摘要:
A USB Key and a method for communication between the USB Key and a terminal are provided, of which the USB Key includes an interface module, a power module and an MCU module. The MCU module is configured to make initialization setting after power on, check for power level status of each mode pin in the MCU module, and in case of the power level status conforms to a first predetermined condition, set the pin for serial interface communication in the MCU module to a high impedance state, configure a USB function, receive a request for enumerating the device being initiated by a terminal connecting to the interface module, and after enumeration, perform USB communication with the terminal; and in case that the power level status conforms to a second predetermined condition, set a pin for performing USB communication in the MCU module to high impedance state, set the serial interface function, initiate a request for enumerating the device to the terminal connecting to the interface module, and after enumeration, perform a serial-interface communication with the terminal. The USB Key in the invention is able to be compatible with a USB interface and a serial interface.
摘要:
The present disclosure discloses a protecting method and system of Java source code. When a first initiating class is invoked, the method comprises following steps, wherein the first initiating class is an initiating class of Java program: the first initiating class decrypts first cipher data to obtain a class loader; the class loader reads second cipher data to the memory and decrypts the second cipher data to obtain a first class, wherein the first class is a class run by a Java virtual machine, and the suffix of the first class is .class; the class loader loads a second initiating class to the memory; wherein the second initiating class is an original class in jar packet of the Java program; and the class loader loads the first class to the Java virtual machine so that the Java virtual machine can invoke a main interface in the second initiating class to run the Java program. The present disclosure can protect Java source code and make it difficult to decompile the Java source code.
摘要:
A method and system for program protection based on a .NET card. The method includes compiling, by a first device, first source code into a first assembly, and storing the first assembly to a .NET card. Information of a remotely invoked class in the first source code is extracted to form a new class. A remote invocation instruction is written in the new class to generate second source code. The second source code is compiled into a second assembly, and the .NET card and the second assembly are provided to a second device. The second device executes the second assembly, remotely invoking the class in the first source code, executing the class at the .NET card via an interface of the .NET card, and receiving an execution result returned by the .NET card. The system includes a .NET card, a first device and a second device.
摘要:
A key device with external storage and its method of use, which relates to the computer security technology field, is disclosed herein. The key device with external storage consists of a micro-controller unit and an off-chip mass storage. The micro-controller unit comprises a host interface module, a CPU, a key data storage module, a firmware program storage module, and an off-chip mass storage interface module. The method of using the key device with external storage includes: the key device builds connection with the host and reports itself as a mass storage device; the host starts the application program; and the user uses and manages the information. The usability of the key device is improved by adding off-chip mass storage in the key device, which makes the user use and manage the files in the key device easily as well.
摘要:
The present invention relates to a production security control apparatus for software products and the control method thereof. The present invention uses security control devices to control the production process for software products, which ensures that the production process cannot proceed without appropriate security control device. There are many ways to embody the present invention and the security level can be customized. The device is simple and easy to use. In addition, the leak of protected code can be prevented—because the data in the production host is not copied to the dongle directly, unauthorized dongles cannot work with the software itself directly. Moreover, the unauthorized production of dongles can be prevented as well—the production number of dongles is also restricted by the developer, which ensures that illegal bulk production cannot occur without authorization.
摘要:
A method for calibrating a temperature float of a one time password token and a device thereof are provided in the invention relating to the information security field. The method includes steps: the one time password token measures a current ambient temperature at intervals of a first predetermined time, retrieves a data table for a characteristic value relating to the measured temperature, and calibrates a current time value inside the token according to the characteristic value at intervals of a second predetermined time. The one time password token includes a timer module, a measuring module, a retrieving module, a table storing module, a calibrating module, a triggering module, a generating module and a displaying module. The invention calibrates time differentiation of the one time password token caused by the temperature float.
摘要:
The invention discloses a method and system for implementing automatic installation of a key device, and relates to the field of smart card. The method includes steps of: establishing, by the key device, a connection with a computer; declaring to the computer that the key device itself is a compound device containing a USB keyboard device; sending a predefined first keyboard message sequence to the computer, wherein the first keyboard message sequence is used for starting an operation environment of the computer; converting, after the operation environment is started, a pre-stored script instruction for running an installation program into a second keyboard message sequence, and sending the second keyboard message sequence to the computer; sending a predefined third keyboard message sequence to the computer, wherein the third keyboard message sequence is used for running the installation program. The system includes a key device and a computer. According to the invention, by way of interaction between the key device and the computer, the technical problem that the key device can not be installed automatically in the case that the autorun function of the Windows system is shielded is solved, thereby facilitating automatic installation of the key device.
摘要:
The present invention discloses a method and apparatus for protecting .net programs, relating to software protection. The method mainly includes: selecting a binary code segment from a .net program; transforming the binary code segment, and removing it from the .net program; writing the binary code segment to a shell of the .net program, and writing a shell calling instruction to the .net program; and executing the .net program, and calling a .net virtual machine to execute the binary code segment. The apparatus includes a selecting module, a transforming and removing module, a writing module, and an executing module. The programs running on the .net platform can be protected simply by being transformed.
摘要:
The invention discloses a method for loading double e-wallets, relating to the information security field. The method includes steps of entering into a contactless inductive area of a terminal by the CPU card; being powered on and initialized, synchronizing a first e-wallet and a second e-wallet by the CPU card; receiving and executing INITIALIZE FOR LOAD instruction sent by the terminal, and returning a response message of INITIALIZE FOR LOAD instruction to the terminal, by the CPU card; receiving the response message of INITIALIZE FOR LOAD instruction and sending data in the response message of INITIALIZE FOR LOAD instruction, to a host, by the terminal; receiving and storing the data, sending LOAD allowing message to the terminal, by the host; receiving LOAD allowing message and sending LOAD instruction to the CPU card, by the terminal; receiving LOAD instruction, performing loading operation on the second e-wallet, refreshing balance of the first e-wallet and returning the response message of LOAD instruction, to the terminal, by the CPU card. (FIG. 3)
摘要翻译:本发明公开了一种用于装载双电子钱包的方法,涉及信息安全领域。 该方法包括以下步骤:通过CPU卡进入终端的非接触式感应区域; 上电和初始化,由CPU卡同步第一电子钱包和第二电子钱包; 接收并执行由终端发送的用于LOAD指令的INITIALIZE FOR,并且由CPU卡向终端返回INITIALIZE FOR LOAD指令的响应消息; 接收INITIALIZE FOR LOAD指令的响应消息,并在终端向主机发送INITIALIZE FOR LOAD指令的响应消息中的数据; 主机接收和存储数据,向终端发送LOAD允许消息; 通过终端接收LOAD允许消息并向CPU卡发送LOAD指令; 接收LOAD指令,通过CPU卡向终端执行对第二电子钱包的加载操作,第一电子钱包的刷新余额和返回LOAD指令的响应消息。 (图3)
摘要:
A method for time source calibration, wherein the method comprises steps of sending a requirement for obtaining time by a client side computer to a server side; sending a first data packet including time and generated verification information by the server side to a key device via the client side computer; said time is the current time of the server side; calibrating time of key device with the obtained as benchmark time and counting time normally by the key device; sending a second data packet including calibrated current time of the key device and the verification information by the key device to the server side via the client side computer; and obtaining the current time of the key device in the second data packet by the key device after the verification information in the second data packet is verified to be valid by the key device. According to the present invention, the reliable time source is obtained, which secures the security of the trade.