A method for realizing computer software protection based on network communication
A software protection and network communication technology, applied in the direction of program/content distribution protection, etc., can solve problems such as economic losses of software users or developers, easy to be artificially and illegally tampered with, and work cannot continue
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0022] Embodiment: realize the method for computer software protection based on network communication, described method comprises the following steps:
[0023] Step A: The first smart key device is connected to the server computer, and the second smart key device is connected to the client computer;
[0024] Step B: The client computer starts the software installed inside it, and then, the software detects whether the second smart key device is pulled out, if pulled out, the software directly ends running; if not pulled out, then The software sends an IP address acquisition request to the server computer, and the timing program inside the software starts timing;
[0025] Step C: The server computer analyzes the request for obtaining an IP address, obtains the IP address of the client computer, and transmits it to the first smart key device, and the first smart key device encrypts the IP address and sent to said client computer;
[0026] Step D: The client computer receives t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
