Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing computer software protection based on network communication

A software protection and network communication technology, applied in the computer field, can solve problems such as tampering, and achieve the effect of preventing piracy and protecting software

Pending Publication Date: 2019-08-23
HUANGGANG POLYTECHNIC COLLEGE
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the deficiencies of the prior art, the present invention provides a method for realizing computer software protection based on network communication, which has the advantages of protecting software dongle from being read and written and preventing intruders from tampering with software codes, etc. The problem of code lock intruders tampering with software

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing computer software protection based on network communication
  • Method for realizing computer software protection based on network communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0032] A method for realizing computer software protection based on network communication, comprising the following steps:

[0033] S1, setting module: the first device is used to set HOPT, DES, RSA and SHA algorithm, 2834 key and dynamic factor 1900 in the software, set the same HOPT, DES, RSA and SHA algorithm, 2834 in the information security equipment The key and dynamic factor 1900, when executing the transplanted code, trigger the dongle to execute the transplanted code. The dongle processor executes the transplanted code, and returns the execution result of the transplanted code to the target platform.

[0034] S2. Communication module: the second device is used to obtain software and information security equipment and after installing the software, when the software needs to be run, it establishes a connection with the information security equipment and communicates with the information security equipment for custom functions The loading method, the working mechanism o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of computers and discloses a method for realizing computer software protection based on network communication. The method is characterized by comprising the following steps: a setting module, setting an algorithm, a key and a dynamic factor for a first device used in software, setting the same algorithm, key and dynamic factor in the information security equipment, triggering the encryption lock to execute the transplanted code when executing the transplanted code, executing the transplanted code by the encryption lock processor, and returning an execution result of the transplanted code to the target platform.In the method for realizing computer software protection based on network communication, the same algorithm, key and dynamic factor are set in software and information security equipment; even if the interface simulation software steals the related interaction data in the verification process of the current software on the informationsecurity equipment, the data is invalid for the next verification process of the software on the information security equipment, so that the software is effectively protected, and the software is prevented from being pirated.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a method for realizing computer software protection based on network communication. Background technique [0002] Commonly known as a computer, a computer is a modern intelligent electronic device that can automatically and quickly perform a large number of numerical calculations and various information processing according to a pre-stored program. It is composed of hardware and software. The two are inseparable. People put A computer without any software installed is called bare metal. With the development of science and technology, some new types of computers have emerged, including biological computers, photonic computers and quantum computers. On May 24, 1954, the transistor electronic computer was born, and on October 29, 1969. On 12th, through ARPANET, the interconnection of two computers was realized for the first time. The inventor of the computer, John von Neumann, sai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/12H04L9/32H04L29/06
CPCG06F21/12H04L63/0838H04L9/3228H04L2209/603H04L2463/101
Inventor 佘凤邵立新
Owner HUANGGANG POLYTECHNIC COLLEGE
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More