Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for realizing computer software protection based on network communication

A software protection and network communication technology, applied in computer security devices, computing, program/content distribution protection, etc., can solve the problems of software users' confidential information loss, easy to be illegally tampered with, illegally copied, etc.

Active Publication Date: 2018-05-01
佛山市电子政务科技有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In today's increasingly developed information technology, more and more software that contains data information and involves personal privacy and business secrets is running on the computer, and the software or the software itself running on the computer is easy to be illegally tampered with or illegally copied due to piracy , bring huge economic losses to software users or developers, and also make it impossible to continue further work
[0003] In practical applications, the existing software running in the computer is bound to the smart key device connected to the computer to improve the security of the software running in the computer. However, currently some software containing highly confidential information can only be used on a specific computer. If the illegal user obtains the software and the smart key device bound to the software by improper means, the confidential software can be used on other computers, causing huge losses to software users and confidential information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for realizing computer software protection based on network communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0023] Embodiment: realize the method for computer software protection based on network communication, described method comprises the following steps:

[0024] Step A: The first smart key device is connected to the server computer, and the second smart key device is connected to the client computer;

[0025] Step B: The client computer starts the software installed inside it, and then, the software detects whether the second smart key device is pulled out, if pulled out, the software directly ends running; if not pulled out, then The software sends an IP address acquisition request to the server computer, and the timing program inside the software starts timing;

[0026] Step C: The server computer analyzes the request for obtaining an IP address, obtains the IP address of the client computer, and transmits it to the first smart key device, and the first smart key device encrypts the IP address and sent to said client computer;

[0027] Step D: The client computer receives t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing computer software protection based on network communication. A first intelligent key device is connected to a server computer, and a second intelligent key device is connected to a client computer; software, and then, the software detects whether the second smart key device is pulled out, and if it is pulled out, the software directly ends its operation; if it is not pulled out, the software sends a request to obtain an IP address to the server At the same time, the timing program inside the software starts timing; the server computer analyzes the request for obtaining an IP address, obtains the IP address of the client computer, and transmits it to the first smart key device, and the first The intelligent key device encrypts the IP address and sends it to the client computer; the invention greatly improves the security of the client software.

Description

technical field [0001] The invention relates to a method for protecting computer software, in particular to a method for realizing computer software protection based on network communication. Background technique [0002] A key is a parameter that is entered in an algorithm that converts plaintext to ciphertext or ciphertext to plaintext. Keys are divided into symmetric keys and asymmetric keys. The smart key device is a small hardware device with a processor and a memory, which can be connected to a computer through the computer's data communication interface. It has the functions of key generation, safe storage of keys, and preset encryption algorithm functions. The calculations related to the key of the smart key device are completely run inside the device, and the smart key device has the characteristics of anti-attack, and the security is extremely high. USB Key is a smart key device with a USB interface. It has a built-in single-chip microcomputer or smart card chip...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12G06F21/46G06F21/31
CPCG06F21/123G06F21/31G06F21/46G06F21/1015
Inventor 李健成朱少华黄东旭胡晓帆冼传燊黄哲岩潘健豪邹振东蔡晓睿肖伯翰
Owner 佛山市电子政务科技有限公司