Software protection method and device and software protection lock

A software protection and software technology, applied in computer security devices, program/content distribution protection, instruments, etc., can solve problems such as waste, waste of resources, and difficulty in modification by software developers, so as to reduce the cost of use and protect the right to use Effect

Active Publication Date: 2017-11-24
BEIJING SENSESHIELD TECH
View PDF13 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

From the perspective of the characteristics of the license, the license itself only needs to ensure that it is not tampered with by a third party or maliciously used to ensure its security. From this point of view, there are many inconveniences in the traditional software protection lock storage license
[0003] 1. The storage space of the software protection lock is limited. Due to technical limitations, the storage space of the software protection lock is extremely small. The storage space basically does not reach the mega-level software protection lock, and the number of storage licenses is limited. The space can store 6,000 licenses, but if the license has a data area, the storage space of the software protection key will be very crowded so that too many licenses cannot be placed in the storage space
[0004] 2. Users buying too many software protection locks will cause waste. Users sometimes need to purchase software from multiple software developers. Each software needs a software protection lock, and the license configuration in the software protection lock is fixed. It is not necessarily necessary to use all licenses at the same time, that is, for users, purchasing too many software protection locks will cause a waste of resources
[0005] 3. Security. Once the license is placed in the software protection lock, it is difficult for software developers to modify it, and others can set the terms of the software license to use indefinitely through illegal channels, which will affect the software. Developers do a lot of damage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software protection method and device and software protection lock
  • Software protection method and device and software protection lock
  • Software protection method and device and software protection lock

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to enable those skilled in the art to better understand the present invention, the embodiments of the present invention will be described in detail below with reference to the accompanying drawings, but this is not intended to limit the present invention.

[0041] figure 1 It is a flowchart of a software protection method according to an embodiment of the present invention. A software protection method according to an embodiment of the present invention is used to protect software, such as figure 1 As shown, the software protection method includes the following steps:

[0042] S1, when the software is started, detect the software protection lock associated with the software;

[0043] Software and software protection locks have an associated relationship. For example, after a software manufacturer establishes a cooperative relationship with a software protection lock manufacturer, it can establish an association relationship between the software developed by t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a software protection method and device and a software protection lock. The software protection method is used for protecting software and comprises the steps that when software is started, the software protection lock associated with the software is detected; when the software protection lock is detected, a permission associated with the software is loaded into the software protection lock, so that the permission is verified through the software protection lock; corresponding operation is performed on the software according to the verification result. According to the method, the permission does not need to be placed in the software protection lock, so that the situation that the permission is illegally modified by others obtaining the software protection lock is avoided, and interests of a software manufacturer are guaranteed; a user can use a plurality of pieces of protected software by only using one software protection lock, and the use cost is reduced.

Description

technical field [0001] The invention relates to the field of digital encryption, in particular to a software protection method, device and software protection lock. Background technique [0002] At present, in the field of digital encryption of software, due to security considerations, software licenses are generally stored in software protection locks, and the licenses are generally unreadable and unmodifiable. From the perspective of the characteristics of the license, the license itself only needs to be guaranteed not to be tampered with by a third party or maliciously used to ensure its security. From this point of view, the traditional way of storing licenses with software protection keys has many inconveniences. [0003] 1. The storage space of the software protection lock is limited. Due to technical limitations, the storage space of the software protection lock is extremely small. The storage space basically does not reach the mega-level software protection lock, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/10
CPCG06F21/105
Inventor 孙吉平李海鹏
Owner BEIJING SENSESHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products