Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for implementing protection of software based on network communication

A software protection and network communication technology, applied in the direction of program/content distribution protection, etc., can solve the problems of economic loss of software users or developers, easy to be illegally tampered by human beings, and the work cannot be continued.

Active Publication Date: 2016-02-24
广州安士维信息科技有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In today's increasingly developed information technology, more and more software that contains data information and involves personal privacy and business secrets is running on the computer, and the software or the software itself running on the computer is easy to be illegally tampered with or illegally copied due to piracy , bring huge economic losses to software users or developers, and also make it impossible to continue further work
[0003] In practical applications, the existing software running in the computer is bound to the smart key device connected to the computer to improve the security of the software running in the computer. However, currently some software containing highly confidential information can only be used on a specific computer. If the illegal user obtains the software and the smart key device bound to the software by improper means, the confidential software can be used on other computers, causing huge losses to software users and confidential information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing protection of software based on network communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0022] Embodiment: realize the method for computer software protection based on network communication, described method comprises the following steps:

[0023] Step A: The first smart key device is connected to the server computer, and the second smart key device is connected to the client computer;

[0024] Step B: The client computer starts the software installed inside it, and then, the software detects whether the second smart key device is pulled out, if pulled out, the software directly ends running; if not pulled out, then The software sends an IP address acquisition request to the server computer, and the timing program inside the software starts timing;

[0025] Step C: The server computer analyzes the request for obtaining an IP address, obtains the IP address of the client computer, and transmits it to the first smart key device, and the first smart key device encrypts the IP address and sent to said client computer;

[0026] Step D: The client computer receives t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method for implementing protection of software based on network communication. The method comprises: a first key apparatus is connected to a server computer, and a second key apparatus is connected to a client computer; the client computer initiates software installed at an internal portion thereof; and the software detects whether the second key apparatus has been drawn out or not; if so, the software directly ends running; if not, the software sends an IP address acquisition request to the server computer, while an internal timing program of the software starts timing; and the server computer analyzes the IP address acquisition request to get an IP address of the client computer and transmit the IP address of the client computer to the first key apparatus; the first key apparatus encrypts the IP address and sends the IP address to the client computer. The method for implementing protection of software based on network communication disclosed by the present invention greatly improves the security of the client software.

Description

technical field [0001] The invention relates to a method for protecting computer software, in particular to a method for realizing computer software protection based on network communication. Background technique [0002] A key is a parameter that is entered in an algorithm that converts plaintext to ciphertext or ciphertext to plaintext. Keys are divided into symmetric keys and asymmetric keys. The smart key device is a small hardware device with a processor and a memory, which can be connected to a computer through the computer's data communication interface. It has the functions of key generation, safe storage of keys, and preset encryption algorithm functions. The calculations related to the key of the smart key device are completely run inside the device, and the smart key device has the characteristics of anti-attack, and the security is extremely high. USBKey is a smart key device with a USB interface. It has a built-in single-chip microcomputer or smart card chip ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/12
CPCG06F21/12
Inventor 王向伟
Owner 广州安士维信息科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More