Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software protection method based on cloud server

A cloud server and software technology, applied in electrical components, transmission systems, etc., can solve the problems of high usage costs for software developers, and it is difficult for small applications to protect small applications, and achieve the effect of reducing costs.

Active Publication Date: 2012-09-19
BEIJING SENSESHIELD TECH
View PDF7 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Since the use of a dongle requires a certain hardware cost, it is difficult for small applications to protect small applications with a dongle in the form of hardware
In addition,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software protection method based on cloud server
  • Software protection method based on cloud server
  • Software protection method based on cloud server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] In this embodiment, the original dispatching module of the cloud server is divided into three modules, namely the cloud server portal module, the user identity authentication module and the dispatching module.

[0064] The cloud server portal module is used to provide a service interface to the application program. The service interface refers to the related method interface responsible for the interaction between the front-end device and the cloud server. Through the service interface, data can be requested from the cloud server according to the application program request. The cloud server returns the result to the service interface, and the service interface returns data to the client.

[0065] The user identity authentication service module is used to authenticate the identity of the user. According to a specific embodiment of the present invention, multiple authentication methods are used for authentication, such as signature, certificate, and so on.

[0066] The ...

Embodiment 2

[0076] Assuming that the application in this embodiment is a GPS navigation application (hereinafter collectively referred to as GPS), according to an embodiment of the present invention, the functions of Bluetooth, rear view, driving record, and monitoring and security in GPS have been placed on the cloud server.

[0077] In this embodiment, some of the above functions are uploaded to the cloud server. The application information will be saved on the cloud server, assuming it is saved in the table APPInfo.

[0078] The cloud server will save the system user information for the identity authentication module to verify whether it is a legitimate user, assuming that the information is stored in the table UserInfo.

[0079] Users who download and use applications through payment or other forms and the corresponding application information will also be stored in the cloud server, assuming that they are stored in the table User-APP.

[0080] When user A sends a call request to the...

Embodiment 3

[0085] According to one embodiment of the present invention, the application program is a PDF application program P, which can create, display, edit, mark, and print documents in PDF format on the mobile device. It is assumed that the editing and marking functions in the PDF program have been stored in In the cloud server, it is assumed that this PDF program needs to be downloaded and used for a fee, so users who pay to download this application are legal users of this PDF application.

[0086] An application such as PDF that uploads some functions on the cloud server will be marked as a legitimate application on the cloud server, and the cloud server will determine whether the application and the user are legal through files or database tables or other identifiers. According to a specific implementation of the present invention, it is assumed that the cloud server in this example stores corresponding legal application information, legal application-user correspondence informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloud-based software protection method. An application function calling system is built on a cloud server, so that the low-cost software protection method is implemented. The method includes scheduling application functions, executing the application functions, storing application data and storing user data. The technical scheme of the method includes that application programs call the cloud server to provide the application functions through a network, results processed by the cloud server are transmitted to the application programs, and a plurality of application programs and a plurality of users share a software protection cloud. Therefore, software protection cost is reduced without reducing software protection strength.

Description

technical field [0001] The invention relates to the field of software protection, in particular to a method for using a cloud server to provide protection for software. Background technique [0002] In the prior art, a software protection device is a main means for realizing software security protection and copyright protection. A software protection device specifically refers to a hardware device attached to a computer interface (for example, a USB interface, a serial port, a parallel port, etc.), and performs software security protection and copyright protection for specific software running on a computer. Modern software protection devices, such as USB encryption locks, use high-strength smart card chips and advanced cryptography technology, have certain computing and storage capabilities, and are difficult to be cracked and copied. They are widely used in high-strength software copyright protection. [0003] At present, the usual method of using a software protection de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
Inventor 不公告发明人
Owner BEIJING SENSESHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products