CN103838995A - Information safety equipment capable of being set in user-defined mode - Google Patents

Information safety equipment capable of being set in user-defined mode Download PDF

Info

Publication number
CN103838995A
CN103838995A CN201410103387.3A CN201410103387A CN103838995A CN 103838995 A CN103838995 A CN 103838995A CN 201410103387 A CN201410103387 A CN 201410103387A CN 103838995 A CN103838995 A CN 103838995A
Authority
CN
China
Prior art keywords
sequence number
safety devices
information safety
information
processing module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410103387.3A
Other languages
Chinese (zh)
Other versions
CN103838995B (en
Inventor
孙吉平
韩勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Senseshield Technology Co Ltd
Original Assignee
Beijing Senseshield Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Senseshield Technology Co Ltd filed Critical Beijing Senseshield Technology Co Ltd
Priority to CN201410103387.3A priority Critical patent/CN103838995B/en
Publication of CN103838995A publication Critical patent/CN103838995A/en
Application granted granted Critical
Publication of CN103838995B publication Critical patent/CN103838995B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Remote Sensing (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses information safety equipment capable of being set in a user-defined mode. The information safety equipment capable of being set in the user-defined mode comprises an adjustable gear plate, wherein according to changes of gears of the gear plate, the gear plate can be pointed to different parameters or identifiers so that corresponding software protection operation can be executed by the information safety equipment. According to the information safety equipment capable of being set in the user-defined mode, users can use corresponding functions of the information safety equipment through external operation, and the information safety equipment has the advantages of being high in safety, being flexible and easy in use, promoting user experience and the like.

Description

Can customize the information safety devices of setting
Technical field
The present invention relates to information security field, relate in particular to a kind of information safety devices that can customize setting.
Background technology
Software protecting equipment is that one is connected to the hardware device on main frame by computer interface (including but not limited to parallel port or USB interface).This device interior has nonvolatile storage space can, for read-write, also have the calculation processing unit such as single-chip microcomputer or micro-processing controls chip conventionally.Software developer can carry out exchanges data (software protecting equipment being read and write) by interface function and software protecting equipment, checks whether software protecting equipment is inserted on interface; Or be directly encrypted with the subsidiary instrument of software protecting equipment.Like this, software developer can arrange many places software locks in software, utilizes software protecting equipment to open these locks as key; If it is not corresponding not insert software protecting equipment or software protecting equipment, software can not normally be carried out.
In addition, software protecting equipment inside comprises specific function, for example a part of storage space, some cryptographic algorithms or some user-defined algorithm or function.Before software publishing; software developer revises the software code of oneself; make software in operational process, need to use some functions of software protecting equipment inside; software will move after leaving software protecting equipment like this; and the difficulty that software protecting equipment copies as a kind of hardware device is larger, thereby play the illegal effect of propagating of piracy software that prevents.
Software protecting equipment main on Vehicles Collected from Market comprises: WIBU-Key of the Elite series of the Sentinel Superpro of SafeNet company of the U.S., the Hasp HL of Aladdin company of Israel, BeiJing, China's deep thinking Luo Ke software incorporated company, German Wi-Bu company etc.All these software protecting equipments all provide built-in storage space, privately owned or disclosed cryptographic algorithm, check whether belong to legal when calling these functions in software running process.These software protecting equipments have adopted the basis of intelligent card chip as hardware; and the function of supporting user that oneself is defined is written to software protecting equipment inside; even can directly the partial function of software be transplanted to software protecting equipment inside completes; thereby greatly improve the difficulty of software pirate version, conventionally claimed that this technology that the function of oneself definition or the partial function of software are transplanted to software protecting equipment inside is that code is transplanted.The present corresponding website of the applicant is http://www.sense.com.cn/, wherein discloses in detail design parameter performance and the principle of work of the software protecting equipment of inventor's exploitation.
Although software protecting equipment has adopted high performance intelligent card chip now, there is very high security, when but software protecting equipment is realized various functions wherein, much still rely in house software to realize, and software running process can be subject to cracker's monitoring, in other words, cracker can follow the tracks of and debug software running process, even can analyze for the call instruction of each pass point and result, thereby know the call instruction of each pass point and the function that alignment processing result can realize thereof, and then crack out the code being implanted in software protecting equipment.As can be seen here, also there is certain security based on existing method of software Protection.
Summary of the invention
The invention provides a kind of information safety devices that can customize setting, user can be used by peripheral operation the corresponding function of information safety devices, have safe, use flexibly, simple, promote the features such as user's experience.
In order to solve the problems of the technologies described above; the invention provides a kind of information safety devices that can customize setting; comprise at least one adjustable gear dish, described gear dish is configured to be pointed to different parameters or to be identified for described information safety devices by the change of its gear carry out corresponding software protection operation.
As preferably, described information safety devices specifically comprises module, acquisition module and main control chip is set, and described main control chip comprises processing module, wherein:
The described module that arranges comprises gear dish described at least one, described gear dish is electrically connected from described main control chip and has a multiple different scale gear that can be regulated voluntarily by user setting, corresponding different parameter or the marks of scale information of each described scale gear;
Described acquisition module is configured to gather the corresponding parameter of scale information or the mark of described scale gear and fed back to described processing module;
Described processing module is configured to receive parameter or the mark of described acquisition module feedback, and it is changed and/or arrange rear formation sequence number, and described processing module is carried out corresponding feature operation according to described sequence number.
As preferably, described processing module concrete configuration is by described sequence number and a switch sequence number comparison that is stored in described information safety devices inside, carries out the startup of described information safety devices or the feature operation of closing in the time that described sequence number is identical with this switch sequence number.
As preferably, described processing module concrete configuration is to carry out the feature operation using described sequence number as encryption and decryption key.
As preferably, described information safety devices is configured to store multiple keys and stores cipher key list, in this cipher key list, there is the key sequence number of corresponding different keys, described processing module concrete configuration is to carry out using described sequence number as the feature operation of selecting key to use, concrete configuration is that the key sequence number in described sequence number and described cipher key list is contrasted item by item, if coupling, chooses key corresponding with the key sequence number of this coupling in described cipher key list.
As preferably, described information safety devices is configured to store correct encrypted message, described processing module concrete configuration is the feature operation of carrying out using described sequence number as identification password, concrete configuration is that the correct encrypted message of storing in corresponding described sequence number encrypted message and described information safety devices is contrasted, if consistent, allow to use described information safety devices.
As preferably, described information safety devices is configured to store every right assignment list, every authority sequence number that authority is corresponding different, described processing module concrete configuration is to carry out the feature operation of carrying out rights management by described sequence number, be specially described sequence number is contrasted and mated with the authority sequence number of right assignment table, if there is occurrence, carry out or open authority corresponding to this authority sequence number.
As preferably, described processing module is configured to be provided with conversion table, in this conversion table, indicate the corresponding symbolic information of scale information of scale gear described in each, after described processing module receives the scale information of described acquisition module feedback, automatically according to described conversion table, this scale information is changed item by item, and the symbolic information obtaining after conversion is coupled together and forms described sequence number.
As preferably, described symbolic information comprises letter, numeral or combined information.
As preferably, described information safety devices comprises excellent shield, encryption lock.
Compared with prior art, the beneficial effect of the information safety devices that can customize setting of the present invention is: increased the visible adjustable gear dish of at least one user, the voltage corresponding to scale gear of each gear dish, user's regulation stall dial scale, information safety devices gathers user gear voltage is set, inside is changed, is arranged, formation sequence number is also implemented corresponding feature operation, for example, carry out such as selecting key, switching information safety equipment, directly using sequence number as the operation such as key, control of authority according to sequence number.The information safety devices that can customize setting of the present invention is implemented protection scheme by peripheral hardware hardware the mode that can manually arrange, and has increased and has cracked difficulty, uses flexible, simple to operately, has promoted user's experience.
Brief description of the drawings
Fig. 1 is the configuration diagram of the information safety devices that can customize setting of embodiments of the invention.
Fig. 2 is the schematic diagram that the gear dish of the information safety devices that can customize setting of embodiments of the invention is circular configuration.
Fig. 3 is the schematic diagram that the gear dish of the information safety devices that can customize setting of embodiments of the invention is square structure.
Fig. 4 is the one-piece construction schematic diagram of the information safety devices that can customize setting of embodiments of the invention.
Embodiment
Below in conjunction with the drawings and specific embodiments, the information safety devices that can customize setting of embodiments of the invention is described in further detail, but not as a limitation of the invention.
Fig. 1 is the configuration diagram of the information safety devices that can customize setting of embodiments of the invention.The information safety devices that can customize setting of embodiments of the invention; comprise at least one adjustable gear dish, gear dish is configured to be pointed to different parameters or to be identified for information safety devices by the change of its gear carry out corresponding software protection operation.The information safety devices that can customize setting of the present invention is implemented protection scheme by peripheral hardware hardware the mode that can manually arrange, and has increased and has cracked difficulty, uses flexible, simple to operately, has promoted user's experience.
Improve as one, information safety devices specifically comprises module, acquisition module and main control chip is set, and main control chip comprises processing module.Certainly, in order to reach the more modular beneficial effect of function, acquisition module also can be configured in main control chip, and Fig. 1 illustrates that acquisition module is disposed at the situation in main control chip.Wherein, module is set and comprises at least one gear dish, gear dish is electrically connected from main control chip and has a multiple different scale gear that can be regulated voluntarily by user setting, gear disk shape does not have set form, conventional with circular and rectangle is in the majority, user can be by rotating or up and down/and left and right is stirred and is carried out regulation stall.For example a kind of embodiment is that gear dish can be similar to the combination disk on combination lock.Parameter or mark that each scale gear is corresponding different, the voltage parameter that the scale information of for example each scale gear can be corresponding different or numerical value mark.Acquisition module is configured to gather the corresponding parameter of scale information or the mark of scale gear and fed back to processing module, processing module is configured to receive the scale information of acquisition module feedback, and change and/or arrange rear formation sequence number, processing module is carried out corresponding feature operation according to sequence number.For example a kind of embodiment is, processing module is for receiving scale and/or the information of voltage of acquisition module feedback, and the scale of reception and/or information of voltage are changed and/or arranged, generating new sequence number, processing module is carried out different feature operations according to sequence number.The present invention has increased the visible adjustable gear dish of at least one user in information safety devices, the voltage corresponding to scale gear of each gear dish, user's regulation stall dial scale.User sets after gear dish, the gear dish information of acquisition module capture setting, and information is fed back to the processing module in main control chip, and processing module is changed the information such as scale and/or voltage of collection, arrange, and formation sequence number is also implemented corresponding feature operation.
As further improvement, sequence number can and be closed for the startup of information safety devices, switch sequence number of information safety devices storage inside, when user's regulation stall dish, when the sequence number generating is identical with the switch sequence number of safety equipment storage inside, carry out startup or the shutoff operation of safety equipment.Specific implementation is that processing module concrete configuration is by sequence number and a switch sequence number comparison that is stored in information safety devices inside, carries out the startup of information safety devices or the feature operation of closing in the time that sequence number is identical with this switch sequence number.
Improve as one, sequence number can also directly use as key, and processing module concrete configuration is to carry out the feature operation using sequence number as encryption and decryption key.Embodiment is, user sets after gear dish, and the gear formation sequence number of capture setting uses this sequence number as encryption and decryption key, by outside, generation key is manually set like this, also has higher convenience and security.
As further improving, sequence number can also be as selecting key to use, that is: in information safety devices, store multiple keys, also there is a cipher key list, in list, key corresponding to different sequence numbers, when user sets after gear dish, contrasts the sequence number in the sequence number of generation and cipher key list item by item, if there is match information, choose key corresponding to the sequence number of this coupling in cipher key list.Embodiment is, information safety devices disposes the cipher key list of the multiple keys of storage, in this cipher key list, there is the key sequence number of corresponding different keys, processing module concrete configuration is to carry out using sequence number as the feature operation of selecting key to use, be specially sequence number and key sequence number are contrasted item by item, if there is match information, choose key corresponding with the key sequence number of this coupling in cipher key list.
Improve as another kind, sequence number can be used as identification password, be similar to the password of combination lock, in information safety devices, store correct encrypted message, when user uses, can arrange or regulate by gear dish is set, the encrypted message of capture setting and the encrypted message of storage inside contrast, if consistent, permission is used other functions of information safety devices.Embodiment is, in information safety devices, store correct encrypted message, processing module concrete configuration is the feature operation of carrying out using sequence number as identification password, be specially and contrast storing correct encrypted message in corresponding sequence number encrypted message and information safety devices, if consistent, allow to use information safety devices, comprise needed other functions etc.
As the preferred version of the present embodiment, the present invention can also carry out authority bookkeeping by gear dish is set.Embodiment is, information safety devices disposes every right assignment list, every authority sequence number that authority is corresponding different, processing module concrete configuration is to carry out the feature operation of carrying out rights management by sequence number, be specially sequence number is contrasted and mated with the authority sequence number of right assignment table, if there is occurrence, carry out or open authority corresponding to this authority sequence number.
Improve as another kind, processing module is configured to be provided with conversion table, in this conversion table, indicate the corresponding symbolic information of scale information of each scale gear, after processing module receives the scale information of acquisition module feedback, automatically according to conversion table, this scale information is changed item by item, and the symbolic information after conversion is coupled together to formation sequence number.Its concrete grammar can be preferably, and a conversion table is set, and indicates each scale or the corresponding letter or number of different voltage or other combined informations in table.When processing module receives after the scale and/or information of voltage of collection, automatically according to conversion table, the scale and/or the information of voltage that gather are changed item by item, and the digital or letter after conversion or other are connected, form new sequence number.
As to further improvement of the present invention, the information safety devices that can customize setting of the present invention includes but not limited to excellent shield (USB Key), encryption lock, and other have such as the hardware device that the demand such as password, authority is set.
For making object of the present invention, technical scheme and advantage clearer, referring to the accompanying drawing embodiment that develops simultaneously, the present invention is described in more detail.
Fig. 2 is the schematic diagram that the gear dish of the information safety devices that can customize setting of embodiments of the invention is circular configuration, Fig. 3 is the schematic diagram that the gear dish of the information safety devices that can customize setting of embodiments of the invention is square structure, the one-piece construction schematic diagram of what Fig. 4 was embodiments of the invention the can customize information safety devices of setting.In the present invention, module is set and comprises at least one adjustable gear dish, gear dish is connected with the main control chip of information safety devices by circuit, and outside is presented at outside by the scale gear dish of similar combination disk, and user is visible and adjustable.Each gear dish has multiple different scale gears, the voltage that each gear is corresponding different.User can arrange the different gears on regulation stall dish according to demand voluntarily.
Referring to Fig. 2, Fig. 3, gear dish can be circle or rectangle, and user can be stirred and be carried out regulation stall by rotation or upper and lower/left and right, the numeral in figure and letter representation gear mark.Certainly can be also other shapes, as long as can meet regulatory demand.According to an embodiment of the invention, gear dish can be the combination disk on similar combination lock.
Referring to Fig. 4, the product structure schematic diagram that Fig. 4 is a preferred embodiment of the present invention.As Fig. 4, whole information safety devices is the encryption lock of similar USB flash disk, 401 is the USB interface of encryption lock, for being electrically connected with main frame by host interface, 402,403 for being presented at the gear dish of two outer similar combination disk, in the present embodiment, each gear dish has 1-8 scale gear, the voltage that each gear scale is corresponding different, suppose that in the present embodiment, scale 1 voltage is 0.3V, increase progressively successively 0.5V according to scale, scale 2 is that 0.8V, scale 3 are that 1.3V, scale 4 are 1.8V ... scale 8 is 3.8V.
Encryption lock storage inside has voltage transitions table, and numeral corresponding to different voltage ranges in table, increases progressively 0.5 successively at numerical value 1 as corresponding in 0.2~0.7V, i.e. the corresponding numerical value 2 of 0.7~1.2V, and the rest may be inferred.
Encryption lock inside also stores cipher key list, the corresponding different keys of sequence number.
While using the solution of the present invention, user regulates the gear that two gear dishes are set voluntarily, the acquisition module collection user of encryption lock inside arranges the voltage of gear, and information of voltage is fed back to the processing module of encryption lock inside, processing module is changed this information of voltage of feedback item by item according to voltage transitions table, be numeric sequence number by voltage transitions, afterwards sequence number is mated with the sequence number in cipher key list, if there is occurrence, select the key corresponding to sequence number of this coupling, and then use this key to carry out to comprise the operation such as encryption and decryption of data.
The beneficial effect of the information safety devices that can customize setting of the present invention is: increased the visible adjustable gear dish of at least one user, the voltage corresponding to scale gear of each gear dish, user's regulation stall dial scale, information safety devices gathers user gear voltage is set, inside is changed, is arranged, formation sequence number is also implemented corresponding feature operation, for example, carry out such as selecting key, switching information safety equipment, directly using sequence number as the operation such as key, control of authority according to sequence number.The information safety devices that can customize setting of the present invention is implemented protection scheme by peripheral hardware hardware the mode that can manually arrange, and has increased and has cracked difficulty, uses flexible, simple to operately, has promoted user's experience.
Above embodiment is only exemplary embodiment of the present invention, is not used in restriction the present invention, and protection scope of the present invention is defined by the claims.Those skilled in the art can, in essence of the present invention and protection domain, make various amendments or be equal to replacement the present invention, this amendment or be equal to replacement and also should be considered as dropping in protection scope of the present invention.

Claims (10)

1. one kind can customize the information safety devices of setting; it is characterized in that; comprise at least one adjustable gear dish, described gear dish is configured to be pointed to different parameters or to be identified for described information safety devices by the change of its gear carry out corresponding software protection operation.
2. the information safety devices that can customize setting according to claim 1, is characterized in that, described information safety devices specifically comprises module, acquisition module and main control chip are set, and described main control chip comprises processing module, wherein:
The described module that arranges comprises gear dish described at least one, described gear dish is electrically connected from described main control chip and has a multiple different scale gear that can be regulated voluntarily by user setting, corresponding different parameter or the marks of scale information of each described scale gear;
Described acquisition module is configured to gather the corresponding parameter of scale information or the mark of described scale gear and fed back to described processing module;
Described processing module is configured to receive parameter or the mark of described acquisition module feedback, and it is changed and/or arrange rear formation sequence number, and described processing module is carried out corresponding feature operation according to described sequence number.
3. the information safety devices that can customize setting according to claim 2, it is characterized in that, described processing module concrete configuration is by described sequence number and a switch sequence number comparison that is stored in described information safety devices inside, carries out the startup of described information safety devices or the feature operation of closing in the time that described sequence number is identical with this switch sequence number.
4. the information safety devices that can customize setting according to claim 2, is characterized in that, described processing module concrete configuration is to carry out the feature operation using described sequence number as encryption and decryption key.
5. the information safety devices that can customize setting according to claim 2, it is characterized in that, described information safety devices is configured to store multiple keys and stores cipher key list, in this cipher key list, there is the key sequence number of corresponding different keys, described processing module concrete configuration is to carry out using described sequence number as the feature operation of selecting key to use, concrete configuration is that the key sequence number in described sequence number and described cipher key list is contrasted item by item, if coupling, chooses key corresponding with the key sequence number of this coupling in described cipher key list.
6. the information safety devices that can customize setting according to claim 2, it is characterized in that, described information safety devices is configured to store correct encrypted message, described processing module concrete configuration is the feature operation of carrying out using described sequence number as identification password, concrete configuration is that the correct encrypted message of storing in corresponding described sequence number encrypted message and described information safety devices is contrasted, if consistent, allow to use described information safety devices.
7. the information safety devices that can customize setting according to claim 2, it is characterized in that, described information safety devices is configured to store every right assignment list, every authority sequence number that authority is corresponding different, described processing module concrete configuration is to carry out the feature operation of carrying out rights management by described sequence number, be specially described sequence number is contrasted and mated with the authority sequence number of right assignment table, if there is occurrence, carry out or open authority corresponding to this authority sequence number.
8. according to the information safety devices that can customize setting described in any one in claim 2 to 7, it is characterized in that, described processing module is configured to be provided with conversion table, in this conversion table, indicate the corresponding symbolic information of scale information of scale gear described in each, after described processing module receives the scale information of described acquisition module feedback, automatically according to described conversion table, this scale information is changed item by item, and the symbolic information obtaining after conversion is coupled together and forms described sequence number.
9. the information safety devices that can customize setting according to claim 8, is characterized in that, described symbolic information comprises letter, numeral or combined information.
10. the information safety devices that can customize setting according to claim 8, is characterized in that, described information safety devices comprises excellent shield, encryption lock.
CN201410103387.3A 2014-03-19 2014-03-19 It can customize the information safety devices of setting Active CN103838995B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410103387.3A CN103838995B (en) 2014-03-19 2014-03-19 It can customize the information safety devices of setting

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410103387.3A CN103838995B (en) 2014-03-19 2014-03-19 It can customize the information safety devices of setting

Publications (2)

Publication Number Publication Date
CN103838995A true CN103838995A (en) 2014-06-04
CN103838995B CN103838995B (en) 2018-04-27

Family

ID=50802483

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410103387.3A Active CN103838995B (en) 2014-03-19 2014-03-19 It can customize the information safety devices of setting

Country Status (1)

Country Link
CN (1) CN103838995B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI818221B (en) * 2020-12-31 2023-10-11 新唐科技股份有限公司 Chip and method capable of authenticating off-chip debug firmware program and debug user

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4525599A (en) * 1982-05-21 1985-06-25 General Computer Corporation Software protection methods and apparatus
CN101038611A (en) * 2006-03-14 2007-09-19 北京深思洛克数据保护中心 Software protection method
CN101282221A (en) * 2008-05-14 2008-10-08 北京深思洛克数据保护中心 Dynamic password apparatus for multiple applications and implementing method
CN201207651Y (en) * 2008-03-19 2009-03-11 阎琳 USB digital autograph device
CN101526926A (en) * 2008-03-05 2009-09-09 亮发科技股份有限公司 Digital encryption key method and system
CN103400067A (en) * 2013-03-29 2013-11-20 青岛海信电器股份有限公司 Access control method, system and server
CN103532697A (en) * 2013-10-22 2014-01-22 北京深思数盾科技有限公司 Realizing method and system for wireless information safety equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4525599A (en) * 1982-05-21 1985-06-25 General Computer Corporation Software protection methods and apparatus
CN101038611A (en) * 2006-03-14 2007-09-19 北京深思洛克数据保护中心 Software protection method
CN101526926A (en) * 2008-03-05 2009-09-09 亮发科技股份有限公司 Digital encryption key method and system
CN201207651Y (en) * 2008-03-19 2009-03-11 阎琳 USB digital autograph device
CN101282221A (en) * 2008-05-14 2008-10-08 北京深思洛克数据保护中心 Dynamic password apparatus for multiple applications and implementing method
CN103400067A (en) * 2013-03-29 2013-11-20 青岛海信电器股份有限公司 Access control method, system and server
CN103532697A (en) * 2013-10-22 2014-01-22 北京深思数盾科技有限公司 Realizing method and system for wireless information safety equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI818221B (en) * 2020-12-31 2023-10-11 新唐科技股份有限公司 Chip and method capable of authenticating off-chip debug firmware program and debug user

Also Published As

Publication number Publication date
CN103838995B (en) 2018-04-27

Similar Documents

Publication Publication Date Title
EP3198781B1 (en) Techniques for distributing secret shares
CN103366797B (en) By the design method of security U disk of the certification of wireless authentication authorization terminal and encryption and decryption
CN103034417A (en) Unlocking method for touch screen and terminal equipment
CN105225314A (en) A kind of dynamic two-dimension code door control system based on pseudo-random sequence
CN105005731A (en) Data encryption and decryption methods and mobile terminal
CN105117658B (en) A kind of cryptosecurity management method and equipment based on finger print identifying
CN103390125A (en) Design method for safe and mobile storage controller authorized and encrypted/decrypted by wireless terminal
CN109543423A (en) Control panel encryption and manner of decryption, terminal device and computer readable storage medium
CN105426727B (en) Fingerprint decryption method and mobile terminal
CN106127077A (en) A kind of method protecting user privacy information and terminal
CN105261103A (en) Intelligent assess control system
CN104298898A (en) Software protection method and device
CN106204812A (en) Electronic lock and unlocking verification method thereof
CN103838995A (en) Information safety equipment capable of being set in user-defined mode
CN106340089B (en) A kind of smart electronics lock more verify datas fusions and split storage and merge restoring method
CN204808325U (en) Carry out black equipment to data
US20150020165A1 (en) System of executing application and method thereof
CN202887202U (en) Digitalized multi-fingerprint encryption system
CN203982391U (en) A kind of PCI-E encrypted card with network interface
CN105893821A (en) Method for encrypting USB flash disk with fingerprint authentication
CN202711243U (en) Encryption type movable storage device based on fingerprint authentication
CN202443377U (en) Computer with fingerprint switch
US20160182229A1 (en) Data processing device and method for protecting a data processing device against tampering
CN104182706B (en) A kind of time slot scrambling, device and the mobile terminal of mobile terminal storage card
CN106127058A (en) A kind of method improving intelligent automation device security

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing

Applicant after: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

Address before: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing

Applicant before: BEIJING SHENSI SHUDUN TECHNOLOGY Co.,Ltd.

COR Change of bibliographic data
CB02 Change of applicant information

Address after: 100193 Beijing, Haidian District, East West Road, No. 10, East Hospital, building No. 5, floor 5, layer 510

Applicant after: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

Address before: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing

Applicant before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

COR Change of bibliographic data
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee after: Beijing Shendun Technology Co.,Ltd.

Address before: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.