Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for realizing software protection in software protector

A software protection device and software protection technology, applied in computer security devices, platform integrity maintenance, instruments, etc., can solve the problems of heavy workload, cumbersome, and high requirements for developers, and achieve the effect of reducing difficulty and achieving protection.

Active Publication Date: 2009-02-11
FEITIAN TECHNOLOGIES
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that this process is quite cumbersome, the workload is relatively large, and the requirements for developers are relatively high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for realizing software protection in software protector
  • Method and device for realizing software protection in software protector
  • Method and device for realizing software protection in software protector

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Please see figure 1 , is a flow chart of setting software encryption in the first embodiment of the present invention. In this embodiment, the software protection device is a dongle, and the X86 virtual machine has been implemented in the dongle, so that the executable files running on the X86 series computer can be executed on the dongle, so that the subsequent simplification The process of software protection creates conditions. In the prior art, there are many ways to implement the X86 virtual machine on the dongle, so no detailed description will be given here. The following combination figure 1 Describe in detail the process of setting software encryption. For ease of understanding, this embodiment is described in combination with a specific program.

[0040] Step S101, selecting an executable file to be protected.

[0041] The executable file to be protected is an executable file obtained by running programs written in various high-level languages, assembly l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention has provided a method to realize the protection to the software in the software protection installation, to realize the software protection installation to the X86 hypothesized machines. It includes: Firstly, a direction segment will be chosen out from the executable files of the program, which needs to be protected, and the storage cell name used by this direction segment will be transformed to the storage cell name of the hypothesized machine of the software protection installation. The direction segment after being transformed will be read in the software protection installation, the original direction segment chosen will be deleted, and the communication direction will be read in. when we carry on the program being protected and the direction segment to read in the software protection installation is executed, the following steps will be carried out: Firstly, the storage cell content involved by the direction segment to read in the software protection installation will be reflected to the storage cell corresponding to the hypothesized machine of the software protection installation from the main machine. And it will be carried on by the software protection installation. The storage cell content of the hypothesized machine of the software protection installation will be reflected to the storage cell corresponding to the main machine, after the direction segment has been executed. This invention has also publicized an installation to realize the method.

Description

technical field [0001] The invention relates to software protection technology, in particular to a method for realizing software protection in a software protection device. The invention also provides a device for realizing the method. Background technique [0002] The principle of the existing software protection device to protect software is to write the core program in the software into the software protection device, and not keep a copy of this part of the program on the host. For example, a software encryption lock is a typical software protection device. The software encryption lock itself is a hardware with program processing and certain storage capabilities, and has a parallel port or a universal serial bus interface to connect with the host computer. Authorized use and prevention of illegal copying and distribution. However, existing software protection devices such as software encryption locks can run C51 instructions but cannot run X86 instructions. Therefore, w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/22G06F21/52
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES