Method for protecting computer software

A software protection and computer technology, applied in the field of information security, can solve problems such as illegal duplication, loss of software users and confidential information, software or software is easy to be artificially and illegally tampered with, and achieve the effect of increasing the difficulty of cracking and improving security

Active Publication Date: 2009-09-23
FEITIAN TECHNOLOGIES
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In today's increasingly developed information technology, more and more software that contains data information and involves personal privacy and business secrets is running on the computer, and the software or the software itself running on the computer is easy to be illegally tampered with or illegally copied due to piracy , bringing huge economic losses to software users or developers, and also making it impossible to continue further work
[0004] In practical applications, there have been instances where the software running in the computer is bound to the smart key device connected to the computer to improve the security of the software running in the computer. However, currently some software containing highly confidential information can only allow It runs on a specific computer or computers within a specific range. Therefore, if an illegal user obtains the software and the smart key device bound to the software through improper means, the confidential software can be used on other computers, giving software users and Confidential Information Brings Huge Loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting computer software
  • Method for protecting computer software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] A method for protecting computer software, wherein the software runs on a client computer, the client computer and the server computer are connected to a smart key device, and the IP address is transmitted through the smart key device, such as figure 1 As shown, the specific steps include:

[0031] Step 101, the first smart key device is connected to the server computer, and the second smart key device is connected to the client computer.

[0032] Specifically, a first key is preset in the first smart key device, a second key matching the first key is preset in the second smart key device, and the first key and the second key are determined by the second key. One (two) smart key device generates, and the second (first) key is sent to the second (one) smart key device; or the first key and the second key are generated by encryption algorithm libraries such as Openssl, Then send the first key to the first smart key device, and send the second key to the second smart key ...

Embodiment 2

[0052] Such as figure 2 As shown, a computer software protection method provided by the embodiment of the present invention, wherein the software runs on the client computer, the client computer and the server computer are both connected to the smart key device, and the IP address is transmitted through the smart key device, specifically include:

[0053] Step 201, the first smart key device is connected to the server computer, and the second smart key device is connected to the client computer.

[0054] Specifically, a first key is preset in the first smart key device, a second key matching the first key is preset in the second smart key device, and the first key and the second key are generated in the same process. Step 101, no more details.

[0055] Wherein, the first key and the second key may be the same symmetric key, such as 3DES, or may be different asymmetric key pairs, such as RSA.

[0056] Step 202, the client computer starts its internal software, and the softw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for protecting computer software and belongs to the technical field of information security. The technical proposal is that a first intelligent cipher key device is connected with a server computer; a second intelligent cipher key device is connected with a client computer; the client computer starts up the software installed inside the client computer; the software transmits an IP address obtaining request to the server computer; the server computer analyses the IP address obtaining request, obtains the IP address of the client computer, and transmits the IP address to the client computer after the IP address is encrypted by the first intelligent cipher key device; the client computer receives the encrypted IP address, judges whether the IP address is a legal IP address after the IP address is decrypted by the second intelligent cipher key device, if so, the second intelligent cipher key device is available, otherwise, the second intelligent cipher key device is unavailable. The invention improves the security of client software, and synchronously, the invention transfers the IP address after the IP address is encrypted so as to further improve software decryption difficulty.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a computer software protection method. Background technique [0002] The smart key device is a small hardware device with a processor and a memory, which can be connected to a computer through the computer's data communication interface. It has the function of key generation, and can safely store the key, and can preset the function of encryption algorithm. The calculations related to the key of the smart key device are completely run inside the device, and the smart key device has the characteristics of anti-attack, and the security is extremely high. USB Key is a smart key device with a USB interface. It has a built-in single-chip microcomputer or smart card chip, which can store the user's key or digital certificate. [0003] In today's increasingly developed information technology, more and more software that contains data information and involves p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22H04L29/06G06F21/12
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products