Information safety protecting method and protector based on network software

A network software and information security technology, applied in the direction of secure communication devices, electrical components, digital transmission systems, etc., can solve the problems of high cost and inconvenience, and achieve the effect of saving the amount of use and reducing costs

Inactive Publication Date: 2006-08-16
FEITIAN TECHNOLOGIES
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, it can be considered to realize the sharing of software protection products through the network. At present, software protection products use hardware dongles, and each client connects a dongle. The client is also relatively fixed, and the dongle needs to be plugged and unplugged frequently when the client user is changed many times, which brings a lot of inconvenience to the user.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information safety protecting method and protector based on network software
  • Information safety protecting method and protector based on network software
  • Information safety protecting method and protector based on network software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0025] Example 2 as figure 2 As shown in , it includes an MCU 204 integrated with a memory and a communication interface 202, and an interface module 203 for analyzing the communication protocol is connected between the communication interface 202 and the MCU.

Embodiment 3

[0026] Example 3 as image 3 As shown in , the MCU 303 integrating memory and interface modules is connected to the host through the communication interface 302 .

[0027] The MCU and CPU are used as main control units to run firmware programs and user programs, and can also be replaced by micro-processing chips such as single-chip microcomputers or smart cards. The memory is used to store device firmware programs, user data, status information and corresponding encryption algorithms, including RAM, ROM, EPROM, EEPROM, FLASH, etc. The memory should have enough storage space for storing the preset encryption algorithm, or the algorithm can be selected or downloaded by the user, and if it is necessary to store part of the user code, it needs to have a large enough storage space. The interface modules 103 and 203 are used to analyze the communication protocol when the device communicates with the host, and adopt a USB HID interface chip. The firmware program part includes: the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention can make multi client sides to share one protected software product by setting an encrypting lock at the host machine at service side and connecting the host machine at client side to service side having the encrypting lock. The key information of the protected software product is saved in the encrypting lock and keeps normal running of software by interaction with the encrypting lock. The access of client side is controlled by service side, and one encrypting lock can be independently shared by multi client sides. By using the invention, the amount of software protecting devices can be decreased.

Description

technical field [0001] The invention relates to a network software protection method and its device, in particular to a network software-based information security protection method and its device. technical background [0002] Nowadays, software oriented to the needs of various application fields or industries is constantly being born, and software protection products are constantly being introduced. However, there is a proportional relationship between security and price of software protection products, because the security of the chip used in the dongle is related to the price. At the same time, the development of high-security products requires higher R&D expenses. If you want to get very safe You have to pay a very high price. [0003] With the development of computer network technology and the popularization of network applications, many problems can be solved through the network, such as data communication, remote transmission, centralized management, distributed pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00
CPCH04L63/0209
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products