CN103473486B - Method for protecting software based on electric signing tools, device and electric signing tools - Google Patents
Method for protecting software based on electric signing tools, device and electric signing tools Download PDFInfo
- Publication number
- CN103473486B CN103473486B CN201310400186.5A CN201310400186A CN103473486B CN 103473486 B CN103473486 B CN 103473486B CN 201310400186 A CN201310400186 A CN 201310400186A CN 103473486 B CN103473486 B CN 103473486B
- Authority
- CN
- China
- Prior art keywords
- data
- electric signing
- signing tools
- software
- time interval
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 230000004044 response Effects 0.000 claims abstract description 120
- 238000013507 mapping Methods 0.000 claims description 7
- 230000000694 effects Effects 0.000 abstract description 6
- 230000003993 interaction Effects 0.000 description 29
- 230000005540 biological transmission Effects 0.000 description 10
- 230000008569 process Effects 0.000 description 9
- 238000004891 communication Methods 0.000 description 4
- 238000002474 experimental method Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
nullThe present invention relates to a kind of method for protecting software based on electric signing tools、Device and electric signing tools,Choose electric signing tools and obtain the first response time interval of the first data that protected software is sent by this electric signing tools,Obtain this electric signing tools the response time of other data that protected software sends is spaced,And calculate the instant ratio between time interval corresponding to each other data described and described first response time interval respectively,The instant ratio got is compared with the typical ratio preset,Performance and the running environment of the terminal do not carried by software are affected,Make the judgement whether software is hacked more accurate,More preferable to the protected effect of software,And the method is realized by electric signing tools,Assailant cannot contact and get involved,The most just cannot walk around protection,Improve the protection intensity to software.
Description
Technical field
The present invention relates to Software Protection Technique field, particularly relate to a kind of software based on electric signing tools
Guard method, device and electric signing tools.
Background technology
Debugging and analysis software flow are the important means that bootlegger cracks, if it is possible to stop piracy
Software is debugged by person, then the risk of software pirate version will be substantially reduced, general in prior art
Software is protected by the mode using software shelling and Code obfuscation, and it is substantially to utilize software engineering
Dis-assembling decompiling and trace debug to assailant raise obstacles.If software to be employed shell adding means,
Although assailant cannot directly carry out dis-assembling and decompiling, but have to run shelling owing to running software
Program, assailant can obtain, by the decompiling of shelling program and trace debug, the algorithm that shells, thus will
Program shelling is tracked debugging;For using Code obfuscation to carry out the software protected, attacked time the most only
The person of hitting arranges certain obstacle, and by coordinating the methods such as dynamic tracking debugging, assailant is equally to soft
Part is debugged.
For above-mentioned technical problem, prior art proposes a solution, in software and electronic signature work
During tool carries out data interaction, preset multiple pass points, obtain time interval between pass point with
Error between the standard time interval preset, if when the time interval between pass point and the standard preset
Between error between interval more than pre-set threshold value, then it is assumed that software is hacked, but owing to being carried by software
The performance of terminal and the restriction of running environment, the time interval between the pass point got has bigger
Error, then the judgement whether being hacked for software is not accurate enough.
Summary of the invention
The main object of the present invention is to provide a kind of method for protecting software based on electric signing tools, device
And electric signing tools so that the judgement whether being hacked software is more accurate.
The present invention proposes a kind of method for protecting software based on electric signing tools, and the method includes:
Electric signing tools obtains the first of the first data that protected software is sent by this electric signing tools
Response time is spaced;
Electric signing tools obtains the response to other data that protected software sends of this electric signing tools
Time interval, and when calculating time interval corresponding to each other data described respectively with described first response
Between interval between instant ratio;
Electric signing tools is according to each described the reflecting between other data and corresponding typical ratio preset
Penetrate relation, obtain the typical ratio that each other data described are corresponding;
If the difference between instant ratio and corresponding typical ratio that other data described are corresponding is more than presetting
Threshold values, then electric signing tools is out of service or sends control instruction to control protected software stopping fortune
OK.
Preferably, described electric signing tools obtain that protected software is sent by this electric signing tools
Before the step at the first response time interval of one data, the method also includes:
Electric signing tools obtains the second of the first data that protected software is sent by this electric signing tools
Response time is spaced;
Obtain this electric signing tools the response time of other data that protected software sends is spaced, and
Calculate respectively between time interval corresponding to each other data described and described second response time interval
Ratio, using calculated described ratio as typical ratio;
Preserve described typical ratio.
Preferably, electric signing tools is according to each other data described preset and corresponding typical ratio
Between mapping relations, after obtaining the step of typical ratio corresponding to each other data described, the party
Method also includes:
If the difference between instant ratio and corresponding typical ratio that other data described are corresponding is less than or equal to
Pre-set threshold value, then judge whether to have obtained all data that protected software is sent by this electric signing tools
Response time interval;
If not obtained between the response time of all data that protected software is sent by this electric signing tools
Every, then continue to obtain between this electric signing tools response time to other data that protected software sends
Every.
The present invention also proposes a kind of software protecting equipment based on electric signing tools, and described software protection fills
Putting and run in described electric signing tools, described software protecting equipment includes:
Acquisition module, obtains the first sound of the first data that protected software is sent by this electric signing tools
Answer time interval, and obtain the response to other data that protected software sends of this electric signing tools
Time interval;
Computing module, for calculating time interval corresponding to each other data described and described first response
Instant ratio between time interval;
Described acquisition module be additionally operable to according to each other data described preset and corresponding typical ratio it
Between mapping relations, obtain the typical ratio that each other data described are corresponding;
Control module, if between instant ratio and the corresponding typical ratio that other data described are corresponding
Difference more than pre-set threshold value, then control electric signing tools out of service or send control instruction with control
Protected software processed is out of service.
Preferably, described acquisition module is additionally operable to electric signing tools and obtains this electric signing tools to being protected
Protect the second response time interval of the first data that software sends;Obtain this electric signing tools to being protected
The response time interval of other data that software sends;Computing module be additionally operable to calculate respectively each described its
Ratio between time interval and described second response time interval that his data are corresponding, by calculated
Described ratio is as typical ratio;This software protecting equipment also includes memory module, is used for preserving described mark
Quasi-ratio.
Preferably, this device also includes judge module, if being used for the instant ratio that other data described are corresponding
And the difference between corresponding typical ratio is less than or equal to pre-set threshold value, then judge whether to have obtained this electronics
The response time interval of all data that protected software is sent by signature instrument;Described acquisition module is also used
If in not obtained between the response time of all data that protected software is sent by this electric signing tools
Every, then continue to obtain between this electric signing tools response time to other data that protected software sends
Every.
The present invention also proposes a kind of electric signing tools, comprises above-described software protecting equipment.
Method for protecting software based on electric signing tools, device and the electronic signature work that the present invention proposes
Tool, chooses electric signing tools and obtains the first data that protected software sends by this electric signing tools
First response time interval, obtains this electric signing tools sound to other data that protected software sends
Answer time interval, and calculate time interval corresponding to each other data described and described first response respectively
Instant ratio between time interval, compares the instant ratio got with the typical ratio preset,
Performance and the running environment of the terminal do not carried by software are affected so that whether be hacked software
Judgement more accurate, more preferable to the protected effect of software, and the method realized by electric signing tools,
Assailant cannot contact and get involved, and the most just cannot walk around protection, improves the protection intensity to software.
Accompanying drawing explanation
Fig. 1 is that the flow process of the first embodiment of present invention method for protecting software based on electric signing tools is shown
It is intended to;
Fig. 2 is that the flow process of the second embodiment of present invention method for protecting software based on electric signing tools is shown
It is intended to;
Fig. 3 is that the flow process of the 3rd embodiment of present invention method for protecting software based on electric signing tools is shown
It is intended to;
Fig. 4 is the stream of the first embodiment of a kind of software protecting equipment based on electric signing tools of the present invention
Journey schematic diagram;
Fig. 5 is the stream of the second embodiment of a kind of software protecting equipment based on electric signing tools of the present invention
Journey schematic diagram;
Fig. 6 is the stream of the 3rd embodiment of a kind of software protecting equipment based on electric signing tools of the present invention
Journey schematic diagram.
The realization of the object of the invention, functional characteristics and advantage will in conjunction with the embodiments, do referring to the drawings further
Explanation.
Detailed description of the invention
Below in conjunction with the accompanying drawings and specific embodiment is described further with regard to technical scheme.Should
Understanding, specific embodiment described herein only in order to explain the present invention, is not intended to limit the present invention.
With reference to the first embodiment that Fig. 1, Fig. 1 are present invention method for protecting software based on electric signing tools
Schematic flow sheet.
The present embodiment proposes a kind of method for protecting software based on electric signing tools, including:
Step S10, electric signing tools obtains the first number that protected software is sent by this electric signing tools
According to first response time interval;
Software operationally and carries out data interaction, such as USBkey and bank between electric signing tools
Between client software, conducting transmission line protects the process of the data interactions such as negotiation, trading signature certification.Should
First data preferably carry out being sent to during for the first time data interaction soft between electric signing tools and software
The data of part, such as the route protection negotiation data between USBkey and client software so that electronics label
Mutual the safest between name instrument and software.
First response time interval refers to that electric signing tools sends the time point of the first data to software and connects
Receive the time interval between the corresponding data of software feedback, can be by arranging meter in electric signing tools
Time device, obtain the first time point that sends of data and the second time point receiving feedback data, obtain
Protected software is sent out by the time interval between first time point and the second time point as electric signing tools
The response time interval of the data sent, this first response time is spaced apart between software and terminal and carries out arbitrarily
The time interval of data interaction successively, and when being not specific between software and terminal carry out data interaction for the first time
Time interval, for the security consideration of software, the very first time is preferably spaced between software and terminal and carries out
Response time interval during data interaction for the first time.
Step S20, electric signing tools obtains other numbers that protected software is sent by this electric signing tools
According to response time interval, and when calculating time interval corresponding to other data described with described first response
Between interval between instant ratio;
These other data and the first data belong to terminal that protected software carried with the most once run into
Interaction data in journey, the response time interval of other data and the acquisition principle at the first response time interval
Identical, do not repeat them here, be once sent to software protecting equipment on electric signing tools getting
When the response time of data is spaced, calculates the response time interval got and the first response time is spaced it
Between instant ratio.The response time of these other data is spaced time interval corresponding to first and is electronics label
The time interval of data interaction is carried out between the software carried on name instrument and same terminal.
Step S30, electric signing tools is described between other data and corresponding typical ratio according to preset
Mapping relations, obtain the typical ratio that other data described are corresponding;
Can be prestored correspondingly typical ratio corresponding to other data, removes the first data electric signing tools
The response time of other data that protected software sends is spaced all to having a typical ratio, this mark
Quasi-ratio can be obtained by many experiments.
Step S40, it is judged that the difference between instant ratio and corresponding typical ratio that other data described are corresponding
Whether value is more than pre-set threshold value;
Step S50, if the difference between corresponding instant ratio and the corresponding typical ratio of other data described
More than pre-set threshold value, then electric signing tools is out of service or transmission control instruction is soft to control by protection
Part is out of service.
Error between typical ratio and the instant ratio corresponding to other data got can be set, make
For confidence interval, if the corresponding time interval that electric signing tools is to other data that protected software sends
And the difference between instant ratio and the typical ratio between very first time interval is more than threshold values, i.e. beyond putting
When letter is interval, then it is assumed that now software has debugged risk, then controls this electric signing tools and stop fortune
Row or transmission control instruction are out of service to control protected software, control this electric signing tools and stop
Operation can be not responding to any of software transmission by this electric signing tools is set to refusal responsive state
Instruction the most not and carries out any data exchange process between software, or controls this electric signing tools power-off;
Send control instruction out of service to control protected software, control instruction software can be sent by phase software,
After the terminal at software place receives this control instruction, close with prompting user in terminal demonstration information
This software, it is possible to send interrupt instruction to software, directly terminate the operation of software.
This electric signing tools can be communicated with client by any communication mode, such as
USBkey, audio frequency Key or bluetooth Key etc., communication mode is not construed as limiting by the present invention.USBkey、
Audio frequency Key and the functional similarity of bluetooth Key, be used to protect the number between user and client software
According to interaction, USBkey is connected with terminal by the USB interface of terminal, and audio frequency Key passes through terminal
Audio interface be connected with terminal, bluetooth Key is connected with terminal by blue-tooth device, by USBkey,
Audio frequency Key or bluetooth Key protect the client software that it is corresponding, it is achieved a Key is dual-purpose, with joint
Cost-saving.
Illustrate as a example by audio frequency Key, by audio frequency Key, both for certification, it is possible in the dark to this
Audio frequency Key carries out the client software of data interaction and protects, and its safety and disguise are preferably;
And need not in client software the special timing point that adds to obtain the time interval of data interaction, this
Can be obtained by the data exchange process between the terminal at audio frequency Key and software place completely in embodiment
Take corresponding data interaction time interval, the most hidden, and owing to data interaction inherently software is transported
The essential condition of row, then cannot walk around and distort, and protected effect is more preferable;And owing to audio frequency Key is with soft
It is online operation between the terminal at part place, when finding that software is debugged or attacks, then can pass through audio frequency
The Key terminal to software place sends control instruction to terminate the operation of software.
When protected software receives continual command attack, the electric signing tools got is to being protected
The response time interval of other data that software sends diminishes, then the time interval that other data are corresponding and the
Instant ratio between one response time interval diminishes, and the difference between this instant ratio and typical ratio becomes
Greatly;When protected software meets with reverse Commissioning Analysis, the electric signing tools got is to soft by protection
The response time interval of other data that part sends becomes big, then the time interval and first that other data are corresponding
Instant ratio between response time interval becomes big, and the difference between this instant ratio and typical ratio becomes big,
When the difference between instant ratio and typical ratio being described more than pre-set threshold value, software may meet with continuously
Attack or inversely debug, then all situations about being hacked of software all can find, security performance is high.
The method for protecting software based on electric signing tools that the present embodiment proposes, chooses electric signing tools
Obtain the first response time interval of the first data that protected software is sent by this electric signing tools, obtain
Take this electric signing tools the response time of other data that protected software sends is spaced, and count respectively
Calculate between time interval corresponding to each other data described and described first response time interval immediately than
Value, compares the instant ratio got with the typical ratio preset, the end do not carried by software
The performance of end and the impact of running environment so that the judgement whether being hacked software is more accurate, right
The protected effect of software is more preferable, and the method realizes by electric signing tools, assailant cannot contact with
Get involved, the most just cannot walk around protection, improve the protection intensity to software.
With reference to the second embodiment that Fig. 2, Fig. 2 are present invention method for protecting software based on electric signing tools
Schematic flow sheet.
Based on first embodiment proposition present invention method for protecting software based on electric signing tools second in fact
Execute example, also include before step S10 in the present embodiment:
Step S60, electric signing tools obtains the first number that protected software is sent by this electric signing tools
According to second response time interval;
Step S70, obtains this electric signing tools response time to other data that protected software sends
Interval, and calculate respectively between time interval corresponding to each other data described and described second response time
Ratio between every, using calculated described ratio as typical ratio;
Step S80, preserves described typical ratio.
Protected software can be run in same terminal, between this terminal and electric signing tools, carry out data
Alternately, calculate organize between time interval corresponding to other data and described second response time interval i.e.
Time ratio, and calculate the meansigma methods of instant ratio corresponding between the instant ratio often organized, use try to achieve many
Individual meansigma methods, as typical ratio, preserves this typical ratio got, with use this typical ratio with after
The continuous instant ratio got is compared and is judged that band protection software is the most debugged.
With reference to the 3rd embodiment that Fig. 3, Fig. 3 are present invention method for protecting software based on electric signing tools
Schematic flow sheet.
Based on first embodiment and the second embodiment, present invention software protection based on electric signing tools is proposed
3rd embodiment of method, in the present embodiment after step S40, the method also includes:
Step S90, if the difference between corresponding instant ratio and the corresponding typical ratio of other data described
Less than or equal to pre-set threshold value, then judge whether to have obtained what protected software was sent by this electric signing tools
The response time interval of all data;
If not obtained between the response time of all data that protected software is sent by this electric signing tools
Every, then continue executing with step S20, obtain other data that protected software is sent by this electric signing tools
Response time interval.
If the difference between instant ratio and corresponding typical ratio that other data got are corresponding is less than
Equal to pre-set threshold value, then judge whether that having obtained this electric signing tools owns protected software transmission
The response time interval of data, owns protected software transmission if not obtained this electric signing tools
The response time interval of data, then continue executing with step S20 and i.e. obtain this electric signing tools to being protected
The response time interval of other data that software sends, if corresponding instant of other data got next time
Difference between ratio and corresponding typical ratio is more than pre-set threshold value, then electric signing tools is out of service
Or it is out of service to control protected software to send control instruction;If having obtained this electric signing tools pair
The response time interval of all data that protected software sends, can point out user's running environment good, also
Can continue to detect whether electric signing tools sends the first data to first terminal, if detecting electronic signature
Instrument sends the first data to first terminal and then proceeds step S10.
Third embodiment of the invention is illustrated below by way of citing:
Can be by experiment, the second response of the first data that protected software is sent by electric signing tools
Time interval is set to T1, when this electric signing tools is to the response of other data that protected software sends
Between interval be respectively T2, T3 ... Tn, at calculated electric signing tools, protected software is sent
Ratio T2/T1, T3/T1 between response time interval and the second response time interval of other data ... Tn
/ T1, can detect and organize T1, T2, T3 more ... Tn, organizes T2/T1, T3/T1 to obtain ... Tn/T1, then more
Calculate the meansigma methods organizing ratio more, and the average of relatives value got is preserved as typical ratio;At electricity
Sub-signature instrument be connected to terminal that protected software carried and and this terminal between carry out data interaction
Time, obtain the first response time interval T1 ' of the first data that protected software is sent by electric signing tools,
Then obtain this electric signing tools and the response time of other data that protected software sends be spaced T2 ',
And calculate between time interval corresponding to each other data described and described first response time interval i.e.
Time ratio T2 '/T1 ', obtain the difference of T2 '/between T1 ' and the T2/T1 prestored, when protected software receives
To continual command attack time T2 ' diminish, then T2 '/T1 ' diminishes, and when protected software meets with reverse debugging
During analysis, T2 ' becomes big so that T2 '/T1 ' becomes big, the most no matter T2 '/T1 ' diminish or become greatly can according to T2/
Difference between T1 judges that protected software is the most debugged, then says when this difference is more than pre-set threshold value
This software bright is debugged, then electric signing tools is out of service or sends control instruction to control to be protected
Software is out of service;If the difference of T2 '/between T1 ' and the T2/T1 prestored is less than or equal to pre-set threshold value, then
Continue to obtain T3 ' and be also calculated T3 '/T1 ', if the difference of T3 '/between T1 ' and T3/T1 less than with in advance
If threshold values, then continue to obtain T4, until the Tn ' got/T1 ' is less than or equal to Tn/T1, or calculate
Instant ratio between time interval and described first response time interval that other data of certain arrived are corresponding
More than typical ratio.
Real with reference to first that Fig. 4, Fig. 4 are a kind of software protecting equipment based on electric signing tools of the present invention
Execute the schematic flow sheet of example.
The present embodiment proposes a kind of software protecting equipment based on electric signing tools, including:
Acquisition module 10, obtains the first of the first data that protected software is sent by this electric signing tools
Response time is spaced, and obtains this electric signing tools sound to other data that protected software sends
Answer time interval;
Software operationally and carries out data interaction, such as USBkey and bank between electric signing tools
Between client software, conducting transmission line protects the process of the data interactions such as negotiation, trading signature certification.Should
First data preferably carry out being sent to during for the first time data interaction soft between electric signing tools and software
The data of part, such as the route protection negotiation data between USBkey and client software so that electronics label
Mutual the safest between name instrument and software.
First response time interval refers to that electric signing tools sends the time point of the first data to software and connects
Receive the time interval between the corresponding data of software feedback, can be by arranging meter in electric signing tools
Time device, obtain the first time point that sends of data and the second time point receiving feedback data, obtain
Protected software is sent out by the time interval between first time point and the second time point as electric signing tools
The response time interval of the data sent.
These other data and the first data belong to terminal that protected software carried with the most once run into
Interaction data in journey, the response time interval of other data and the acquisition principle at the first response time interval
Identical, do not repeat them here, be once sent to software protecting equipment on electric signing tools getting
When the response time of data is spaced, calculates the response time interval got and the first response time is spaced it
Between instant ratio.The response time of these other data is spaced time interval corresponding to first and is electronics label
The time interval of data interaction is carried out, this first response between the software carried on name instrument and same terminal
Time interval is the time interval carrying out data interaction the most successively between software and terminal, and is not specific to soft
Time interval during for the first time data interaction is carried out between part and terminal, for the security consideration of software, first
Time interval preferably carries out response time interval during data interaction for the first time between software and terminal.
Computing module 20, for calculating time interval corresponding to each other data described and described first sound
Answer the instant ratio between time interval;
Described acquisition module 10 is additionally operable to according to each other data described preset and corresponding typical ratio
Between mapping relations, obtain the typical ratio that each other data described are corresponding;
Can be prestored correspondingly typical ratio corresponding to other data, removes the first data electric signing tools
The response time of other data that protected software sends is spaced all to having a typical ratio, this mark
Quasi-ratio can be obtained by many experiments.
Control module 30, if for the corresponding instant ratio and corresponding typical ratio of other data described it
Between difference more than pre-set threshold value, then control electric signing tools out of service or send control instruction with
Control protected software out of service.
Error between typical ratio and the instant ratio corresponding to other data got can be set, make
For confidence interval, if the corresponding time interval that electric signing tools is to other data that protected software sends
And the difference between instant ratio and the typical ratio between very first time interval is more than threshold values, i.e. beyond putting
When letter is interval, then it is assumed that now software has debugged risk, then control module 30 controls this electronic signature
Instrument is out of service or transmission control instruction is out of service to control protected software, and control module 30 is controlled
Make this electric signing tools out of service by this electric signing tools being set to refusal responsive state,
Any instruction being not responding to software transmission the most not and carries out any data exchange process between software, or controls
This electric signing tools power-off;It is out of service to control protected software that control module 30 sends control instruction,
Can be by sending control instruction software to software, after the terminal at software place receives this control instruction,
Terminal demonstration information closes this software with prompting user, it is possible to send interrupt instruction to software, directly
Terminate the operation of software.
This electric signing tools can be communicated with client by any communication mode, such as
USBkey, audio frequency Key or bluetooth Key etc., communication mode is not construed as limiting by the present invention.USBkey、
Audio frequency Key and the functional similarity of bluetooth Key, be used to protect the number between user and client software
According to interaction, USBkey is connected with terminal by the USB interface of terminal, and audio frequency Key passes through terminal
Audio interface be connected with terminal, bluetooth Key is connected with terminal by blue-tooth device, by USBkey,
Audio frequency Key or bluetooth Key protect the client software that it is corresponding, it is achieved a Key is dual-purpose, with joint
Cost-saving.
Illustrate as a example by audio frequency Key, by audio frequency Key, both for certification, it is possible in the dark to this
Audio frequency Key carries out the client software of data interaction and protects, and its safety and disguise are preferably;
And need not in client software the special timing point that adds to obtain the time interval of data interaction, this
Can be obtained by the data exchange process between the terminal at audio frequency Key and software place completely in embodiment
Take corresponding data interaction time interval, the most hidden, and owing to data interaction inherently software is transported
The essential condition of row, then cannot walk around and distort, and protected effect is more preferable;And owing to audio frequency Key is with soft
It is online operation between the terminal at part place, when finding that software is debugged or attacks, then can pass through audio frequency
The Key terminal to software place sends control instruction to terminate the operation of software.
When protected software receives continual command attack, the electric signing tools got is to being protected
The response time interval of other data that software sends diminishes, then the time interval that other data are corresponding and the
Instant ratio between one response time interval diminishes, and the difference between this instant ratio and typical ratio becomes
Greatly;When protected software meets with reverse Commissioning Analysis, the electric signing tools got is to soft by protection
The response time interval of other data that part sends becomes big, then the time interval and first that other data are corresponding
Instant ratio between response time interval becomes big, and the difference between this instant ratio and typical ratio becomes big,
When the difference between instant ratio and typical ratio being described more than pre-set threshold value, software may meet with continuously
Attack or inversely debug, then all situations about being hacked of software all can find, security performance is high.
The software protecting equipment based on electric signing tools that the present embodiment proposes, chooses electric signing tools
Obtain the first response time interval of the first data that protected software is sent by this electric signing tools, obtain
Take this electric signing tools the response time of other data that protected software sends is spaced, and count respectively
Calculate between time interval corresponding to each other data described and described first response time interval immediately than
Value, compares the instant ratio got with the typical ratio preset, the end do not carried by software
The performance of end and the impact of running environment so that the judgement whether being hacked software is more accurate, right
The protected effect of software is more preferable, and the method realizes by electric signing tools, assailant cannot contact with
Get involved, the most just cannot walk around protection, improve the protection intensity to software.
Real with reference to second that Fig. 5, Fig. 5 are a kind of software protecting equipment based on electric signing tools of the present invention
Execute the schematic flow sheet of example.
Based on first embodiment proposition present invention software protecting equipment based on electric signing tools second in fact
Executing example, the most described acquisition module 10 is additionally operable to electric signing tools and obtains this electronic signature work
Has the second response time interval to the first data that protected software sends;Obtain this electric signing tools
Response time interval to other data that protected software sends;Computing module 20 is additionally operable to calculate respectively
Ratio between time interval and described second response time interval that each other data described are corresponding, will
Calculated described ratio is as typical ratio;This software protecting equipment also includes memory module 40, uses
In preserving described typical ratio.
Protected software can be run in same terminal, between this terminal and electric signing tools, carry out data
Alternately, calculate organize between time interval corresponding to other data and described second response time interval i.e.
Time ratio, and calculate the meansigma methods of instant ratio corresponding between the instant ratio often organized, use try to achieve many
Individual meansigma methods, as typical ratio, preserves this typical ratio got, with use this typical ratio with after
The continuous instant ratio got is compared and is judged that band protection software is the most debugged.
Real with reference to the 3rd that Fig. 6, Fig. 6 are a kind of software protecting equipment based on electric signing tools of the present invention
Execute the schematic flow sheet of example.
Based on first embodiment proposition present invention software protecting equipment based on electric signing tools second in fact
Execute example, in the present embodiment, also include judge module 50, if for corresponding instant of other data described
Difference between ratio and corresponding typical ratio is less than or equal to pre-set threshold value, then judge whether to have obtained this
The response time interval of all data that protected software is sent by electric signing tools;Described acquisition module
If 10 when being additionally operable to the response not obtained all data that protected software is sent by this electric signing tools
Between be spaced, then when continuing to obtain this electric signing tools to the response of other data that protected software sends
Between be spaced.
If the difference between instant ratio and corresponding typical ratio that other data got are corresponding is less than
Equal to pre-set threshold value, then judge module 50 judges whether to have obtained this electric signing tools to protected software
The response time interval of all data sent, if judge module 50 is thought has not obtained this electronic signature work
Have the response time interval to all data that protected software sends, then acquisition module 10 continuation acquisition should
The response time of other data that protected software sends is spaced, if getting next time by electric signing tools
Corresponding instant ratio and the corresponding typical ratio of other data between difference more than pre-set threshold value, then
Control module 30 control electric signing tools out of service or send control instruction to control protected software
Out of service;If judge module 50 judges to have obtained the institute that protected software is sent by this electric signing tools
The response time having data is spaced, and user's running environment can be pointed out good, it is possible to continue detecting electronic signature
Whether instrument sends the first data to first terminal, sends to first terminal if detecting electric signing tools
First data then acquisition module 10 obtains the first data that protected software sends by this electric signing tools
First response time interval.
Third embodiment of the invention is illustrated below by way of citing:
Can be by experiment, the second response of the first data that protected software is sent by electric signing tools
Time interval is set to T1, when this electric signing tools is to the response of other data that protected software sends
Between interval be respectively T2, T3 ... Tn, the calculated electric signing tools of computing module 20 is to being protected
Software send other data response time interval with the second response time be spaced between ratio T2/T1,
T3/T1 ... Tn/T1, can detect and organize T1, T2, T3 more ... Tn, organizes T2/T1, T3/T1 to obtain more ...
Tn/T1, then calculate the meansigma methods organizing ratio more, and the average of relatives value got protected as typical ratio
Exist in memory module 40;Electric signing tools be connected to terminal that protected software carried and with this
When carrying out data interaction between terminal, acquisition module 10 obtains electric signing tools and sends protected software
The first data first response time interval T1 ', then obtain this electric signing tools to protected software
The response time interval T2 ' of other data sent, computing module 20 calculates each other data pair described
Instant ratio T2 '/T1 ' between time interval and the described first response time interval answered, acquisition module 10
Obtain the difference of T2 '/between T1 ' and the T2/T1 prestored, attack when protected software receives continual command
Time T2 ' diminish, then T2 '/T1 ' diminishes, and T2 ' becomes big when protected software meets with reverse Commissioning Analysis,
Making T2 '/T1 ' become big, the most no matter T2 '/T1 ' diminishes or becomes to come according to the difference between T2/T1 greatly
Judge that protected software is the most debugged, then illustrate that this software is debugged when this difference is more than pre-set threshold value,
Then control module 30 electric signing tools is out of service or transmission control instruction is stopped to control protected software
Only run;If the difference of T2 '/between T1 ' and the T2/T1 prestored is less than or equal to pre-set threshold value, then obtain mould
Block 10 continues to obtain T3 ' and is also calculated T3 '/T1 ', if the difference of T3 '/between T1 ' and T3/T1 is less than
With pre-set threshold value, then continue to obtain T4, until the Tn ' got/T1 ' is less than or equal to Tn/T1, or
Calculate between time interval corresponding to certain other data of arriving and described first response time interval is instant
Ratio is more than typical ratio.
The present invention also proposes a kind of electric signing tools, comprises the software protecting equipment described in above example.
The foregoing is only the preferred embodiments of the present invention, not thereby limit the scope of the claims of the present invention,
Every equivalent structure transformation utilizing description of the invention and accompanying drawing content to be made, or directly or indirectly use
In the technical field that other are relevant, the most in like manner it is included in the scope of patent protection of the present invention.
Claims (5)
1. a method for protecting software based on electric signing tools, it is characterised in that the method includes:
Electric signing tools obtains the second of the first data that protected software is sent by this electric signing tools
Response time is spaced;
Obtain this electric signing tools the response time of other data that protected software sends is spaced, and
Calculate respectively between time interval corresponding to each other data described and described second response time interval
Ratio, using calculated described ratio as typical ratio;
Preserve described typical ratio;
Electric signing tools obtains the first of the first data that protected software is sent by this electric signing tools
Response time is spaced;
Electric signing tools obtains the response to other data that protected software sends of this electric signing tools
Time interval, and calculate respectively between time interval corresponding to other data described and described first response time
Instant ratio between every;
Electric signing tools closes according to the described mapping between other data and corresponding typical ratio preset
System, obtains the typical ratio that each other data described are corresponding;
If the difference between instant ratio and corresponding typical ratio that other data described are corresponding is more than presetting
Threshold values, then electric signing tools is out of service or sends control instruction to control protected software stopping fortune
OK.
Method the most according to claim 1, it is characterised in that electric signing tools according to preset
Each described mapping relations between other data and corresponding typical ratio, obtain each other numbers described
After step according to corresponding typical ratio, the method also includes:
If the difference between instant ratio and corresponding typical ratio that other data described are corresponding less than or etc.
In pre-set threshold value, then judge whether to have obtained all numbers that protected software is sent by this electric signing tools
According to response time interval;
If not obtained between the response time of all data that protected software is sent by this electric signing tools
Every, then continue to obtain between this electric signing tools response time to other data that protected software sends
Every.
3. a software protecting equipment based on electric signing tools, it is characterised in that described software protection
Plant running is in described electric signing tools, and described software protecting equipment includes:
Acquisition module, obtains what protected software was sent by this electric signing tools for electric signing tools
Second response time interval of the first data;Obtain that protected software sends by this electric signing tools its
The response time interval of his data;It is corresponding that computing module is additionally operable to calculate each other data described respectively
Time interval and described second response time interval between ratio, using calculated described ratio as
Typical ratio;This software protecting equipment also includes memory module, is used for preserving described typical ratio;Obtain
First response time interval of the first data that protected software is sent by this electric signing tools, and obtain
Take this electric signing tools the response time of other data that protected software sends is spaced;
Computing module, for calculating time interval corresponding to other data described and described first response time
Instant ratio between interval;
Described acquisition module be additionally operable to according to each other data described preset and corresponding typical ratio it
Between mapping relations, obtain the typical ratio that other data described are corresponding;
Control module, if between instant ratio and the corresponding typical ratio that other data described are corresponding
Difference more than pre-set threshold value, then control electric signing tools out of service or send control instruction with control
Protected software processed is out of service.
Device the most according to claim 3, it is characterised in that this device also includes judge module,
If for the difference between instant ratio and corresponding typical ratio that other data described are corresponding less than or etc.
In pre-set threshold value, then judge whether to have obtained all numbers that protected software is sent by this electric signing tools
According to response time interval;If described acquisition module is additionally operable to not obtain this electric signing tools to being protected
Protect the response time interval of all data that software sends, then continue to obtain this electric signing tools to being protected
Protect the response time interval of other data that software sends.
5. an electric signing tools, it is characterised in that comprise the software protection described in claim 3-4
Device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310400186.5A CN103473486B (en) | 2013-09-04 | 2013-09-04 | Method for protecting software based on electric signing tools, device and electric signing tools |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310400186.5A CN103473486B (en) | 2013-09-04 | 2013-09-04 | Method for protecting software based on electric signing tools, device and electric signing tools |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103473486A CN103473486A (en) | 2013-12-25 |
CN103473486B true CN103473486B (en) | 2016-09-28 |
Family
ID=49798333
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310400186.5A Expired - Fee Related CN103473486B (en) | 2013-09-04 | 2013-09-04 | Method for protecting software based on electric signing tools, device and electric signing tools |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103473486B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1912882A (en) * | 2005-08-12 | 2007-02-14 | 李东声 | Electronic signature control device and control method |
CN101261667A (en) * | 2008-04-10 | 2008-09-10 | 北京深思洛克数据保护中心 | A software protection method |
CN101290649A (en) * | 2008-05-19 | 2008-10-22 | 北京深思洛克数据保护中心 | Software protector with time valve protection and its realization method |
CN101561858A (en) * | 2008-04-17 | 2009-10-21 | 爱特梅尔公司 | Cryptographic authentication apparatus, systems and methods |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8181244B2 (en) * | 2006-04-20 | 2012-05-15 | Webroot Inc. | Backward researching time stamped events to find an origin of pestware |
-
2013
- 2013-09-04 CN CN201310400186.5A patent/CN103473486B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1912882A (en) * | 2005-08-12 | 2007-02-14 | 李东声 | Electronic signature control device and control method |
CN101261667A (en) * | 2008-04-10 | 2008-09-10 | 北京深思洛克数据保护中心 | A software protection method |
CN101561858A (en) * | 2008-04-17 | 2009-10-21 | 爱特梅尔公司 | Cryptographic authentication apparatus, systems and methods |
CN101290649A (en) * | 2008-05-19 | 2008-10-22 | 北京深思洛克数据保护中心 | Software protector with time valve protection and its realization method |
Non-Patent Citations (2)
Title |
---|
一种基于USB Key加解密技术的软件保护方案研究;王玮;《信息网络安全》;20120531;全文 * |
软件防篡改技术综述;王朝坤等;《计算机研究与发展》;20110630;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN103473486A (en) | 2013-12-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11288400B2 (en) | Method, transmitter, and receiver for authenticating and protecting the integrity of message contents | |
CN106534160A (en) | Identity authentication method and system based on block chain | |
CN109272617B (en) | Unlocking verification method, server, door lock, electronic device and storage medium | |
WO2004057444A3 (en) | Using trusted communication channel to combat user name/password theft | |
WO2002003178A3 (en) | Method and apparatus for network assessment and authentication | |
CN105471815A (en) | Internet-of-things data security method and Internet-of-things data security device based on security authentication | |
CN105450592A (en) | Safety verification method and device, server and terminal | |
CN105045695A (en) | Method and system for protecting chips in process of entering test mode | |
Eyisi et al. | Energy-based attack detection in networked control systems | |
CN106127034B (en) | A kind of method, apparatus that anti-locking system is maliciously closed and electronic equipment | |
CN103473486B (en) | Method for protecting software based on electric signing tools, device and electric signing tools | |
CN103336918B (en) | Electronic hard disk system authorization method and device | |
CN105653908B (en) | A kind of implicit anti-debug guard method | |
CN104298908A (en) | Information processing method and electronic equipment | |
CN105227583A (en) | A kind of key encryption method and system, electronic equipment | |
WO2004090701A3 (en) | Physical presence determination in a trusted platform | |
CN117650878A (en) | Side channel security assessment method based on distribution prediction | |
CN102647415A (en) | Audio-interface-based method and system for providing identity authentication | |
HK1199774A1 (en) | Server-based login system, login server and authentication method for the same | |
CN116361835A (en) | Privacy authorization method and device, equipment, medium and product thereof | |
CN108270570A (en) | A kind of touch screen hardware identification facility | |
CN107438078B (en) | Application safety protection system and method | |
CN104268165A (en) | Online query method and equipment | |
CN105577366B (en) | Sound wave based on embedded device generates and recognition methods | |
CN106022111B (en) | Processing method and device for hiding pop-up window and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160928 |
|
CF01 | Termination of patent right due to non-payment of annual fee |