Application program copyright protection method and digital copyright protection system

An application program and copyright protection technology, which is applied in the field of digital copyright protection methods and systems, can solve the problems of easy-to-crack application program copyright and lack of protection, and achieve the effect of simplifying the process of copyright verification and high security performance

Active Publication Date: 2017-02-08
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the problem in the related art that the application program needs to be pre-installed on the terminal to use the application program, and the encapsulation is easy to be cracked so that the application program copyright cannot be protected, the main purpose of the present invention is to provide an application program copyright protection method and a digital copyright protection system , to address at least one of the above

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application program copyright protection method and digital copyright protection system
  • Application program copyright protection method and digital copyright protection system
  • Application program copyright protection method and digital copyright protection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] In the present invention, the application program is protected by integrating the public copyright module in the application program. The application program is integrated with the public copyright module, which is a process similar to assembly. The application program is integrated with the public copyright protection module, which is difficult to separate and thus safer. Compared with the original application, the new application only has one more step of copyright verification before the application runs. This step is completed by the public copyright module. After passing the copyright verification, the operation of the new application is the same as that of the original application. difference. Integrating the application program with the public copyright protection module can be compiled into a complete new executable application program by compiling the program. Such as figure 1 Shown is an example diagram of the integration mode diagram of the public copyright...

Embodiment 2

[0025] Based on the application program protection method and application program protection system of the present invention, when a user downloads an application program through a download portal website, the copyright server provides a copyright file for the user to download. The copyright server records the correspondence between the application program ID and the communication encryption key. When the copyright server receives the copyright verification request message from the public copyright module, it parses out the application program ID from it, and queries the communication encryption key according to the corresponding relationship.

[0026] Such as figure 2 Shown is an example diagram of the user downloading application program of the present invention.

[0027] Step 201: the user logs in to the download portal, selects an application program and sends an authorization request to the portal website.

[0028] Step 202: The download portal sends an authorization re...

Embodiment 3

[0033] Users who want to use the application must pass the verification of the public copyright module. Such as image 3 Shown is the process diagram of verifying the user's copyright by the public copyright module of the present invention.

[0034] Step 301: Use the communication encryption key to decrypt the copyright file to obtain the user ID, application program ID and authorization result.

[0035] Step 302: The public copyright module verifies the legality. If it is legal, the verification is completed, and the application program starts to be executed; otherwise, the local copyright verification result is invalid, and the process turns to step 303 . This step is mainly to compare the SIM number and verified application ID obtained on the terminal with the SIM card number and application ID in the copyright file. If both are the same, and the authorization result allows the use of the application, it is legal authorized.

[0036] Step 303: Delete the local illegal c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an application program copyright protection method, which is applied in the field of application program store copyright protection of a mobile internet. The method comprises the following steps of: integrating a public copyright module in an application program; and authenticating a user through the public copyright module, and allowing the user to use the application program if the authentication is successful. The invention also provides a method for integrating the public copyright module through the application program and a digital copyright protection system. By the method and the system, an application program copyright authentication process is simplified; and the method and the system are safe to use and high in reliability.

Description

technical field [0001] The invention relates to the field of digital copyright, in particular to a digital copyright protection method and system for application programs. Background technique [0002] In the application store in the field of mobile Internet, the application developer submits the application to the service provider. After the service provider reviews the application, it goes online to the portal website for users to download. After the user pays, the application is downloaded from the portal website to the terminal use. If no processing is done on the application, the user can freely use it and spread it to other unpaid users, which violates copyright constraints and damages the interests of application developers and service providers. [0003] At present, a common method to protect application copyright is to package the original application in a certain format, which is similar to the boxing process. During processing, a package file is newly generated ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12H04L29/06H04L9/32
Inventor 刘湘斌
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products