Supercharge Your Innovation With Domain-Expert AI Agents!

Method and apparatus for detecting tampering with software operation time

A technology for running time and detecting software, which is applied in the information field, can solve problems such as low safety and reliability, exceeding the service life of software, and dispensing is easy to be peeled off, so as to achieve the effect of ensuring safety and reliability

Inactive Publication Date: 2015-11-11
BEIJING SENSESHIELD TECH
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although accurate timekeeping can be achieved by attaching a clock chip and battery, there are still problems: when crackers discharge the clock chip or send commands through the signal pins of the chip to change the timing information inside the chip, they can obtain information beyond the software. license for use
Faced with this kind of problem, although the method of sealing the pins of the clock chip with glue can prevent the tampering of the internal clock information of the clock chip to a large extent, the glue on the pins of the clock chip is easy to be damaged. After being stripped, the cracker can directly modify the internal information of the clock chip through the pin leads, and obtain the authorization to use the software beyond the service life. In this case, there is no relevant detection method to detect that the running time of the software has been tampered with, resulting in The security and reliability of software copyright protection are low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for detecting tampering with software operation time
  • Method and apparatus for detecting tampering with software operation time
  • Method and apparatus for detecting tampering with software operation time

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0026] Embodiments of the present invention provide a method for detecting tampering of software running time, such as figure 1 As shown, the method includes:

[0027] 101. Acquire a reference time of software running and a current time, where the reference time of software running is historical time of software running.

[0028] Wherein, the reference time and the current time may be a time point or a time length, which is not li...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention, which relates to the technical field of information, discloses a method and apparatus for detecting tampering with software operation time. When someone tampers with software operation time, the tampering can be found timely and thus correlated operation for limiting the software operation is carried out, thereby guaranteeing safety and reliability of software copyright protection. The method comprises: reference time and current time of software operation are obtained, wherein the reference time of the software operation is historical time of the software operation; whether the current time exceeds the reference time is determined; and if not, tampering of the time of software operation occurs; and if so, tampering of the software operation time is not done. The method and apparatus are mainly applied to the control process of the software operation.

Description

technical field [0001] The invention relates to the field of information technology, in particular to a method and device for detecting tampering of software running time. Background technique [0002] With the development of computer technology, the software industry is also developing and has penetrated into all walks of life. In the process of software use, how to implement copyright protection and prevent software from being stolen is of great significance. In the field of software copyright protection, time-limited control methods are usually used to protect software copyrights. This time-limited control method allows software to be used only before a certain set date, such as software regular trials, leases, and regular use licenses. Way. In order to monitor the software running time, it is necessary to obtain the real-time running time of the software so as to monitor the service life of the software. [0003] At present, the way to obtain the real-time running tim...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12
CPCG06F21/121
Inventor 吴晓龙孙吉平
Owner BEIJING SENSESHIELD TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More