Method for realizing computer software intruder preventing edition based on confidence computation module chip

A technology of trusted computing and user computers, applied in computer security devices, computing, digital data processing components, etc., can solve the problem that software products cannot be completely prevented from piracy, and achieve the effect of preventing piracy

Active Publication Date: 2006-03-01
SHENZHEN SINOSUN TECH
View PDF0 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a method for realizing anti-piracy of computer software based on a trusted computing module chip. Aiming at the defects of existing software anti-piracy technology, the technical method described in the present invention can fundamentally solve the problem that software pr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing computer software intruder preventing edition based on confidence computation module chip
  • Method for realizing computer software intruder preventing edition based on confidence computation module chip
  • Method for realizing computer software intruder preventing edition based on confidence computation module chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Various specific implementations of the software anti-piracy method of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0037] A method for realizing software anti-piracy based on a trusted computing module chip provided by the present invention is realized by using cryptographic technology and the functions of a trusted computing module chip (hereinafter referred to as TPM chip), which includes the following basic steps: a. Install the trusted computing module chip on the computer of the software user and complete the initialization of the chip; b. The software copyright owner will select the key data in the software product protected by this method for interception to form hidden data, and will not include software products with hidden data Sell ​​or pass on to users who legally obtain the software, and provide a set of software registration tool software at the same time; c. Users need to register with the softwa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invented method includes the following measures: firstly, mounting trusted computing module chip and its supporting software on the software user computer and implementing chip initialization; hiding key data selected from on part or several parts of protected software product by software copyright proprietor and transferring the software product containing no hidden data to legal software user; and proving a software registration tool software for user, so that it can effectively prevent computer bootleg.

Description

technical field [0001] The method of the invention belongs to the technical field of computer information security, and in particular relates to a method for solving the problem of anti-piracy of software products by using encryption technology and trusted computing module chip technology. Background technique [0002] At present, there is no technology and method that can completely solve software piracy prevention at home and abroad while taking into account the economic affordability of users. There are three main types of software anti-piracy technologies that are widely used now: 1. Use registration serial numbers. Generally, registration numbers can be used repeatedly for this type of method. Once the registration number leaks, it will lead to a large number of piracy; Network activation method, the principle of this method is that the software contains program codes to determine whether to activate or register; however, crackers can find the code that plays a role in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F1/00G06F21/00G06F21/10
Inventor 杨晶刘宏伟刘长生高万鹏
Owner SHENZHEN SINOSUN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products