Method for protecting computer software
A software protection and computer technology, applied in the field of information security, can solve problems such as illegal duplication, loss of software users and confidential information, software or software is easy to be artificially and illegally tampered with, and achieve the effect of increasing the difficulty of cracking and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0030] A method for protecting computer software, wherein the software runs on a client computer, the client computer and the server computer are connected to a smart key device, and the IP address is transmitted through the smart key device, such as figure 1 As shown, the specific steps include:
[0031] Step 101, the first smart key device is connected to the server computer, and the second smart key device is connected to the client computer.
[0032] Specifically, a first key is preset in the first smart key device, a second key matching the first key is preset in the second smart key device, and the first key and the second key are determined by the second key. One (two) smart key device generates, and the second (first) key is sent to the second (one) smart key device; or the first key and the second key are generated by encryption algorithm libraries such as Openssl, Then send the first key to the first smart key device, and send the second key to the second smart key ...
Embodiment 2
[0052] Such as figure 2 As shown, a computer software protection method provided by the embodiment of the present invention, wherein the software runs on the client computer, the client computer and the server computer are both connected to the smart key device, and the IP address is transmitted through the smart key device, specifically include:
[0053] Step 201, the first smart key device is connected to the server computer, and the second smart key device is connected to the client computer.
[0054] Specifically, a first key is preset in the first smart key device, a second key matching the first key is preset in the second smart key device, and the first key and the second key are generated in the same process. Step 101, no more details.
[0055] Wherein, the first key and the second key may be the same symmetric key, such as 3DES, or may be different asymmetric key pairs, such as RSA.
[0056] Step 202, the client computer starts its internal software, and the softw...
PUM

Abstract
Description
Claims
Application Information

- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com