Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

501 results about "Software protection" patented technology

SGX-based secret key protection method and device for blockchain user

The invention discloses an SGX-based secret key protection device for a blockchain user. The device comprises an SGX encryption module, a transaction common recognition module and a transaction construction module; the SGX encryption module generates a trustable space on the basis of a software protection expanded instruction, and generates an access secret key for verifying the access authority of the trustable space; the trustable space is used to store a user secret key and a secret key operation function of a blockchain network; the transaction common recognition module receives a transaction from the blockchain network, accesses the SGX encryption module via the access secret key, calls the secret key operation function, and realizes verification common-recognition of the transaction;and the transaction construction module initiates the transaction according to intention of the user, accesses the SGX encryption module via the access secret key, calls the secret key operation function, realizes filling and legalization of transaction information, and broadcasts the transaction to the blockchain network. The invention also discloses an SGX-based secret key protection method fora blockchain user. The method can be used to prevent malicious software from sniffing and cracking the local secret key of the user, and blockchain assets of the user are protected against intrusion.
Owner:ZHEJIANG UNIV

Android application reinforcing method baed on C source code mixing

The invention discloses an Android application reinforcing method based on C source code mixing. The method comprises writing program key codes by using C programming languages and mixing C source codes. The reinforcement of Android application is achieved by mixing the C source codes in the Android application program, and the Android application program codes are protected. The Android application reinforcing method based on C source code mixing specifically includes the steps of writing the key part of the program by using C programming languages, writing programs into .so dynamic-link library file, invoking the dynamic-link library by using JNI technology in Java language, and then mixing the C source codes, so as to achieve the reinforcement of Android application. According to the Android application reinforcing method based on C source code mixing, important codes are saved in the C dynamic-link library by adopting NDK programming, and then the C source codes are mixed, the software protection is improved. At the same time, the important codes are written in a so library, the reusability of the codes are increased, ready-made so library can be directly introduced into other applications, so as to eliminate the troubles of secondary development.
Owner:北京鼎源科技有限公司

Protecting method and protecting system for authentication server software copyright

The invention discloses a protecting method and a protecting system for authentication server software copyright. The protecting method includes authorization request. The authorization request includes the steps that first request information sent by a user terminal is received, and the first request information comprises software information and hardware information bound with the software information; whether the software information in the first request information is stored is queried; and if the software information in the first request information is not stored, after the first request information is stored, a digital signature is conducted on the software information and the hardware information in the first request information, and the signature is used as authorization information and sent to the user terminal of the first request information. By combining the software information and the hardware information, authentication server software can only be installed and operated on legal hardware and can not be operated on other hardware, and therefore intellectual property of vast authorization server software developers is completely protected. Numerous modules are not required to be installed on a client terminal due to an online software protecting method, and therefore installing, deployment and maintaining are easy.
Owner:GCI SCI & TECH

Method for performing safety controllable remote upgrade for software protecting device

The invention provides a safe and controlled remote update method for a software protection device, the method is as follows: control information of a function module update pack is arranged at the terminal of a server and a new function module is obtained; the new function module is encrypted after the control information and the new function module are calculated to obtain calibration information, or after the new function module is encrypted, the control information and the encrypted new function module are calculated to obtain the calibration information; and then the control information, the encrypted new function module and the calibration information are combined to form the function module update pack which is sent to the software protection device; the software protection device check the control information in the received function module update pack, the new function module is obtained after decrypting, the calibration information in the update pack is validated according to the control information and the new function module, and the own update can be performed through using the new function module if the validation is passed. The function module in the function module update pack of the safe and controlled remote update method for a software protection device is all cryptograph in the transmission process, thus the safe and controlled remote update for the software protection device is effectively realized.
Owner:BEIJING SENSESHIELD TECH

Software protection method based on virtual machine

The invention discloses a method for protecting software based on a virtual computer, which comprises the steps that: a high level programming language applied to compiling hidden components is defined; virtual computer specification is defined; a compiler of exclusive instruction set from the high level programming language to the virtual computer is realized; the virtual computer taking an interpreter as an execution engine is realized; the software is divided into open components and hidden components; the open components are added with a module to get the hardware ID information of the computer of users; source code of the virtual computer and the open components obtained in the steps are compiled into executable files; the hidden components are again realized through the high level programming language and complied into the code of the virtual computer as independent hidden component files. The invention has high performance of safe operation environment and little response delay between open and hidden components and greatly improves the experience of users. The invention provides a method for preventing software piracy effectively for software developers, which realizes on-line software issuing and decreases the cost of software greatly.
Owner:北京赛柏科技有限责任公司

IGBT overcurrent protection apparatus and method of PFC circuit

The invention discloses an IGBT overcurrent protection apparatus and method of a PFC circuit. The IGBT overcurrent protection apparatus comprises: a PWM control module; an input voltage detection module detecting an input voltage, setting a hardware protection voltage, comparing the input voltage with the hardware protection voltage, generating a hardware voltage protection signal and outputting the hardware voltage protection signal to the PWM control module; an output voltage detection module detecting an output voltage; a current detection module detecting an input current; a current overcurrent protection module setting a hardware protection current, comparing the input current with the hardware protection current, generating a first hardware current protection signal and a second hardware current protection signal and transmitting the second hardware current protection signal to the PWM control module, wherein the PWM control module outputs a PWMout signal according to the hardware voltage protection signal and the second hardware current protection signal; and a PFC control module separately connected with the above modules, receiving the input voltage, the input current, thefirst hardware current protection signal and the output voltage, setting a software protection current, outputting a PWM signal to the PWM control module according to various values, and controllingthe PWM control module to output the PWMout signal.
Owner:HISENSE (SHANDONG) AIR CONDITIONING CO LTD

Work protection system for DFB (distributed feed back) laser

The invention discloses a work protection system for a DFB (distributed feed back) laser. A laser diode and a semiconductor refrigerator are arranged in the DFB laser; the work protection system comprises a constant-current protection system and a temperature-constant protection system, wherein the constant-current protection system comprises a constant-current voltage comparison circuit, a switching circuit and a constant-current drive circuit; the constant-temperature protection system comprises a temperature-constant voltage comparison circuit and a temperature-constant drive circuit. The work protection system for the DFB laser has the following benefits: the on/off of the constant-current drive circuit is controlled by arranging the constant-current voltage comparison circuit and the switching circuit, and the on/off of the constant-temperature drive circuit is controlled by arranging the temperature-constant voltage comparison circuit, so that hardware protection is provided for the DFB laser, and the hardware protection responses quickly and works stably; three types of sampling circuits are arranged for monitoring the work of the laser in real time, and the constant-current drive circuit and the constant-temperature drive circuit can be controlled remotely, so that software protection is provided for the DFB laser, and the software protection is convenient to operate.
Owner:SHANGHAI BOOM FIBER SENSING TECH +1

Link method and linker

The invention discloses a link method and a linker, which belong to the field of software security. The method comprises the following steps: scanning the objective program codes of software to be protected, wherein the codes are generated after the compiling of a compiler; determining the inserting point of the identification codes of an intelligent key facility, and inserting the identificationcodes in the objective program codes; creating a segment table and a symbol table according to scanning information, adding symbols respectively corresponding to identification code functions and exitfunctions in the symbol table, and using the functions to which the identification codes belong to identify the intelligent key facility; if successful, allowing the software to operate, and if fail,calling the exit functions and completing the operation; repositioning the objective program codes, writing the head information of a file, the repositioned objective program codes, the segment tableand the symbol table in an output file to obtain an executable file. The linker comprises a scanning module, an insertion module, a creation module and a repositioning module. The invention realizessoftware protection, simplifies and reduces the complexity and the difficulty of software protection.
Owner:FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products