CN100495421C - Authentication protection method based on USB device - Google Patents

Authentication protection method based on USB device Download PDF

Info

Publication number
CN100495421C
CN100495421C CNB2006100115443A CN200610011544A CN100495421C CN 100495421 C CN100495421 C CN 100495421C CN B2006100115443 A CNB2006100115443 A CN B2006100115443A CN 200610011544 A CN200610011544 A CN 200610011544A CN 100495421 C CN100495421 C CN 100495421C
Authority
CN
China
Prior art keywords
software
usb device
binding
usb
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2006100115443A
Other languages
Chinese (zh)
Other versions
CN1834977A (en
Inventor
李岳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNB2006100115443A priority Critical patent/CN100495421C/en
Publication of CN1834977A publication Critical patent/CN1834977A/en
Application granted granted Critical
Publication of CN100495421C publication Critical patent/CN100495421C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to the computer field, disclosing a USB device-based attestation protecting method, comprising the steps of: setting code for software and storing user data by encryption, and also comprising the steps of: 1) a software user appoints a USB device needing to be bond to the software; 2) after completing the binding, and as the user runs the software, the bond USB device need be inserted, otherwise the software can not run; 3) in the running course, the user data encrypted storage adopts hardware information of the bond USB device as part of a secret key, and the hardware information of the USB device need be read, otherwise the user data can not be encrypted. And it improves security in user identification attestation and data protection of personal private software, simple to operate and convenient to use.

Description

A kind of authentication protection method based on USB device
Technical field
The present invention relates to computer realm, be specifically related to a kind of authentication and data guard method based on USB device.
Background technology
In the prior art, only supplying the safety problem of the private software systems of individual subscriber visit, mainly is to control access rights by user's password, adopts the mode storaging user data of encrypting simultaneously.And the software protection mode of traditional USB-KEY or USB house dog to be manufacturer by software distribute these USB hardware devices of management, patent CN99124432.X for example, its purpose prevents piracy normally in order to protect the copyright of software.
These technical protection means of prior art can't satisfy the protection demand of user for individual software gradually; more typical Password Management software for example; the user has stored some account numbers and encrypted message in this software; this software is a typical individual private software for the user.Usually, the user can be password of this software setting, and the disabled user does not know that this password can't start this software.Simultaneously, software can adopt the mode of encryption to deposit user's data.But the higher hacker of technical merit but can break through these safeguard measures by the mode that cracks.
Summary of the invention
(1) technical matters that will solve
The purpose of this invention is to provide a kind of authentication and data protection security good, easy and simple to handle authentication and data guard method based on USB device.
(2) technical scheme
In order to achieve the above object, the present invention takes following scheme:
A kind of authentication protection method based on USB device of the present invention is included as the software setting password, encrypts storaging user data, and is further comprising the steps of:
1) user of software specifies the USB device that needs binding for this software;
2) after binding is finished, when the user moves this software, the USB device of being bound must be inserted, otherwise software can't move;
3) in the operational process, the part of the hardware information of the USB device of binding as key adopted in the encryption of described user data storage, must read the hardware information of this USB device, otherwise can't the decrypted user data.
Wherein, described step 1) is that the user can be prompted to specify the USB device that needs binding when moving the first time of software.
Wherein, can check all when software starts at every turn whether the USB device of binding exists, if this USB device is not inserted, software can't start; Whether during the running software, can the self-verifying USB device exist, if extract USB device, software can withdraw from automatically.
Wherein, if the user data of described step 3) is illegally copied to other place, must have the hardware information of the USB device of binding, otherwise user data can't be deciphered.
Wherein, the USB device of described binding comprises the electronic equipment of USB flash disk or MP3 or use USB interface.
(3) beneficial effect
1, because USB device and individual private software context are got up, the authenticating user identification of individual private software and the security of data protection have been improved; 2, the present invention is simple to operate, easy to use.
Description of drawings
Fig. 1 is the process flow diagram of software binding USB device and startup;
Fig. 2 is the process flow diagram that regularly detects USB device during the running software;
Fig. 3 is the process flow diagram of software cryptography decrypted user data.
Embodiment
Following examples are used to illustrate the present invention, but are not used for limiting the scope of the invention.
The present invention can be applied to the authenticating user identification and the data protection of any individual private software.Present embodiment is an example with dynamic password software, further specifies content of the present invention and embodiment.
Dynamic password software is the development along with Internet service; for satisfying a kind of cryptoguard mode that more and more urgent hope better protection user account number and password occur that is used for; on basis in conjunction with the traditional static cryptographic technique, a kind of dynamic password technology that development forms.Use dynamic password software, when the user logins Internet service, need to use the dynamic password computed in software go out the disposal password of a dynamic change at every turn, and together be input to the service server end with static password and verify.And a cover dynamic password software can be managed a plurality of account numbers, but the use of software is individual private.
As shown in Figure 1, software is behind each the startup, the USB bound flag is read in the capital earlier, judges whether to have finished the USB binding then: if finish, then software can scan the whole USB device that have been connected to computing machine, and judge whether the USB bound device exists, if do not detect, then point out the user to insert the USB bound device, and continue scanning, if successfully detected, then enter software master interface; If do not finish the USB binding as yet, then software can real time scan be connected to whole USB device of computing machine and have generated the list of devices of a real-time update, and the user need to select the equipment of binding from tabulation then, and is last, write the USB bound flag, enter software master interface.
As shown in Figure 2, the user is when using business, and things are as usual, and selecting oneself needs the account number of use, and click generates password and gets final product.During running software, even software is in waiting status, for example minimized in Windows system the inside, the whole USB device that are connected to computing machine also can timing (for example per second) be scanned in the backstage, and judge whether the USB bound device is pulled out, if do not have, then continue timing scan, be pulled out if detect the USB bound device, locked software and point out the user to insert the USB bound device immediately then, software can real time scan be connected to whole USB device of computing machine then, and judge whether the USB bound device exists, if detect correct USB bound device, then unlock and recover normal condition, continue timing scan then; If do not detect, whether then check and overtime (for example 60 seconds), then continue real time scan, otherwise software to withdraw from automatically if not overtime.
As shown in Figure 3, dynamic password software can be used some users' significant data when calculating dynamic password, and these data are to encrypt storage.Need to read out the hardware information (for example manufacturer, product type and sequence number etc.) of USB bound device in the process of encryption and decryption, that is to say, the hardware information of USB bound device is the part of key, the necessary condition that to have this USB bound device be the calling party data.When storaging user data, software at first reads the hardware information of USB bound device, handles and obtain key then, uses this secret key encryption user data, obtains encrypt data and storage at last.When being written into user data, also at first need to read the hardware information of USB bound device, handle and obtain key then, use this secret key decryption user data, obtain clear data at last and be written into.If data are by bootlegging owing to lack the hardware information of USB bound device, other people be can't calling party significant data.
The present invention is that the USB device with individual subscriber private software and user's appointment associates, and preferably resolves the problem of authenticating user identification and data protection.Improved the security of software.All within above-mentioned spirit of the present invention and principle, any modification of being done, be equal to replacement, improvement etc., all should be included within the claim scope of the present invention.

Claims (5)

1, a kind of software authentication guard method based on USB device is included as the software setting password, encrypts storaging user data, it is characterized in that further comprising the steps of:
1) user of software specifies the USB device that needs binding for this software;
2) after binding is finished, can check all when described software starts at every turn whether the USB device of binding exists, if this USB device is not inserted, software can't start; Whether during the running software, can the self-verifying USB device exist, if extract USB device, software can withdraw from automatically;
3) in the operational process, the part of the hardware information of the USB device of binding as key adopted in the encryption of described user data storage, must read the hardware information of this USB device, otherwise can't the decrypted user data.
2, a kind of software authentication guard method based on USB device as claimed in claim 1 is characterized in that: described step 1) is the user can be prompted to specify the needs binding when moving the first time of software a USB device.
3, a kind of software authentication guard method as claimed in claim 1 based on USB device; it is characterized in that: if the user data of described step 3) is illegally copied to other place; the hardware information that must have the USB device of binding, otherwise user data can't be deciphered.
4, a kind of software authentication guard method based on USB device as claimed in claim 1, it is characterized in that: the USB device of described binding comprises the electronic equipment that uses USB interface.
5, a kind of software authentication guard method based on USB device as claimed in claim 1, it is characterized in that: the USB device of described binding comprises USB flash disk or MP3.
CNB2006100115443A 2006-03-23 2006-03-23 Authentication protection method based on USB device Expired - Fee Related CN100495421C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2006100115443A CN100495421C (en) 2006-03-23 2006-03-23 Authentication protection method based on USB device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2006100115443A CN100495421C (en) 2006-03-23 2006-03-23 Authentication protection method based on USB device

Publications (2)

Publication Number Publication Date
CN1834977A CN1834977A (en) 2006-09-20
CN100495421C true CN100495421C (en) 2009-06-03

Family

ID=37002719

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2006100115443A Expired - Fee Related CN100495421C (en) 2006-03-23 2006-03-23 Authentication protection method based on USB device

Country Status (1)

Country Link
CN (1) CN100495421C (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100449560C (en) * 2006-09-26 2009-01-07 南京擎天科技有限公司 Computer data security protective method
CN100449561C (en) * 2007-03-05 2009-01-07 北京邮电大学 Divulging secrets prevention system of USB storage device date based on certificate and transparent encryption technology
KR101310232B1 (en) * 2007-04-24 2013-09-24 삼성전자주식회사 Method for sharing bus key and apparatus therefor
CN101515319B (en) * 2008-02-19 2011-01-26 联想(北京)有限公司 Cipher key processing method, cipher key cryptography service system and cipher key consultation method
CN101587523B (en) 2009-07-02 2012-04-18 飞天诚信科技股份有限公司 Method, and apparatus for protecting software
CN102289607A (en) * 2010-06-17 2011-12-21 鸿富锦精密工业(深圳)有限公司 Universal serial bus (USB) device verification system and method
CN102479091B (en) * 2010-11-30 2015-06-10 深圳市金蝶友商电子商务服务有限公司 Method and device for running software and moveable storage medium
CN101996293B (en) * 2010-12-13 2012-11-21 深圳市江波龙电子有限公司 Software authentication method based on softdog
CN102685139A (en) * 2012-05-21 2012-09-19 中国联合网络通信集团有限公司 Network software authentication method and device
CN104636655A (en) * 2015-02-06 2015-05-20 电子科技大学 Credibility verifying method of hot plug device
CN105095556A (en) * 2015-02-11 2015-11-25 洛阳汉鼎起重机械有限公司 Method and device for generating scheme of hoisting machinery equipment
CN105045612B (en) * 2015-06-26 2020-05-26 Tcl科技集团股份有限公司 Peripheral upgrading recovery method and system for Android terminal
CN107463810A (en) * 2017-08-15 2017-12-12 合肥爱吾宠科技有限公司 The method that protecting computer software is realized based on network communication

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
一种USB加密卡的设计. 骆剑平,王晖,高建波.电子工程师,第29卷第6期. 2003
一种USB加密卡的设计. 骆剑平,王晖,高建波.电子工程师,第29卷第6期. 2003 *
利用USB总线接口的软件加密卡设计. 袁金国,李清宝,白燕.电子技术,第11期. 2004
利用USB总线接口的软件加密卡设计. 袁金国,李清宝,白燕.电子技术,第11期. 2004 *
利用加密狗实现软件版权的保护. 候爱民.东莞立功学院学报,第12卷第5期. 2005
利用加密狗实现软件版权的保护. 候爱民.东莞立功学院学报,第12卷第5期. 2005 *

Also Published As

Publication number Publication date
CN1834977A (en) 2006-09-20

Similar Documents

Publication Publication Date Title
CN100495421C (en) Authentication protection method based on USB device
JP4764639B2 (en) File encryption / decryption program, program storage medium
US7975312B2 (en) Token passing technique for media playback devices
CN102508791B (en) Method and device for encrypting hard disk partition
CN100449561C (en) Divulging secrets prevention system of USB storage device date based on certificate and transparent encryption technology
US20060053302A1 (en) Information processing apparatus with security module
JP2007013433A (en) Method for transmitting/receiving encrypted data and information processing system
CN102227734A (en) Client computer for protecting confidential file, server computer therefor, method therefor, and computer program
EP2628133B1 (en) Authenticate a fingerprint image
CN103236930A (en) Data encryption method and system
US20110047378A1 (en) System and method for identifying account and peripheral device thereof
CN105740725A (en) File protection method and system
CN103560892A (en) Secret key generation method and secret key generation device
CN101840478B (en) Password management method
CN101674575A (en) Method for protecting security of mobile communication terminal data and device thereof
CN103971034A (en) Method and device for protecting Java software
JP2007011511A (en) Method for preventing information leak
CN101923616A (en) Service provision device in copyright protection, user terminal and copyright protection method
CN101727558A (en) Method for clearing password of computer, computer and server
US6651169B1 (en) Protection of software using a challenge-response protocol embedded in the software
CN101815292A (en) Device and method for protecting data of mobile terminal
CN102831335A (en) Safety protecting method and safety protecting system of Windows operating system
JP4587688B2 (en) Encryption key management server, encryption key management program, encryption key acquisition terminal, encryption key acquisition program, encryption key management system, and encryption key management method
TWI428752B (en) Electronic file delivering system, portable communication apparatus with decryption functionality, and related computer program product
CN102831360B (en) Personal electronic document safety management system and management method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090603

Termination date: 20120323