Method and device for controlling encryption lock

A control method and encryption lock technology, applied in computer security devices, program/content distribution protection, instruments, etc., can solve problems such as software resource theft and cracking, and achieve the effect of improving security and reducing the risk of being cracked

Inactive Publication Date: 2016-04-06
BEIJING FOREVER TECH
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this kind of verification method is easy to be cracked by the cracker, and once cracked, the developer can only re-release a new software version to deal with the cracker's continued cracking of the software version; and once the cracker cracks the software version, even if the developer The developer releases a new software version a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for controlling encryption lock
  • Method and device for controlling encryption lock
  • Method and device for controlling encryption lock

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Embodiments of the present application provide a dongle control method and device, so as to reduce the risk of the dongle being cracked and the software resources protected by the dongle being stolen.

[0045] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0046] First, a method for controlling a dongle of the present application is introduced.

[0047] see figure 1 , which shows a schematic flowchart of an embodiment of a method for controlling a dongle in the present application, the method of this embodiment may include:

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention provide a method and a device for controlling an encryption lock. The method comprises the following steps of obtaining current clock time in the encryption lock, preset software expiration time in the encryption lock and a device identifier, wherein the device identifier is preset in the encryption lock and is an identifier of a device associated with the encryption lock; reading a target identifier of a target device connected to the encryption lock; and running a software program protected by the encryption lock if determining that the target identifier is the same as the device identifier and the current moment does not exceed the service life of software protected by the encryption lock based on the clock time in the encryption clock and the software expiration time. According to the method and the device, the risk of cracking of the encryption lock can be reduced and a condition that software resources protected by the encryption lock are stolen is reduced.

Description

technical field [0001] The present application relates to the technical field of software control, and more specifically relates to a method and device for controlling a dongle. Background technique [0002] A dongle, also known as a hardware dongle, is an intelligent software protection tool provided by software developers. [0003] When the software preset in the dongle is started, authority verification will be performed based on the preset information and the verification information pre-stored in the dongle, and if the verification is passed, the software will be run. However, this kind of verification method is easy to be cracked by the cracker, and once cracked, the developer can only re-release a new software version to deal with the cracker's continued cracking of the software version; and once the cracker cracks the software version, even if the developer The developer releases a new software version and changes the encryption password in the new software version....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/12
CPCG06F21/123G06F21/109
Inventor 胡宝良方文江春华罗新伟陈显龙孙敏杰陈宝珍齐聪
Owner BEIJING FOREVER TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products