Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for protecting software with dongle and dongle

An encryption lock and software technology, applied in the direction of program/content distribution protection, etc., can solve the problem of software being easily cracked, and achieve the effect of improving the anti-cracking ability

Active Publication Date: 2016-04-06
BEIJING SENSESHIELD TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to provide a method and an encryption lock for protecting software by using an encryption lock to solve the problem in the prior art that the software is easily cracked because there is no time limit in the process of software calling and hardware output

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting software with dongle and dongle
  • Method for protecting software with dongle and dongle

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0041] like figure 1 As shown, a method for protecting software by using a dongle is provided, the software runs in a terminal device, and the terminal device and the dongle are connected in communication with each other, and the method includes the following steps:

[0042] S1: The software sends a start timing command to the dongle;

[0043] S2: After the encryption lock receives the start timing instruction, it checks whether it is in a self-locking state. If so, the encryption lock cannot be called, and the execution ends; if not, step S3 is performed;

[0044] S3: The dongle starts the built-in timer to start accumulating time, and sends a permission call command to the software;

[0045] S4: the software sends a function call instruction and required data to the dongle after receiving the allow call instruction;

[0046] S5: After t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption lock and a method for protecting software by utilizing the encryption lock. The method for protecting software by utilizing the encryption lock comprises the following steps of: sending a timing starting instruction to the encryption lock by the software; carrying out automatically checking on the encryption lock to determine whether the encryption lock is in a self-locking state, if the encryption lock is not in the self-locking state, starting a timer to accumulate time by the encryption lock; sending a function calling instruction and required data to the encryption lock by the software; checking by the encryption lock to determine whether the current accumulated time exceeds a preset value or not, if the current accumulated time exceeds the preset value, switching the encryption lock into a self-locking state, if the current accumulated time does not exceed the preset value, returning a processing result to the software by the encryption lock; sending a timing stopping instruction to the encryption lock by the software; checking by the encryption lock to determine whether the current accumulated time exceeds a preset value or not, if the current accumulated time exceeds the preset value, switching the encryption lock into the self-locking state, and if the current accumulated time does not exceed the preset value, stopping timing of the timer, wherein the encryption lock is waited to be called next time. The timer inside the encryption lock is utilized for limiting time of a software calling encryption lock, so that dynamic debugging difficulty of a breaker and breaking difficulty are effectively increased.

Description

technical field [0001] The invention relates to the field of software protection, in particular to a method for protecting software by using an encryption lock and an encryption lock. Background technique [0002] As a special product, software has been plagued by piracy since its inception. The existence of piracy not only caused huge losses to software developers, but also greatly hindered the development of the entire software industry. Therefore, almost all software have taken corresponding technical measures to avoid software cracking and piracy, the most effective of which is the hardware-based encryption lock technology. [0003] The dongle is a hardware device connected to the parallel port or USB port of the computer, and contains specific functions, such as a part of storage space, some password algorithms or some user-defined algorithms or functions. Before the software is released, software developers modify their software code, so that the software needs to us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12
Inventor 孙吉平韩勇
Owner BEIJING SENSESHIELD TECH