Unlock instant, AI-driven research and patent intelligence for your innovation.

Software protection method and apparatus thereof

A protection device and software technology, applied in the direction of protecting storage content from loss and preventing unauthorized use of memory, etc., can solve problems such as easy to be cracked, software cannot be effectively protected, and illegal use is difficult to avoid, so as to increase the degree of difficulty Effect

Inactive Publication Date: 2006-07-26
李俊峰
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, users can easily skip the registration action, resulting in the effective implementation of the control
[0005] Another common software protection method is to keep some programs on the CD that stores the software and not load it into the computer when the software is installed, so that the data on the CD needs to be read from time to time during the execution of the software, so that a single CD can only It can be used in a single computer, and the CD-ROM can be used as the key when the software is executed to limit the number of users
However, CDs with complete software data can be easily copied indefinitely, so that the software cannot be effectively protected
[0006] Therefore, taking a comprehensive look at the existing software protection methods, most of them only perform login verification at the beginning of software installation, which is easy to be cracked. Regarding the way of keeping the program on the CD, although the CD can be forced to exist when the software is executed, due to the presence of the CD on the CD The ease with which material can be copied makes it difficult to avoid illegal use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software protection method and apparatus thereof
  • Software protection method and apparatus thereof
  • Software protection method and apparatus thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The aforementioned and other technical contents, features and effects of the present invention are referred to below picture It will be clear from the detailed description of a preferred embodiment of the formula.

[0029] Due to the difficulty in forcing users to register and the lack of appropriate auditing actions after program execution in previous software protection methods, it is difficult to reduce the probability of illegal use. Therefore, the inventor thought of distributing the content of the software on at least two different and separable storage media to increase the difficulty of copying, and to make one of the storage media have the function of executing programs to execute the software after execution. audit steps. Furthermore, in order to force registration, part of the software program is placed in the server of the software company, so that the user needs to download the missing program from the server of the software company and register it at the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a kind of software protection method and apparatus. It stores a part of the software to a computer, another part of the software to a software protection apparatus. Both the computer and software protection apparatus store a login certificate. So when the software startup, it can make sure whether the software can start by authenticating the accordance of the two login certificates. When executing the software, it can issue a calling instruction that corresponding to the other part of software to the software protection apparatus, which calculates according to the calling instruction, and sends back the calculation result to computer. After the execution of software, the software protection apparatus can random check to ensure the cooperation between software protection apparatus and computer, so to increase the protection effect of software.

Description

technical field [0001] The invention relates to a software protection method and device, in particular to a software protection method and device using a portable electronic key. Background technique [0002] With the improvement of electronic information reproduction technology and the parity of reproduction equipment, it can be said that there is no technical threshold for the reproduction of electronic information. As a result, illegal duplication of electronic information has become commonplace, especially software manufacturers have suffered a lot of losses due to rampant piracy. Therefore, software manufacturers are all working hard to develop software protection methods to prevent piracy. [0003] A common software protection method is to use the software serial number and password to control, that is, each set of software is equipped with a set of exclusive software serial number and password. When the software is installed, the user is required to enter the correct...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/14G06F12/16
Inventor 李俊峰林子程李秉蔚
Owner 李俊峰