Method, device and system for installing software

A technology of software installation and software, which is applied in the computer field, can solve problems such as illegal copying of software, leakage of user secrets, and loss of users, and achieve the effects of copyright protection, avoidance of leakage, and protection of interests

Inactive Publication Date: 2009-06-03
FEITIAN TECHNOLOGIES
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the course of practice, the inventor finds that there are at least the following problems in the prior art: since the registry of the computer operating system exists in the form of operating system software, it is easy to be cracked. The software is directly copied to another computer, and the registry of the operating system of the other computer is modified accordingly, so that the copied software can be used directly in another computer, resulting in illegal copying of the software
If the existing technology is used to install the software, once the financial software installed on the computer is maliciously copied, the financial software may be used on another computer, and at the same time, the users contained in the financial software can be seen from another computer. Confidentiality, resulting in leakage of user confidentiality and loss to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for installing software
  • Method, device and system for installing software
  • Method, device and system for installing software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] In order to make the software installed on the computer difficult to be illegally copied to other computers for use, the embodiment of the present invention provides a software installation method, such as figure 1 As shown, the method includes:

[0030] 101. Obtain the feature information of the computer hardware after starting the software installation program. The installation program mentioned here generally needs to complete the installation process. For example, the currently commonly used setup.exe program is the installation program mentioned in this embodiment.

[0031] 102. Generate a key according to the acquired feature information of the computer hardware according to certain rules.

[0032] 103. Use the key generated above to encrypt the software, mainly to encrypt important data in the software, such as: encrypt the kernel of the software or the user's secrets in the software.

[0033] 104. Installing the above-mentioned encrypted software on a computer,...

Embodiment 2

[0040] In order to introduce the technical solution adopted by the present invention more clearly, the present invention will be further described in detail below in conjunction with the software installation under the condition that the smart key device is connected to the computer. like image 3 As shown, the software installation method provided in this embodiment includes:

[0041] 301. Start the installation program of the software. The installation program mentioned here generally needs to complete the installation process. For example, the currently commonly used setup.exe program is the installation program mentioned in this embodiment.

[0042] 302. Detect whether a smart key device is connected to the computer. If there is a smart key device connected to the computer, perform the process of 303; if the computer is not connected to the smart key device, perform the process of 310.

[0043] By detecting whether the computer is connected with the smart key device, the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, a device and a system for installing software, relates to the technical field of computers, and solves the problem that after being installed on one computer, the software can be easily copied to another computer for use in the prior art. The embodiment of the invention comprises the following steps: acquiring the characteristic information of computer hardware when the software is run; generating keys based on the acquired characteristic information; then, encrypting the software by the generated keys; and finally, installing the encrypted software on the computer. The embodiment of the invention is suitable for running various software, particularly the software requiring copyright protection and classified information protection.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method, device and system for installing software on a computer. Background technique [0002] The software in the computer generally needs to be correctly installed in the computer before it can be used correctly. At present, in the process of installing the software to the computer, it is generally necessary to input the serial number, and when the input sequence is correct, the software is registered in the registry of the computer operating system, so that the software and the computer are associated, so as to avoid not going through the installation process. Just use the software directly. In this way, if the software installed in one of the computers is directly copied to another computer, the copied software cannot be used directly in the other computer, thereby achieving the purpose of protecting the software copyright. [0003] In the course of practice, the invent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F9/445G06F21/51
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products