Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software protection method based on network, client side and server

A software protection, client-side technology, applied in the field of computer networks, can solve the problems of low effectiveness, inability to detect software tampering, low accuracy of client software, etc., to achieve the effect of accurate detection methods and improved effectiveness

Active Publication Date: 2010-07-21
RUIJIE NETWORKS CO LTD
View PDF0 Cites 58 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method can be used to detect whether the client software has been tampered to a certain extent; however, the defect of this method is that if non-code segments (such as the method of comparing program data segments) are used, the program execution instructions will be modified. Afterwards, the determined Hash value remains unchanged, so it is impossible to detect that the software has been tampered with. In addition, if the program has been tampered with in advance, it is only by checking whether the software has been tampered with before and after the program runs, rather than through the software program stored on the server. The comparison of the Hash value determined by the code segment cannot detect whether the software has been tampered with. Therefore, in this case, there are still problems of low accuracy and low effectiveness in detecting whether the client software has been tampered with.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software protection method based on network, client side and server
  • Software protection method based on network, client side and server
  • Software protection method based on network, client side and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to solve the above-mentioned problems existing in the prior art, an embodiment of the present invention provides a network-based software protection method, which mainly includes: respectively storing program code segments corresponding to each software at the client and server; When detecting whether the software has been tampered with, the client sends a program running request with the client ID and software version information to be run to the server; The client sends random data; the client uses the set Hash algorithm to determine the first Hash value according to the client ID, the random data sent by the server, and the program code segment corresponding to the version information to be run locally stored on the client, and The first Hash value is sent to the server; the server uses the set Hash algorithm to determine the second Hash according to the program code segment corresponding to the client identification, random data and the version information t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a software protection method based on network, a client side and a server, which is used for improving the accuracy and the effectiveness for detecting whether client side software is distorted. The method comprises: a server side receives a program operation request sent by the client side and sends random data to the client side according to the program operation request; the client side adopts a set Hash algorithm to determine a first Hash value according to client side identification, random data and a program code segment which is stored in the client side and corresponds to the edition information of software to be operated; the server side adopts the set Hash algorithm to determine a second Hash value according to client side identification, random data and a program code segment which is stored in the client side and corresponds to the edition information of software to be operated; the first Hash value and the second Hash value are compared to determine whether the client side is permitted to execute the program according to the comparison result. The technical scheme of the invention improves the accuracy and the effectiveness for detecting whether client side software is distorted.

Description

technical field [0001] The invention relates to the field of computer networks, in particular to a network-based software protection method, client and server. Background technique [0002] At present, it is more and more common for software on the network to be illegally tampered with by other people or certain institutions. The so-called tampering refers to modifying the original execution sequence of the software, cutting out some protection functions of the program, or Function removal of commercial applications (such as removing the authorization function of the program through disassembly technology, so that the cracker can use the software function normally without purchasing the software serial number); or, using other means to block some functions that are useless to the user, but these Functions are exactly the software functions launched by commercial companies for profit (such as removing the advertising function of free closed-source commercial software). [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F21/22G06F21/12
Inventor 林明静
Owner RUIJIE NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products