Unlock instant, AI-driven research and patent intelligence for your innovation.

Software copyright protection method based on asymmetric public key password system

A public key cryptography and copyright protection technology, applied in the direction of program/content distribution protection, user identity/authority verification, etc., can solve problems such as difficult to protect software and correctly identify identities, easy to pirate, easy to crack, etc.

Active Publication Date: 2015-01-07
HUAWEI TEHCHNOLOGIES CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are big defects in this early method: easy to crack, easy to pirate
For example, many software registration machines use simple explicit or implicit conditions to judge the legitimacy of software users. However, in many cases of hackers, hackers or third-party crackers only need to use some reverse engineering techniques to restore the basic Code, understand the original author's logic algorithm and slightly modify and compile to achieve the purpose of cracking, so it is difficult to achieve the effect of protecting the software and correctly identifying the identity by judging the conditions of the program to achieve the purpose of protection
However, those algorithms that make identity authentication in the data are often not easily cracked (such as the S-box transformation of AES)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software copyright protection method based on asymmetric public key password system
  • Software copyright protection method based on asymmetric public key password system
  • Software copyright protection method based on asymmetric public key password system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] Such as figure 1 As shown, the method is roughly divided into two stages. Phase I is mainly the state change of the installation package before the software is deployed to the client, and Phase II is mainly the state change of the key files specified in the protection policy formulated by the software manufacturer after the software is deployed to the client. Wherein, file 1, file 2, ..., file n are n files after the installation package is deployed.

[0056] Phase I: Deployment

[0057] In the first stage, the software manufacturer completes the production of the software in terms of logical functions and enters the release state. If the user wants to use the software, he must know the situation of the software through the use of the platform (such as the number of times that can be used without purchasing, the time that can be used, and the functions that can be used, etc.). Once the user has made a corresponding selection (or decision), the server can be notified ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a software copyright protection method based on an asymmetric public key password system. The method comprises two phases of mounting and arranging software, and using the software, wherein the two phases are encrypted, communicated and verified based on the asymmetric public key password system by a client and a server end so that the software is effectively protected. The software copyright protection method based on the asymmetric public key password system, disclosed by the invention, can solve the problem that the software copyright protection is not easy to synchronously control, the safety of the copyright is difficult to protect and the like to a certain extent.

Description

technical field [0001] The invention relates to a software copyright protection method, in particular to a software copyright protection method based on an asymmetric public key cryptosystem. Background technique [0002] Software is a collection of computer data and program instructions organized in a specific sequence. Among them, the number of application software is the largest. Different application software provides different functions according to users and the fields they serve. There are various types and wide applications, which have had a profound impact on people's life and work. Different software generally has a corresponding software authorization, and software users must agree to the license of the software used before they can legally use the software. [0003] Regrettably, judging from the current situation, a lot of software is used without restriction without the authorization of the software manufacturer, which has caused huge economic losses to the sof...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12H04L9/32
Inventor 邵天晨李克清
Owner HUAWEI TEHCHNOLOGIES CO LTD