Method and device for software protection based on shell technology

A software protection device and software protection technology, applied in the field of software protection methods and devices based on shell technology, can solve problems such as the inability to use shell technology, achieve high-intensity software protection, prevent illegal copying, and have good security effects

Inactive Publication Date: 2015-04-08
DONSON TIMES INFORMATION TECH CO LTD
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for software in the .NET environment, since the compiled result of the .NET program is not a machine language code, but a kind of MSIL inte

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for software protection based on shell technology
  • Method and device for software protection based on shell technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0021] figure 1 It is a schematic structural diagram of a software protection device based on shell technology provided by an embodiment of the present invention. Such as figure 1 As shown, the software protection device 100 includes a compilation module 110 , an encryption module 120 coupled to the compilation module 110 and an execution module 130 .

[0022] In an embodiment of the present invention, the compilation module 110 is used to compile the main program (that is, the program to be packed) into a dynamic link library (DLL) file, compile the shell program, and compile the shell program t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for software protection based on a shell technology. The method is characterized by comprising the steps of compiling a main program into a dynamic link library file through a compiling module; writing a shell program through the compiling module; moving a running access of the main program into the shell program through an execution module, and compiling the shell program into an executable program through the compiling module; executing the shell program through the execution module, and dynamically loading and running the main program through the shell program. The method for software protection can prevent illegal copying of software, fingerprint authorization is performed for computer hardware, client access services of not a local server can be avoided for the network version, and high-strength software protection is achieved.

Description

technical field [0001] The invention relates to the technical field of computer software protection, and in particular to a software protection method and device based on shell technology. Background technique [0002] With the development of computer software technology, the infection and destruction ability of malicious software and the level of crackers have been greatly improved. For software with high security requirements, the protection effect of traditional soft encryption and hard encryption schemes is no longer obvious. Software encryption technology is gradually becoming mature, among which, shell encryption technology is a commonly used software protection method. [0003] The shell is an image metaphor for encrypted software, referring to a "coat" outside the software, which is a protective barrier for the software. Shell encryption technology refers to the use of a certain algorithm to encrypt and compress portable executable files, and add a shell to the file...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/12
CPCG06F21/125G06F21/1015
Inventor 陈静风
Owner DONSON TIMES INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products