Server and software protection method and system

A server-side, software protection technology, applied in the direction of program/content distribution protection, equipment, user identity/rights verification, etc., can solve the problem of client-side program security threatening server-side applications and data, etc., to ensure security and protect On the server side, the effect of ensuring security

Active Publication Date: 2007-07-25
FEITIAN TECHNOLOGIES
View PDF4 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the software systems of the above two structures, there has been no good method to solve
[0004] The problem of theft of server-side software, once the server-side software is copied, not only poses a threat to the security of the client program, but also poses a huge challenge to the security of server-side applications and data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Server and software protection method and system
  • Server and software protection method and system
  • Server and software protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] As shown in Figure 1, in this embodiment, the client program contains a public key P1, and the server-side smart key device contains a corresponding private key S1, and the server uses an impulse response mechanism to verify the client.

[0046] The specific verification steps are as follows:

[0047] Step 101: the client accesses the server;

[0048] Step 102: The server side checks whether the smart key device exists, if there is, execute step 103, otherwise execute step 104;

[0049] Step 103: the server side requests a random character string from the client side;

[0050] Step 104: The server prompts an error that the smart key device is not found;

[0051] Step 105: After the client generates a random string and processes it with the HMAC-Hash algorithm, it encrypts it with the public key P1 and sends it to the server;

[0052] Step 106: The server sends the encrypted result of the random character string in the received content to the smart key device, and dec...

Embodiment 2

[0065] As shown in Figure 2, in this embodiment, the client program contains a public key P1, and the server-side smart key device contains a corresponding private key S1, and the server-side and client-side databases preset HMAC-Hash algorithm. Because the client lacks functions, data, and codes, in this embodiment, the client needs the server to provide data, and does not need to use the relevant algorithms in the server-side smart key device.

[0066] The specific steps of client-server communication are as follows:

[0067] Step 201: the client program randomly generates a session key, encrypts the data request with the session key, encrypts the session key with the public key P1, and sends it to the server;

[0068] Step 202: the server sends the encrypted session key to the smart key device;

[0069] Step 203: The smart key device uses the private key S1 to decrypt to obtain the session key, and sends it to the server;

[0070] Step 204: the server uses the session ke...

Embodiment 3

[0077] As shown in FIG. 3 , in this embodiment, the client needs the server to provide data, and the server is a legitimate server and requires the participation of relevant algorithms in the server-side smart key device.

[0078] Step 301, the client program randomly generates a session key, encrypts the data request with the session key, encrypts the session key with the public key P1, and sends it to the server;

[0079] Step 302: the server sends the encrypted session key to the smart key device;

[0080] Step 303: The smart key device uses the private key S1 to decrypt to obtain the session key, and sends it to the server;

[0081] Step 304: the server decrypts the request with the session key, and processes the request content;

[0082] Step 305: Run to the place where the relevant algorithm is needed, and transfer from the server to the smart key device to continue running with the help of the relevant algorithm;

[0083] Step 306: the smart key device sends the runni...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method combines server end with intelligent cipher key device. Network communication is carried out between server end and client end under C/S or B/S structure. ID of client end is authenticated by server end. Program at client end runs and generates session key. Client end sends service request encrypted by session key to server end, and sends session key encrypted by public key. After receiving encrypted service request, server end runs service corresponding to client end, and returns session key encrypted run result to the client end. The server end is bound to the intelligent cipher key device, which is safety carrier capable of preventing interpolating and embezzling internal information. Intelligent cipher key device allows private key used inside equipment. The private key cannot be reproduced and attacked to enhance security of software at server end.

Description

technical field [0001] The invention belongs to the scope of network software copyright protection, and specifically relates to a server-side software protection method and system for software copyright protection by installing an intelligent key device on the server side. Background technique [0002] In the prior art, the system structure of the network-based software system mainly includes two types of C / S structure and B / S structure. [0003] C / S (Client / Server) structure, that is, client / server structure; B / S (Browser / Server) structure, that is, browser / server structure. Among them, the B / S structure is developed on the basis of the C / S structure, and the browser end is essentially a client program, which converts HTML scripts into a visual interface. Through these two structures, the advantages of the hardware environment at both ends can be fully utilized, and the tasks can be reasonably allocated to the client or the browser and the server for implementation, reduci...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06F21/22G06F21/12
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products