Method for protecting software with dongle and dongle
An encryption lock and software technology, applied in the direction of program/content distribution protection, etc., can solve the problem of software being easily cracked, and achieve the effect of improving the anti-cracking ability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] The specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
[0041] like figure 1 As shown, a method for protecting software by using a dongle is provided, the software runs in a terminal device, and the terminal device and the dongle are connected in communication with each other, and the method includes the following steps:
[0042] S1: The software sends a start timing command to the dongle;
[0043] S2: After the encryption lock receives the start timing instruction, it checks whether it is in a self-locking state. If so, the encryption lock cannot be called, and the execution ends; if not, step S3 is performed;
[0044] S3: The dongle starts the built-in timer to start accumulating time, and sends a permission call command to the software;
[0045] S4: the software sends a function call instruction and required data to the dongle after receiving the allow call instruction;
[0046] S5: After t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 