[go: up one dir, main page]

CN1300697C - Software protection method and system - Google Patents

Software protection method and system Download PDF

Info

Publication number
CN1300697C
CN1300697C CNB031569285A CN03156928A CN1300697C CN 1300697 C CN1300697 C CN 1300697C CN B031569285 A CNB031569285 A CN B031569285A CN 03156928 A CN03156928 A CN 03156928A CN 1300697 C CN1300697 C CN 1300697C
Authority
CN
China
Prior art keywords
software
application program
information
password
key point
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB031569285A
Other languages
Chinese (zh)
Other versions
CN1598781A (en
Inventor
林光信
赵镝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inventec Corp
Original Assignee
Inventec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Corp filed Critical Inventec Corp
Priority to CNB031569285A priority Critical patent/CN1300697C/en
Publication of CN1598781A publication Critical patent/CN1598781A/en
Application granted granted Critical
Publication of CN1300697C publication Critical patent/CN1300697C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

A software protection method and system is suitable for software used by information equipment and used for preventing the software from being arbitrarily copied and used by people; firstly, setting a confirmation password at the key point position of an application program, and adding a monitoring process module in the equipment; when the program is run, firstly, the version number of the equipment is confirmed to be correct, then the program can be continuously run, when the program is run to the key point position, the program needs to request the process module to provide password information, and the program is confirmed after receiving the password information and is continuously run after passing; then, when the program runs to the key point position, it must request the monitoring process module to provide cipher information, and can continue running after the confirmation is passed, so as to detect the position of each key point, and after all the confirmed ciphers are detected, the application program can be completely run in the information equipment.

Description

Method for protecting software and system
Technical field
The invention relates to a kind of Software Protection Technique, particularly utilize version detection and install many places affirmation password software is carried out the method and system of encipherment protection at the program key point about a kind of.
Background technology
Software is used for commander and the operation of control information device hardware, till the extremely formal commercialization of software development initial stage, the software developer must drop into a large amount of exploitation manpower and cost, can just the software listing can be sold after stable operation on the information equipment until the software of being developed.At this moment, input huge cost when software supplier develops for regaining as early as possible, make the software price high, can't in most information equipments, popularize, moreover, all be stored in because of software in the storing medias such as CD or floppy disk, be easy to circulation and propagate, so increased by the probability of duplicating by various data processing techniques.Therefore, software cryptography becomes a kind of necessary means of protection software, and the software major part of selling is taked certain encryption method at present, and its purpose is to protect software developer's interests and prevents that software from being duplicated arbitrarily, piracy.The used software enciphering method of software developer is broadly divided into two classes at present: hardware encipher and software cryptography.
Hardware encipher is that combination of hardware with software and information equipment is to carry out encipherment protection to software; the software that adopts hardware encipher is when carrying out; need and the relevant hardware swap date; if there is not relevant hardware to cooperate; software after the encryption can't move; though this method has the Cipher Strength height; advantages such as encryption performance is good; but need specific hardware supported ability entire run; this inconvenience is one of its shortcoming; therefore, this method is used for software developer that Cipher Strength, compatibility, stability are had higher requirements more.
Software cryptography is with the pure software method software to be encrypted, and its cipher mode mainly contains pin mode, software self-checking mode, license management mode and key floppy disc mode etc.
Pin mode is meant the important local inquiry password of information equipment in software execute process, and the user must be according to the input password of password epiphase correspondence, and program could continue to carry out.The advantage of this mode be implement simple, hardly must input cost, but exist defectives such as destroying normal man-machine conversation, password and pass point relative fixed, therefore be mainly used in the lower software of price, as Games Software etc.
When software self-checking mode refers to that the software developer packs software into user used hard disk, the information such as track location that the parity check sum software of installation procedure automatic logger computer hardware of meeting in installation process is installed, perhaps at special track, CMOS (the Complementary Metal-Oxide Semiconductor of hard disk, complementary metal oxide semiconductor (CMOS), be a kind of storer on the computer main frame panel) in do a mark, and rewrite installation procedure automatically, when after this software was carried out, the information or the mark of record carried out verification when promptly these being installed.If software is copied to by the user on other the information equipment, because of running environment changes, software can't normally move.Make and to make the user in this way when legal use software; the existence of imperceptible encryption; and information equipment is relatively also more stable; so many software developers have adopted this mode to protect the software of being developed; but also there is certain defective in this cipher mode; for example; when user increase and decrease or when changing computer hardware, compressed drive or situation such as CMOS power down occurring; the capital causes software normally to carry out; need reinstall software and just can address the above problem, for just inconvenience more of user.
The license management mode is meant that software is in installation process, information equipment to legal user detects, special finger print information so as to the acquired information device hardware, and the computation process (the installation sequence number of finger print information and this software self is carried out computing) by algorithm, obtain representing a string data of this software, and require the user that this data is registered by modes such as Internet, Email, telefacsimile, mails, if legal user can obtain a registration code (or confirmation code) there the software developer.After legal user wants installed software to this registration code input; this software can normally move; this cipher mode is actually software and information specific device hardware is carried out " binding "; making the user software can't be copied on the out of Memory equipment uses; because of the hardware fingerprint of every station information equipment all inequality; so; this mode is to the implementation of software and have no effect; its shortcoming is; software developer's services amount will be increased; it is reported that using special register machine to produce registration code will become following main flow, promptly adopted this cipher mode to carry out software protection as the Office2000 of Microsoft (Microsoft).
The key floppy disc mode is that the special track at floppy disk writes a customizing messages, software is this customizing messages of palpus verification in operational process, this floppy disk resembles a key, thereby be called key floppy disc by people custom, adopt the software cryptography instrument of this cipher mode a lot, wherein, advanced software cryptography instrument also provides interface function, the software developer only needs disposable purchase one cover Encryption Tool, get final product many key floppy discs of self manufacture, come the verification key floppy disc whether to exist and in software, read magnetic track special on the key floppy disc.This software cryptography mode is easy, cost is low, encryption is reliable; but also there is defective simultaneously; must in floppy disk, insert floppy disk during as user's executive software; cause the user in floppy disk, to carry out the inconvenience of data access; and floppy disk is a kind of consumables; through regular meeting because of lose, scratch, magnetization and reason such as cold and hot cause to damage data can't be read; and software that floppy disk stores and data still are available for users to backup; key floppy disc then can not, so the user often has the awkward situation that causes software normally to use because of reasons such as key floppy disc damages.
Summary of the invention
For overcoming the shortcoming of above-mentioned prior art; fundamental purpose of the present invention is to provide a kind of method for protecting software and system; it can increase the Cipher Strength of protected software, after guaranteeing that software is by people's bootlegging, can't entire run on unwarranted information equipment.
Another object of the present invention is to provide a kind of method for protecting software and system, its modus operandi is simple and with low cost, need not expend extra cost of software developer and manpower expenditure.
Another purpose of the present invention is to provide a kind of method for protecting software and system, and it is can be the user legal and when normally using software, the imperceptible defence program that has software cryptography, and unlikely destruction man-machine conversation.
For reaching above-mentioned purpose, method for protecting software of the present invention comprises: (1) different key point position in the application program implementation is set different affirmation passwords respectively; (2) but in information equipment, set up monitor application operation and receive the monitoring process module of the Query Information that application program sends; (3) make this application program when operation at first to information equipment authentication query information, if the authentication information mistake of information equipment response, application program just can't normally be moved, as application program detect authentication information errorless after, can carry out initialization and continue moving; When (4) application program moves to a certain key point position, provide and this corresponding encrypted message in key point position to the request of monitoring process module immediately; And (5) make application program that the encrypted message that the monitoring process module is provided is confirmed, if confirm to pass through, then application program can continue operation, and as not, application program will be out of service immediately; Then, when if application program is reruned to other key point position, repeat step (4) to step (5), carry out verification with affirmation password to a plurality of key points position, and after the affirmation password of all key point positions was all confirmed to pass through, what application program just can be normal and complete operated in the information equipment.
As mentioned above, method for protecting software of the present invention be earlier by the software developer in the application program operational process, confirm password in key point set positions such as the contents of program of required execution and instructions, just the software developer is in the different key points position of application program, set a plurality of application programs numberings that need respectively, the affirmation password that identification projects such as key point position and password are carried out verification, when application program operates in the information equipment, make it at first obtain authentication information to this information equipment, device version number just, and only after confirming that version number is errorless, application program just can continue operation, when application program moves to the key point position, promptly require the monitoring process module to provide and contain application reference number, the encrypted message of contents such as key point position and password, when the contained content of this encrypted message all meets the identification project of confirming the password confirmation request, application program just can continue operation, otherwise, then make this application program withdraw from the execution operation of information equipment immediately; Make application program can finish the certification work of all being confirmed passwords, and after having only whole passwords all to detect to pass through, application program just can be normally and complete operating in the information equipment.
Security system for software of the present invention comprises: (a) can external civil power and the power supply device of the required power supply of all device work of internal system is provided; (b) the software input interface that can supply storing media to insert; (c) be used to deposit the storage device of install software; (d) processing unit electrically connects with software input interface and storage device, is used for software is mounted to storage device from storing media, and can and carries out its contained application program from the storage device load software; And (e) monitoring process module, be used to safeguard the key point password table of all application programs, and simultaneously monitoring application program operation and wait for that application program sends Query Information.
In sum, security system for software of the present invention can cooperate the execution program of method for protecting software, by version detection and many places are set confirm multi-enciphering protections such as password, increase the intensity of software protection, the software of guaranteeing bootlegging can't move on unwarranted information equipment, its modus operandi is simple and with low cost, need not expend extra cost of software developer and manpower expenditure; All be in information equipment, to move voluntarily also by the application program of protected software because of method for protecting software provided by the invention; need not make the user of legal authorization carry out steps such as password confirming or network access authentication; save the time that the user carries out the required consumption of password confirming; and can keep the continuity of user's state of mind, do not destroy interactive complete.
Description of drawings
Fig. 1 is a process flow diagram, illustrates that the present invention is in application program every administration step of carrying out the software protection measure in service;
Fig. 2 is a calcspar, and the inside structure of security system for software of the present invention is described; And
Fig. 3 is a block connection layout, and application program and the monitoring process intermodule communication relation when sending request signal and replying encrypted message is described.
Embodiment
Embodiment
In following examples; method for protecting software of the present invention and system applies are in computer equipment; so as to setting up the relations of dependence of contained application program of software and computer equipment hardware; just make application program first when the inner execution of computer equipment; at first with the version number of this computer equipment; hardware informations such as installation magnetic track load to be deposited; whether supply is differentiated with program in the future and provided between the computer equipment of execution environment has the relations of dependence; the software user can't be replicated in software on other computer equipment use, thereby reach the purpose that application programs is protected.
Fig. 1 is a process flow diagram, and method for protecting software of the present invention is described, carries out every execution program of software encryption and protection on computer equipment; In step S1, be earlier by the software developer in the application program operational process, the different affirmation password of key point set positions in the instruction that must carry out, the related function that needs calling and subroutine support, just, set a plurality of affirmation passwords at the diverse location of application program, then proceed to step S2.
In step S2; in security system for software of the present invention, set up the monitoring process module; make this monitoring process module safeguard all Application Password tables, and operation of monitor application simultaneously and the Query Information that the wait application program is sent, then proceed to step S3.
In step S3, if application program desires to operate in computer equipment when inner, make this application program at first inquire about its device version number to the computer equipment that its running environment is provided, then proceed to step S4.
In step S4, make application program differentiate device version that computer equipment provides number, whether there are the relations of dependence with it, if have the relations of dependence between application program and computer equipment, promptly then carry out step S5, do not have the relations of dependence, then directly proceed to step S9 as both.
In step S5, make application initialization and operate in the computer equipment, if application program is in operational process, move to the software developer and set the palpus verification, confirm the key point position of password, even this application program is sent solicited message to the monitoring process module, make the monitoring process module provide and contain application reference number, the encrypted message of key point position, when the monitoring process module is receiving after this request provides the information of encrypted message, just in its contained Application Password table, inquire about, and the encrypted message that will conform to returns to application program, then proceeds to step S6.
In step S6, make application program confirm at the encrypted message that the monitoring process module provides, if after this encrypted message is confirmed to pass through, carry out step S7 immediately, make application program continue operation, wrong as this keying material, then directly proceed to step S9.
In step S7, make application program in operational process, continue to judge whether to move to the key point position that other need ask the verification encrypted message, if application program is reruned to the key point position, even it re-executes step S5 to step S7, so that detection is inquired about in a plurality of key point positions that are set with encrypted message, the encrypted message that sets until whole key points position has all been confirmed to pass through, then proceeds to step S8.
In step S8, make application program entire run and function of providing the user to use in the computer equipment that has the relations of dependence with it.
In step S9, make this application program withdraw from the running environment that computer equipment provides, so as to stopping to carry out its contained contents of program.
Fig. 2 is a calcspar, be used to show the framework of security system for software of the present invention, as shown in the figure, security system for software 2 of the present invention be arranged on through mandate can this software of legal use A computer equipment 1 inside, the affirmation password that is used to cooperate the inner a plurality of key points of software A position to set provides corresponding encrypted message, make software A can operate in the computer equipment 1, and guarantee that software A after suffering bootlegging, can't operate on the unwarranted data processing equipment; This security system for software 2 comprises: power supply device 20, software input interface 21, processing unit 22, storage device 23 and monitoring process module 24; The software developer is at first in the implementation of the contained application program of software A, make a plurality of key points position that this application program can complete execution setting check password respectively, just this application program is set a plurality of affirmation passwords at diverse location by the software developer, the storing media of wanting to store software A as the user 3 is installed in the computer equipment 1 via the software input interface and when carrying out, must at first in computer equipment 1, increase by a monitoring process module 24, make this monitoring process module 24 and software input interface 21, processing unit 22, storage device 23 and power supply device 20 interconnect, and can prevent the security system for software 2 that software A moves so as to constituting on unwarranted data processing equipment; When the user opens the switch (figure is mark not) of computer equipment 1, external civil power is inputed in the computer equipment 1 via power supply device 20, required electric power so that inner contained each function element running of computer equipment 1 to be provided, wherein, monitoring process module 24 also brings into operation when computer equipment 1 activates, to safeguard the password table of all application programs, the operation of monitor application simultaneously, and the affirmation cipher inquiry information that application programs is sent is (as application reference number, projects such as key point position and password) handle accordingly and reply, when instructing the power-off of computer equipment 1, monitoring process module 24 is just out of service, to deposit the storage interface 3 of software A as the user and insert software input interface 21, so that software A is mounted to computer equipment 1, processing unit 22 read immediately and executive software A content in contained installation procedure, with the required application program of software 3 entire runs, link orders etc. are loaded in the storage device and deposit.In installation process, software A also collects information such as the hardware setting of computer equipment 1 and device version number simultaneously, as confirming in the future whether software A runs on the foundation of authorization computer equipment, after the installation procedure of software A is finished, the user gets final product the application program of executive software A and carries out data processing operation, when application program is moved, at first by the version number of processing unit 22 to computer equipment 1 query facility, if number being employed by the device version of computer equipment 1 response that program differentiates is mistake, then application program withdraws from the work of computer equipment 1 operation immediately, version number as computer equipment 1 passback confirms errorless after application program is differentiated, the hardware information of promptly representing computer equipment 1 conforms to the information that application program is collected in installation process, and application program can be at computer equipment 1 relaying reforwarding row.
Treat device version number be employed program detect pass through after, application program is carried out initialization immediately and is brought into operation, when application program moves to before key point 1 position of being set by the software developer, after this position needs verification to confirm that password is errorless, just can make processing unit 22 continue to carry out this application program, at this moment, the communication relation that application program as shown in Figure 3 and monitoring process module are 24, processing unit 22 sends the encrypted message that a request provides key point 1 position to monitoring process module 24, monitoring process module 24 is after receiving this request signal, to recording application program number, inquiry in the key point password table 241 of key point position and key point password, and return corresponding encrypted message and give processing unit 22, after application program confirms that this encrypted message meets the set affirmation password in key point 1 position, make processing unit continue to carry out its contents of program, encrypted message as passback is not the affirmation password that key point 1 position sets, then application program is out of service immediately, can't make processing unit 22 continue to carry out its contents of program; Then, when application program moves to other key point position, only need be by said procedure, and according to shown in Figure 3, at first provide corresponding encrypted message to 24 requests of monitoring process module, and confirming the correct follow-up reforwarding row of encrypted message, if encrypted message mistake, then withdraw from out of service immediately, inquire about and detect the affirmation password of a plurality of key points position whereby, all detect until the affirmation password of whole key points position and to pass through, application program could normal and complete operating in the computer equipment 1.
By method for protecting software of the present invention and system; confirm and set the multiple detection modes such as affirmation password of key point position by comprising device version; can improve the intensity of software protection; order is used software of the present invention and can't be moved on unwarranted data processing equipment; in addition; also can confirm password to change by regularly software being upgraded; and then guarantee the reliability of software encryption and protection; moreover; in response to the software protection measure of carrying out in operational process with program all is to be implemented voluntarily by application program; and need not make the user in the application program operational process, import product serial number or authentication code; so the authorized user is when using software; imperceptible application program is carried out the program of software encryption and protection; can remove the time of user's required consumption when Input Software is confirmed data (as product serial number and authorization code etc.) from, also can keep interactive smooth and easy.

Claims (10)

1.一种软件保护方法,用于限定软件中所含的应用程序仅可在特定的信息设备中运行,其特征在于,该方法包括:1. A software protection method, which is used to limit the application program contained in the software to only run in a specific information device, it is characterized in that the method comprises: (1)在应用程序执行过程中不同的关键点位置分别设定不同的密码信息;(1) Set different password information at different key points during the execution of the application; (2)在信息设备中增设可监视应用程序运行、并可接收应用程序发送的查询信息的监视进程模块;(2) Add a monitoring process module in the information equipment that can monitor the operation of the application program and receive the query information sent by the application program; (3)令应用程序向信息设备查询认证信息,若信息设备无法响应正确的认证信息,应用程序随即停止运行,如应用程序确定认证信息无误,即可进行初始化并继续运行;(3) Let the application program query the authentication information from the information device. If the information device cannot respond to the correct authentication information, the application program will stop running immediately. If the application program determines that the authentication information is correct, it can initialize and continue to run; (4)等应用程序运行至某一关键点位置时,即向监视进程模块请求提供与该关键点位置所设确认密码相对应的密码信息;以及(4) When the application program runs to a certain key point, it requests the monitoring process module to provide password information corresponding to the confirmation password set at the key point; and (5)令应用程序对监控进程模块所提供的识别资料进行确认,若确认通过,应用程序可继续运行,如否,则立即退出运行,随后,当应用程序再运行至其它关键点位置时,即重复步骤(4)到步骤(5),以对多个关键点位置的确认密码进行校验,并在所有关键点位置的确认密码均确认无误时,应用程序才能完整运行在信息设备中。(5) Make the application program confirm the identification data provided by the monitoring process module, if the confirmation is passed, the application program can continue to run, if not, then exit the operation immediately, and then, when the application program runs to other key points, That is, repeat steps (4) to (5) to verify the confirmation passwords at multiple key points, and only when the confirmation passwords at all key points are confirmed to be correct can the application program run completely in the information device. 2.如权利要求1所述的软件保护方法,其特征在于,该特定信息设备是指与软件安装时所收集的硬件信息相符合的信息设备。2. The software protection method according to claim 1, wherein the specific information device refers to an information device that matches the hardware information collected when the software is installed. 3.如权利要求1所述的软件保护方法,其特征在于,该信息设备是指可对电子资料进行处理的设备,该信息设备为个人计算机、笔记本型计算机、膝上型计算机、掌上型计算机及服务器中的一种。3. software protection method as claimed in claim 1, is characterized in that, this information equipment refers to the equipment that electronic data can be processed, and this information equipment is personal computer, notebook computer, laptop computer, palmtop computer and one of the servers. 4.如权利要求1所述的软件保护方法,其特征在于,该关键点位置是指应用程序在运行过程中,正常运行所需执行的程序内容及指令所组群组中的一种。4 . The software protection method according to claim 1 , wherein the key point location refers to one of a group consisting of program content and instructions that need to be executed for normal operation of the application program during its running. 5 . 5.如权利要求1所述的软件保护方法,其特征在于,该密码信息是应用程序编号、关键点位置及密码所组群组中的一种;认证信息则是指信息设备的设备版本号。5. The software protection method as claimed in claim 1, wherein the password information is one of the application number, key point position and password group; the authentication information refers to the device version number of the information device . 6.如权利要求1所述的软件保护方法,其特征在于,该监视进程模块是在信息设备激活时开始运行,并在信息设备关闭后结束,其用于维护所有应用程序的关键点密码表,该密码表的内容包括应用程序号、关键点号及关键点密码。6. The software protection method according to claim 1, wherein the monitoring process module starts running when the information device is activated, and ends after the information device is closed, and is used to maintain the key point password table of all application programs , the content of the password table includes application number, key point number and key point password. 7.一种软件保护系统,可根据软件保护方法的施行程序,防止储存媒介内存放的软件所含的应用程序被使用者复制,在非特定的信息设备上运行,其特征在于,该系统包括:7. A software protection system, which can prevent the application program contained in the software stored in the storage medium from being copied by the user according to the execution program of the software protection method, and run on a non-specific information device. It is characterized in that the system includes : 电源供应装置,提供系统内部所有器件工作所需的电源;The power supply device provides the power required for the operation of all devices in the system; 软件输入接口,置入存放有软件内容的储存媒介;The software input interface is inserted into the storage medium storing the software content; 储存装置,存放使用者所安装的软件;A storage device for storing the software installed by the user; 处理单元,与软件输入接口及储存装置电性连接,用于将软件从储存媒介安装至储存装置中,并可从储存装置加载软件并执行其所含的应用程序;以及The processing unit is electrically connected to the software input interface and the storage device, and is used to install the software from the storage medium into the storage device, and can load the software from the storage device and execute the application program contained therein; and 监视进程模块,与处理单元及储存装置电性连接,用于维护所有应用程序的关键点密码表,并同时监控应用程序的运行及等待应用程序发送密码信息的查询信息。The monitoring process module is electrically connected with the processing unit and the storage device, and is used for maintaining the key point password table of all application programs, and simultaneously monitoring the operation of the application programs and waiting for the query information of the application programs to send password information. 8.如权利要求7所述的软件保护系统,其特征在于,该软件保护系统组设在特定的信息设备内部。8. The software protection system according to claim 7, characterized in that, the software protection system is set inside a specific information device. 9.如权利要求8所述的软件保护系统,其特征在于,该特定的信息设备是指已被软件供应商授权使用软件/且其设备版本号可被软件确认通过的信息设备。9. The software protection system according to claim 8, wherein the specific information device refers to an information device that has been authorized by the software supplier to use the software/and whose device version number can be confirmed by the software. 10.如权利要求7所述的软件保护系统,其特征在于,该密码信息是应用程序编号、关键点位置及密码所组群组的一种。10. The software protection system according to claim 7, wherein the password information is a group consisting of application number, key point location and password.
CNB031569285A 2003-09-15 2003-09-15 Software protection method and system Expired - Fee Related CN1300697C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB031569285A CN1300697C (en) 2003-09-15 2003-09-15 Software protection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB031569285A CN1300697C (en) 2003-09-15 2003-09-15 Software protection method and system

Publications (2)

Publication Number Publication Date
CN1598781A CN1598781A (en) 2005-03-23
CN1300697C true CN1300697C (en) 2007-02-14

Family

ID=34660141

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB031569285A Expired - Fee Related CN1300697C (en) 2003-09-15 2003-09-15 Software protection method and system

Country Status (1)

Country Link
CN (1) CN1300697C (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635726B (en) * 2009-08-26 2012-07-04 中兴通讯股份有限公司 Service end of C/S architecture and service executing method and service executing system of client
CN102708310A (en) * 2012-01-12 2012-10-03 苏州百正信息科技有限公司 Registration code anti-piracy encryption method for computer software in batch production
CN103377332B (en) * 2012-04-26 2016-04-20 腾讯科技(深圳)有限公司 The method of access application and device
CN108206741A (en) * 2016-12-16 2018-06-26 北京国双科技有限公司 Verification method, the apparatus and system of service
CN107180169A (en) * 2017-06-12 2017-09-19 郑州云海信息技术有限公司 A kind of software activation method and device
US11321466B2 (en) * 2018-03-09 2022-05-03 Qualcomm Incorporated Integrated circuit data protection

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1121215A (en) * 1994-10-20 1996-04-24 联华电子股份有限公司 Software protection method and device
CN1131992A (en) * 1994-07-05 1996-09-25 株式会社前进 Security system for software
US5568550A (en) * 1994-10-05 1996-10-22 Shmuel Ur Method and system for identifying documents generated by an unauthorized software copy
US5935246A (en) * 1996-04-26 1999-08-10 International Computers Limited Electronic copy protection mechanism using challenge and response to prevent unauthorized execution of software
US6070171A (en) * 1998-05-15 2000-05-30 Palantir Software, Inc. Method and system for copy-tracking distributed software featuring tokens containing a key field and a usage field

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1131992A (en) * 1994-07-05 1996-09-25 株式会社前进 Security system for software
US5568550A (en) * 1994-10-05 1996-10-22 Shmuel Ur Method and system for identifying documents generated by an unauthorized software copy
CN1121215A (en) * 1994-10-20 1996-04-24 联华电子股份有限公司 Software protection method and device
US5935246A (en) * 1996-04-26 1999-08-10 International Computers Limited Electronic copy protection mechanism using challenge and response to prevent unauthorized execution of software
US6070171A (en) * 1998-05-15 2000-05-30 Palantir Software, Inc. Method and system for copy-tracking distributed software featuring tokens containing a key field and a usage field

Also Published As

Publication number Publication date
CN1598781A (en) 2005-03-23

Similar Documents

Publication Publication Date Title
Swanson et al. Generally accepted principles and practices for securing information technology systems
EP1443381B1 (en) System and method for secure software activation with volume licenses
RU2321055C2 (en) Device for protecting information from unsanctioned access for computers of informational and computing systems
CN100432960C (en) Electronic data management device and electronic data management method
US20160063256A1 (en) Methods, Systems, and Apparatuses for Managing a Hard Drive Security System
Cucoranu et al. Privacy and security of patient data in the pathology laboratory
US8473752B2 (en) Apparatus, system, and method for auditing access to secure data
CN102948114A (en) Single-use authentication method for accessing encrypted data
US20080235809A1 (en) Restricted erase and unlock of data storage devices
EP0689702A1 (en) A secure application card for sharing application data and procedures among a plurality of microprocessors
CN103597489A (en) Data custodian and curation system
JP2003500722A (en) Information protection method and device
CN101689237A (en) Activation system architecture
CN102053925A (en) Realization method of data encryption in hard disk
CN103649964A (en) Secure hosted execution architecture
US7596702B2 (en) Network storage devices
CN105005721A (en) Computer authorization starting control system and method based on computer starting key
US20080040613A1 (en) Apparatus, system, and method for secure password reset
US8528105B1 (en) System and method for ensuring security of data stored on electronic computing devices
CN1300697C (en) Software protection method and system
JP2000259276A (en) Password control device
US8694434B1 (en) Techniques for unregistering and transferring software licenses
US20200169581A1 (en) Endpoint security client embedded in storage drive firmware
US20040105547A1 (en) Software protection
Rao et al. Data backups and cloud computing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20070214

Termination date: 20100915