Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software encrypting registration piracy-preventing method

A software encryption, anti-piracy technology, applied in the direction of instruments, program/content distribution protection, electronic digital data processing, etc., can solve the problem of difficult to prevent pirates from obtaining registration codes.

Inactive Publication Date: 2007-12-05
侯同济
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, as long as pirates obtain the application software installation program and its matching registration code, they can copy and copy without restriction. In fact, it is difficult for application software developers to prevent pirates from obtaining the application software installation program and its matching registration code.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software encrypting registration piracy-preventing method
  • Software encrypting registration piracy-preventing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Taking the implementation process of the anti-piracy method of encrypted registration based on the volume number of the disk partition as an example, as shown in FIG. 1 , this encrypted registration anti-piracy method can also be used for other hardware feature codes. The disk partition volume number of the computer system is a 4-byte random integer, which is generated when the disk partition is formatted, has a very low recurrence rate, and is usually used as a sign of the disk partition. Encrypting the software system through the volume number of the computer system disk partition has become a method to protect software copyright.

[0052] After the application software is started, the registration information of the application software is first read from the registry of the computer system and checked. If the user's computer has not registered the application software or the registration information is wrong, the application software encrypts the user's computer har...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a pirate edition resisting method of coded register software, which comprises the following steps: making user end code to generate sequence code with implicit applying software and computer hardware information at the first time; regarding the sequence code as user's mark code to apply for credit to use register code; coding the legal user to generate a new sequence code through credit end; analyzing the implicit limit information of software and user mark code into the information of applying software and computer hardware; feedbacking the information as register code to the user end; using software user end to store the register code to analyze and detect the register code during operating stage; affirming whether the software is stopped. The invention adopts key character list to group, rearrange and repair to code the random number, which increases the decoding difficulty of code to prevent software edition from embezzling.

Description

technical field [0001] The invention relates to an anti-piracy method for encrypting and registering application software on a Windows operating system, which adopts a method for generating encrypted information plain codes through an encryption algorithm, and belongs to the technical field of encryption. Background technique [0002] At present, there are many computer application software anti-piracy technologies, methods and products, but the anti-piracy methods of application software can be generally divided into two categories: hardware methods and software methods. [0003] The hardware method is generally by purchasing a professional anti-piracy encryption card (commonly known as a software dog) product provided by a third-party software anti-piracy company. The application software developer adds the relevant information of the application software to the encryption card and sells the encryption card and the application software together. This software anti-piracy t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F21/12
Inventor 侯同济
Owner 侯同济
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products