encrypted, generates initial encryption authentication document.
Described RC4 encrypting module 830, for described initial encryption authentication document is carried out to RC4 encryption, generates encrypting and authenticating file.
Preferably, described software cryptography authentication document generating apparatus also comprises: encrypting and authenticating file programming module 840.
Described encrypting and authenticating file programming module 840 is for described initial encryption authentication document is being carried out to RC4 encryption, after generating encrypting and authenticating file, by the encrypting and authenticating burning file generating to mobile certificate equipment.
Preferably, described rsa encryption module 820 comprises: hardware information piecemeal submodule 821, rsa encryption submodule 822, piece scramble submodule 823 and initial encryption authentication document generate submodule 824.
Described hardware information piecemeal submodule 821 is for carrying out piecemeal to described hardware information to be encrypted with the byte number of regular length.
Described rsa encryption submodule 822 carries out rsa encryption for Yi Kuaiwei unit to described hardware information to be encrypted.
Described scramble submodule 823 is for carrying out scramble by the hardware information Yi Kuaiwei unit to be encrypted after rsa encryption.
Described initial encryption authentication document generates submodule 824 for generating initial encryption authentication document according to hardware information to be encrypted after scramble.
The present embodiment carries out two infill layers by the hardware information to be encrypted, has generated the higher encrypting and authenticating file of security, makes encrypting and authenticating file more be difficult to crack, and has strengthened the security of software authentication information.
Fig. 9 shows the sixth embodiment of the present invention.
Fig. 9 is the structural drawing of the software certification device that provides of sixth embodiment of the invention.Referring to Fig. 9, described software certification device comprises: encrypting and authenticating file acquisition module 910, RC4 deciphering module 920, RSA deciphering module 930 and hardware information comparison module 940.
Described encrypting and authenticating file acquisition module 910 is for obtaining encrypting and authenticating file.
Described RC4 deciphering module 920 is for described encrypting and authenticating file is carried out to RC4 deciphering, reduction initial encryption authentication document.
Described RSA deciphering module 930 is for carrying out RSA deciphering to described initial encryption authentication document, restore hardware information.
Described hardware information comparison module 940 is for the hardware information of reduction and original hardware information are compared, if the hardware information of reduction is identical with original hardware information, and authentication success, otherwise, authentification failure.
Preferably, described encrypting and authenticating file acquisition module 910 is specifically for obtaining encrypting and authenticating file from mobile authentication equipment.
The present embodiment is by the two-layer deciphering to encrypting and authenticating file, reduced original hardware information from the encrypting and authenticating file of high safety, realized the authentication to software application in certain hardware device, strengthened the security of software authentication information.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
Those of ordinary skills should be understood that, above-mentioned each module of the present invention or each step can realize with general calculation element, they can concentrate on single calculation element, or be distributed on the network that a plurality of calculation elements form, alternatively, they can realize with the executable program code of computer installation, thereby they can be stored in memory storage and be carried out by calculation element, or they are made into respectively to each integrated circuit modules, or a plurality of modules in them or step are made into single integrated circuit module realize.Like this, the present invention is not restricted to the combination of any specific hardware and software.
Each embodiment in this instructions all adopts the mode of going forward one by one to describe, and each embodiment stresses is the difference with other embodiment, the identical similar part between each embodiment mutually referring to.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, to those skilled in the art, the present invention can have various changes and variation.All any modifications of doing, be equal to replacement, improvement etc., within protection scope of the present invention all should be included within spirit of the present invention and principle.

Claims (10)

1. a software authentication document generating method, is characterized in that, comprising:
Obtain hardware information to be encrypted;
Hardware information to be encrypted is carried out to rsa encryption, generate initial encryption authentication document;
Described initial encryption authentication document is carried out to RC4 encryption, generate encrypting and authenticating file.
2. software authentication document generating method according to claim 1, is characterized in that, described initial encryption authentication document is being carried out to RC4 encryption, generates after encrypting and authenticating file, also comprises:
By the encrypting and authenticating burning file generating to mobile certificate equipment.
3. software authentication document generating method according to claim 1 and 2, is characterized in that, hardware information to be encrypted is carried out to rsa encryption, generates initial encryption authentication document and comprises:
Described hardware information to be encrypted is carried out to piecemeal with the byte number of regular length;
Yi Kuaiwei unit carries out rsa encryption to described hardware information to be encrypted;
Hardware information Yi Kuaiwei unit to be encrypted after rsa encryption is carried out to scramble;
According to hardware information to be encrypted after scramble, generate initial encryption authentication document.
4. a software authentication method, is characterized in that, comprising:
Obtain encrypting and authenticating file;
Described encrypting and authenticating file is carried out to RC4 deciphering, reduction initial encryption authentication document;
Described initial encryption authentication document is carried out to RSA deciphering, restore hardware information;
The hardware information of reduction and original hardware information are compared, if the hardware information of reduction is identical with original hardware information, authentication success, otherwise, authentification failure.
5. software authentication method according to claim 4, is characterized in that, described in obtain encrypting and authenticating file and comprise:
From mobile certificate equipment, obtain encrypting and authenticating file.
6. a software authentication file creating apparatus, is characterized in that, comprising:
Hardware information acquisition module, for obtaining hardware information to be encrypted;
Rsa encryption module, carries out rsa encryption for the hardware information to be encrypted, generates initial encryption authentication document;
RC4 encrypting module, for described initial encryption authentication document is carried out to RC4 encryption, generates encrypting and authenticating file.
7. software authentication file creating apparatus according to claim 6, is characterized in that, also comprises:
Encrypting and authenticating file programming module, for described initial encryption authentication document is being carried out to RC4 encryption, after generating encrypting and authenticating file, by the encrypting and authenticating burning file generating to mobile certificate equipment.
8. according to the software authentication file creating apparatus described in claim 6 or 7, it is characterized in that, described rsa encryption module comprises:
Hardware information piecemeal submodule, for carrying out piecemeal to described hardware information to be encrypted with the byte number of regular length;
Rsa encryption submodule, carries out rsa encryption for Yi Kuaiwei unit to described hardware information to be encrypted;
Piece scramble submodule, for carrying out scramble by the hardware information Yi Kuaiwei unit to be encrypted after rsa encryption;
Initial encryption authentication document generates submodule, for generating initial encryption authentication document according to hardware information to be encrypted after scramble.
9. a software certification device, is characterized in that, comprising:
Encrypting and authenticating file acquisition module, for obtaining encrypting and authenticating file;
RC4 deciphering module, for described encrypting and authenticating file is carried out to RC4 deciphering, reduction initial encryption authentication document;
RSA deciphering module, for carrying out RSA deciphering to described initial encryption authentication document, restore hardware information;
Hardware information comparison module, for the hardware information of reduction and original hardware information are compared, if the hardware information of reduction is identical with original hardware information, authentication success, otherwise, authentification failure.
10. software certification device according to claim 9, is characterized in that, described encrypting and authenticating file acquisition module is specifically for obtaining encrypting and authenticating file from mobile certificate equipment.
CN201310615819.4A 2013-11-27 2013-11-27 Method and device for generating software authentication files and method and device for authenticating software Pending CN103605919A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310615819.4A CN103605919A (en) 2013-11-27 2013-11-27 Method and device for generating software authentication files and method and device for authenticating software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310615819.4A CN103605919A (en) 2013-11-27 2013-11-27 Method and device for generating software authentication files and method and device for authenticating software

Publications (1)

Publication Number Publication Date
CN103605919A true CN103605919A (en) 2014-02-26

Family

ID=50124140

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310615819.4A Pending CN103605919A (en) 2013-11-27 2013-11-27 Method and device for generating software authentication files and method and device for authenticating software

Country Status (1)

Country Link
CN (1) CN103605919A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104125239B (en) * 2014-08-14 2017-08-25 北京锐安科技有限公司 A kind of method for network authorization transmitted based on data link encryption and system
CN108830071A (en) * 2018-05-03 2018-11-16 深圳市中微信息技术有限公司 The encryption and decryption and recognition methods of SCM Based motherboard hardware and upper layer software (applications)
CN110837627A (en) * 2019-09-27 2020-02-25 苏州浪潮智能科技有限公司 Software copyright authentication method, system and equipment based on hard disk serial number
CN113626770A (en) * 2021-08-04 2021-11-09 北京锐安科技有限公司 Authorization control method, device, equipment and storage medium for application program
WO2022155718A1 (en) 2021-01-22 2022-07-28 Carvalho Rogerio Atem De Device and method for authenticating hardware and/or embedded software

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101923616A (en) * 2010-08-03 2010-12-22 鸿富锦精密工业(深圳)有限公司 Service providing device, user terminal and copyright protection method in copyright protection
CN102594840A (en) * 2012-03-20 2012-07-18 广东凌康科技有限公司 Remote data storage protection method
CN102810141A (en) * 2011-06-01 2012-12-05 哈尔滨市和协岛数码科技有限公司 Software lease authorization method based on attribute encryption

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101923616A (en) * 2010-08-03 2010-12-22 鸿富锦精密工业(深圳)有限公司 Service providing device, user terminal and copyright protection method in copyright protection
CN102810141A (en) * 2011-06-01 2012-12-05 哈尔滨市和协岛数码科技有限公司 Software lease authorization method based on attribute encryption
CN102594840A (en) * 2012-03-20 2012-07-18 广东凌康科技有限公司 Remote data storage protection method

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104125239B (en) * 2014-08-14 2017-08-25 北京锐安科技有限公司 A kind of method for network authorization transmitted based on data link encryption and system
CN108830071A (en) * 2018-05-03 2018-11-16 深圳市中微信息技术有限公司 The encryption and decryption and recognition methods of SCM Based motherboard hardware and upper layer software (applications)
CN110837627A (en) * 2019-09-27 2020-02-25 苏州浪潮智能科技有限公司 Software copyright authentication method, system and equipment based on hard disk serial number
WO2022155718A1 (en) 2021-01-22 2022-07-28 Carvalho Rogerio Atem De Device and method for authenticating hardware and/or embedded software
US12406049B2 (en) 2021-01-22 2025-09-02 Rogério Atem De Carvalho Device and method for autheniticating hardware and/or embedded software
CN113626770A (en) * 2021-08-04 2021-11-09 北京锐安科技有限公司 Authorization control method, device, equipment and storage medium for application program

Similar Documents

Publication Publication Date Title
TWI809292B (en) Data encryption and decryption method, device, storage medium and encrypted file
CN110490008B (en) Security device and security chip
US9081726B2 (en) Controller to be incorporated in storage medium device, storage medium device, system for manufacturing storage medium device, and method for manufacturing storage medium device
US9178881B2 (en) Proof of device genuineness
BR112017014632B1 (en) METHOD IMPLEMENTED BY COMPUTER, COMPUTER SYSTEM, AND COMPUTER READABLE MEDIA
CN103580855B (en) Usbkey management method based on sharing technology
CN102801730A (en) Information protection method and device for communication and portable devices
CN110233729B (en) Encrypted solid-state disk key management method based on PUF
CA2613289A1 (en) Generating a secret key from an asymmetric private key
US11456866B2 (en) Key ladder generating a device public key
CN103841469A (en) Digital film copyright protection method and device
CN101951315A (en) Key processing method and device
CN103605919A (en) Method and device for generating software authentication files and method and device for authenticating software
CN107925574A (en) The safe programming of secret data
US11928247B2 (en) Methods and devices for AI model integrity and secrecy protection
CN115280313A (en) System and method for white-box device binding
CN1607511B (en) Data protection method and system
KR20140071775A (en) Cryptography key management system and method thereof
JP2005215945A (en) Information processor, storage device for permitting software execution, and software execution method
CN107070648B (en) Key protection method and PKI system
CN105426705A (en) Encryption control system for accounting software
CN106487509B (en) A kind of method and host equipment generating key
CN109981612B (en) Method and system for preventing cipher machine equipment from being illegally copied and cipher machine equipment
CN105117666A (en) Encryption and decryption methods and devices for internet protocol (IP) configuration parameter of integrated circuit
JP4663437B2 (en) Content usage information transmitting method, content usage information providing device and content usage information receiving device capable of using the method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140226

RJ01 Rejection of invention patent application after publication