CN101539978B - Software protection method based on space - Google Patents

Software protection method based on space Download PDF

Info

Publication number
CN101539978B
CN101539978B CN2009100833160A CN200910083316A CN101539978B CN 101539978 B CN101539978 B CN 101539978B CN 2009100833160 A CN2009100833160 A CN 2009100833160A CN 200910083316 A CN200910083316 A CN 200910083316A CN 101539978 B CN101539978 B CN 101539978B
Authority
CN
China
Prior art keywords
address
key
intelligent key
key apparatus
intelligent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2009100833160A
Other languages
Chinese (zh)
Other versions
CN101539978A (en
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Feitian Technologies Co Ltd
Original Assignee
Beijing Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Feitian Technologies Co Ltd filed Critical Beijing Feitian Technologies Co Ltd
Priority to CN2009100833160A priority Critical patent/CN101539978B/en
Publication of CN101539978A publication Critical patent/CN101539978A/en
Application granted granted Critical
Publication of CN101539978B publication Critical patent/CN101539978B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a software protection method based on space and belongs to the technical field of information security. The technical proposal is that a first intelligent cipher key device is connected with a server computer; a second intelligent cipher key device is connected with a client computer; the client computer starts up the software installed inside the client computer; the software transmits an IP address obtaining request to the server computer; the server computer reads a self IP address, encrypts the IP address through the first intelligent cipher key device and transmits the IP address to the client computer; the client computer decrypts the encrypted IP address through the second intelligent cipher key device, judges whether the IP address is a legal IP address, if so, the second intelligent cipher key device is available, otherwise, the second intelligent cipher key device is unavailable. The invention binds the client software with the server IP address in the network, where the client software is, improves the security of the client software, and further increases software decryption difficulty after the IP address is encrypted for transmission.

Description

Method for protecting software based on the space
Technical field
The invention belongs to field of information security technology, relate in particular to a kind of method for protecting software based on the space.
Background technology
Intelligent key apparatus is a kind of small hardware device that has processor and storer, and it can be connected with computing machine by the data communication interface of computing machine.It has the key systematic function, but and the safe storage key, can preset the cryptographic algorithm function.The intelligent key apparatus computing relevant with key be fully at the device internal operation, and intelligent key apparatus has anti-characteristic of attacking, and security is high.USB Key is a kind of intelligent key apparatus of USB interface, and its built-in single-chip microcomputer or intelligent card chip can be stored user's key or digital certificate.
In Information technology flourishing day by day today, more and more comprising data message moves in computing machine with the software that relates to individual privacy and secret of the trade, and software that moves in the computing machine or software itself is artificially illegally distorted easily or because pirate and illegally duplicate, bring enormous economic loss for software users or developer, simultaneously further work can't be proceeded.
In the practical application, the example that has existed software that moves in the computing machine and the intelligent key apparatus binding that is connected in computing machine to use, to improve the security of the software that moves in the computing machine, yet, at present some softwares that contain high security information can only allow to move in the computing machine in certain computer or particular range, therefore, if illegal user by improper means obtained software and with the intelligent key apparatus of software binding, then can on other computing machine, use security software, bring massive losses to software users and security information.
Summary of the invention
For solving in the prior art, the invention provides a kind of method for protecting software based on the space in the problem that exists aspect the protecting computer software.
Technical scheme of the present invention is that a kind of method for protecting software based on the space is characterized in that described method comprises the following steps:
Steps A: first intelligent key apparatus is connected in the service end computing machine, and second intelligent key apparatus is connected in client computer;
Step B: described client computer starts its inner installed software, and described software sends and obtains the IP Address requests to described service end computing machine;
Step C: described service end computing machine reads himself IP address, passes to described first intelligent key apparatus, and described first intelligent key apparatus is encrypted described IP address and sent to described client computer;
Step D: described client computer receives the IP address of described encryption, pass to described second intelligent key apparatus, after described second intelligent key apparatus is deciphered the IP address of described encryption, judge whether described IP address is legal IP address, if then described second intelligent key apparatus can be used; Otherwise described second intelligent key apparatus is unavailable.
First key has been preset in the described first intelligent key apparatus inside, and described first intelligent key apparatus is encrypted described IP address and is specially: described first intelligent key apparatus is with its described IP of first secret key encryption address of presetting;
Second key with described first key match has been preset in the described second intelligent key apparatus inside, and described second intelligent key apparatus is deciphered described encryption IP address and is specially: described second intelligent key apparatus is with the IP address of its described encryption of second secret key decryption of presetting.
Described first key and described second key are that identical symmetric key or unsymmetrical key inequality are right.
After described client computer started its inner installed software, described software sent and obtains the IP Address requests to before the described service end computing machine, also comprises:
Described software sends the obtaining communication key request to described service end computing machine;
Described service end computer random generates communication key, is stored in first intelligent key apparatus, and sends client computer after first secret key encryption of first intelligent key apparatus;
Described client computer receives the communication key after the described encryption, after described second intelligent key apparatus, second secret key decryption, is stored in second intelligent key apparatus.
The described IP of obtaining Address requests also comprises communication key, then before described service end computing machine reads himself IP address, also comprise: described client computer generates described communication key at random and is stored in second intelligent key apparatus, and second secret key encryption in described second intelligent key apparatus comprises the concurrent service end computing machine that send of the described IP of the obtaining Address requests of communication key;
Described service end computing machine receive described encryption comprise communication key obtain the IP Address requests, after described first intelligent key apparatus, first secret key decryption, store described communication key in first intelligent key apparatus.
Described first intelligent key apparatus is encrypted described IP address, also is specially: described first intelligent key apparatus is encrypted described IP address with the communication key of its storage.
Described second intelligent key apparatus is deciphered the IP address of described encryption, also is specially: described second intelligent key apparatus is deciphered the IP address of described encryption with the communication key of its storage.
The legitimate ip address tabulation has been preset in the described second intelligent key apparatus inside.
Describedly judge whether described IP address is legal IP address, be specially: after described second intelligent key apparatus deciphering obtains described IP address, the legitimate ip address tabulation that more described IP presets with it address, if described IP address is in described legitimate ip address tabulation scope, then described IP address is legal; Otherwise described IP address is illegal.
A kind of method for protecting software provided by the invention based on the space; realized the binding of service end Computer IP address in the client computer software network of living in it; make the software of protecting can only provide at the service end computing machine in its belonging network under the situation of service and could move; the support of leaving service end then can not move; improved the security of client software; the transmission of IP address simultaneously needs the encryption of intelligent key apparatus, has further improved software and has cracked difficulty.
Description of drawings
Fig. 1 is the process flow diagram of a kind of method for protecting software based on the space of providing of the embodiment of the invention one.
Fig. 2 is the process flow diagram of a kind of method for protecting software based on the space of providing of the embodiment of the invention two.
Embodiment
Below in conjunction with accompanying drawing, preferred embodiment is elaborated.Should be emphasized that following explanation only is exemplary, rather than in order to limit the scope of the invention and to use.
The technology that the software that moves in the present protection client computer generally uses comprises: encryption, software combine operation etc. with client computer binding, software with software protecting equipment; the present invention aims to provide a kind of new software protection thought: based on the method for protecting software in space; promptly be communicated with client computer and service end computing machine with certain internetwork connection mode; make the software that moves in the client computer and the IP address binding of service end computing machine, be elaborated below in conjunction with specific embodiment.
Embodiment one:
Fig. 1 is the process flow diagram of a kind of method for protecting software based on the space of providing of the embodiment of the invention.Among Fig. 1, running software is in client computer, and client computer and service end computing machine all are connected in intelligent key apparatus, transmits the IP address by intelligent key apparatus, specifically comprises:
Embodiment one,
Step 101, first intelligent key apparatus is connected in the service end computing machine, and second intelligent key apparatus is connected in client computer.
Particularly, preset first key in first intelligent key apparatus, preset second key in second intelligent key apparatus with first key match, first key, second key is generated by first (two) intelligent key apparatus, and with second (the first) key transmission, second (one) intelligent key apparatus, or first key, second key is generated by cryptographic algorithm storehouses such as Openssl, send first key then to first intelligent key apparatus, second key sends to second intelligent key apparatus, wherein, above-mentioned several first key, the second key generating mode is the preferable implementation of present embodiment, can not be as limitation of the present invention.
Wherein, first key, second key can be identical symmetric keys, as 3DES, also can be that unsymmetrical key inequality is right, as: RSA.
Step 102, client computer starts internal software, and this software sends to the service end computing machine and obtains the IP Address requests.
Step 103, service end receive after this obtains the IP Address requests, obtain the IP address of himself, after first secret key encryption of presetting in first intelligent key apparatus, send to client computer;
Wherein, the process of encryption IP address is given an example in conjunction with above-mentioned in the inner realization of first intelligent key apparatus, and this step implementation procedure is as follows:
First intelligent key apparatus is parameter portion's encryption within it with the first key FirstKey and service end IP address Server Ip, and service end IP address, output encryption back, and reference function is:
Encrypt?Use?FirstKey(FirstKey,ServerIp,&EncryptedServerIp)
Step 104, client computer receive the IP address of encryption, and the IP address that will encrypt then sends to second intelligent key apparatus, and second intelligent key apparatus obtains service end Computer IP address with its second secret key decryption that presets;
Wherein, carry out in second intelligent key apparatus IP address of enabling decryption of encrypted, gives an example in conjunction with above-mentioned, and this step implementation procedure is as follows:
Client computer receives the IP address of encrypting, and reference function is:
Receive(&EncryptedServerIp);
Service end IP address EncryptedServerIp is the parameter deciphering to second intelligent key apparatus with the second key SecondKey and after encrypting, and output service end IP, and reference function is:
DecryptUseSecondKey(SecondKey,EncryptedServerIp,&ServerIp)
In the present embodiment, first key can not leave first intelligent key apparatus, and second key can not leave second intelligent key apparatus.
In the practical application, do not receive the IP address of encryption in the time range that client computer is being preset, then second intelligent key apparatus is unavailable, and the operation of client computer software anomaly is with step 107.
Step 105, second intelligent key apparatus judge that plaintext service end Computer IP address after this deciphering whether in the legitimate ip address scope, is that second intelligent key apparatus can be used, execution in step 106; Not, second intelligent key apparatus is unavailable, execution in step 107;
Wherein, preset the legitimate ip address tabulation in second intelligent key apparatus, stored the legal IP address scope in the form, judge by it whether legal process is for service end Computer IP address expressly: the second intelligent key apparatus relatively legitimate ip address that presets with it of this plaintext service end Computer IP address is tabulated, if comprise the plaintext service end Computer IP address that deciphering obtains in the legitimate ip address scope of storage in the legitimate ip address that second intelligent key apparatus presets tabulation, then, second intelligent key apparatus can be used, execution in step 106, otherwise, execution in step 107, wherein, can also only store a fixed IP addresses in the above-mentioned legitimate ip address tabulation, relatively decipher the plaintext service end Computer IP address that obtains, judge whether second intelligent key apparatus is available by this fixed ip address.
Step 106, client computer is in conjunction with the second intelligent key apparatus operating software;
Step 107, second intelligent key apparatus is unavailable, client computer software anomaly operation, wherein misoperation be software out of service, return error code or system crash, above-mentioned only is the implementation of present embodiment, as the qualification to present embodiment.
Embodiment two,
As shown in Figure 2, a kind of method for protecting software that the embodiment of the invention provides based on the space, wherein; running software is in client computer; client computer and service end computing machine all are connected in intelligent key apparatus, transmit the IP address by intelligent key apparatus, also specifically comprise:
Step 201, first intelligent key apparatus is connected in the service end computing machine, and second intelligent key apparatus is connected in client computer;
Particularly, preset first key in first intelligent key apparatus, preset second key in second intelligent key apparatus with first key match.First key, the second key generative process repeat no more with step 101.。
Wherein, first key, second key can be identical symmetric keys, as 3DES, also can be that unsymmetrical key inequality is right, as: RSA.
Step 202, client computer starts internal software, and this software sends the obtaining communication key request to the service end computing machine;
Step 203 after the service end computing machine receives the obtaining communication key request, generates communication key at random, is stored in first intelligent key apparatus, and with sending to client computer after first secret key encryption of storing in this first intelligent key apparatus;
Wherein, communication key is the DES key of the 3DES key of 16 bytes that generate at random of first intelligent key apparatus of service end or 8 bytes or other, and communication key is specially the 3DES key of 16 bytes in the present embodiment, and then actual implementation procedure is as follows:
Generate communication key, coded communication key at random all in the inner realization of first intelligent key apparatus, process is as follows:
First intelligent key apparatus generates communication key at random, and reference function is:
Generate3DES?Key(3DES?Key);
First intelligent key apparatus is that parameter is encrypted with the communication key 3DES Key and the first key FirstKey, and output encryption back communication key 3DES Key, and reference function is:
Encrypt(FirstKey,3DES?Key,&Encrypted3DES?Key)。
Step 204, client computer receives the communication key of first secret key encryption, directly the communication key that will encrypt sends to second intelligent key apparatus, second intelligent key apparatus is with second secret key decryption of its storage, obtain the Random Communication key that service end generates, and storage, client computer software sends to the service end computing machine and obtains the IP Address requests then.
Wherein, decrypting process carries out in the second intelligent key apparatus inside, gives an example in conjunction with above-mentioned, and this step implementation procedure is as follows:
Communication key after the encryption of client computer reception service end computing machine output, reference function is: Receive (﹠amp; Encrypted3DES Key);
Second intelligent key apparatus is the parameter deciphering to encrypt the back communication key 3DES Key and the second key SecondKey, and the communication key after the output deciphering, and reference function is:
Decrypt(SecondKey,Encrypted3DES?Key,&3DES?Key)。
Step 205, service end computing machine read the IP address of himself, and encrypt with the communication key that generates at random, and send to client computer.
Wherein, the process of encrypting self IP address realizes in that first intelligent key apparatus is inner, in conjunction with above-mentioned for example, this step implementation procedure is as follows:
First intelligent key apparatus is that parameter is encrypted and back service end Computer IP address EncryptedServerIp is encrypted in output with communication key 3DES Key and service end Computer IP address ServerIp, and its reference function is:
EncryptUse3DES?Des(3DES?Key,ServerIp,&EncryptedServerIp)。
Step 206, client computer receive the IP address of encryption, and the IP address that will encrypt then sends to second intelligent key apparatus, and the Random Communication secret key decryption that second intelligent key apparatus obtains with its deciphering obtains the IP address of service end computing machine.
Wherein, carry out in second intelligent key apparatus IP address of enabling decryption of encrypted, gives an example in conjunction with above-mentioned, and this step implementation procedure is as follows:
Client computer receives the service end Computer IP address of encryption, and reference function is: Receive (﹠amp; EncryptedServerIp);
Second intelligent key apparatus is with communication key 3DesKey, and encrypting service end Computer IP address, back is the parameter deciphering, and output service end Computer IP address, and reference function is:
DecryptUse3DES?Key(3DES?Key,EncryptedServerIp,&ServerIp)。
In the present embodiment, first key can not leave first intelligent key apparatus, and second key can not leave second intelligent key apparatus.
In the practical application, do not receive the IP address of encryption in the time range that client computer is being preset, then second intelligent key apparatus is unavailable, and client computer software is out of service, with step 209.
Step 207, second intelligent key apparatus are judged plaintext service end Computer IP address after this deciphering whether in the legitimate ip address scope, if then second intelligent key apparatus can be used, and execution in step 208; Otherwise second intelligent key apparatus is unavailable, execution in step 209;
Wherein, preset the legitimate ip address tabulation in second intelligent key apparatus, stored the legal IP address scope in the form, judge by it whether legal process is for service end Computer IP address expressly: the second intelligent key apparatus relatively legitimate ip address that presets with it of this plaintext service end Computer IP address is tabulated, if comprise the plaintext service end Computer IP address that deciphering obtains in the legitimate ip address scope of storage in the legitimate ip address that second intelligent key apparatus presets tabulation, then second intelligent key apparatus can be used, execution in step 208; Otherwise, execution in step 209.Wherein, can also only store a fixed IP addresses in the above-mentioned legitimate ip address tabulation, relatively decipher the plaintext service end Computer IP address that obtains, judge whether second intelligent key apparatus is available by this fixed ip address.
Step 208, client computer is in conjunction with the second intelligent key apparatus operating software.
Step 209, second intelligent key apparatus is unavailable, and client computer software is out of service.
In the present embodiment, set up on their own when the IP address and be judged as after relatively when illegal, second intelligent key apparatus is unavailable, so when the client computer running software, in the time of need visiting second intelligent key apparatus frequently, (such as, client computer software section function writes second intelligent key apparatus, then need call the function that writes in second intelligent key apparatus during client computer running software) and second intelligent key apparatus is unavailable, then client computer software is out of service.In the practical application; can also set up on their own when the IP address and be judged as after relatively when illegal; second intelligent key apparatus returns error code or not by computer Recognition; then; software anomaly operates to and returns error code or the above-mentioned just preferable implementation of present embodiment of giving an example of system crash; can not be as restriction of the present invention, the replacement in its practical application still belongs to protection scope of the present invention.
Replaceable, step 202 to step 204 can also be following step:
Step 202 ', client computer generates communication key at random, second secret key encryption that client computer presets in the service end computing machine sends by its second intelligent key apparatus comprise communication key obtain the IP Address requests.
Step 203 ', the service end computing machine receives after this obtains the IP Address requests, with first secret key decryption of storing in connected first intelligent key apparatus, obtains this and obtains the communication key that comprises in the IP Address requests, is stored in first intelligent key apparatus.
Wherein, communication key is the DES key of the 3DES key of 16 bytes that generate at random of second intelligent key apparatus of client or 8 bytes or other, and communication key is specially the 3DES key of 16 bytes in the present embodiment.Generate communication key, coded communication key at random all in the inner realization of second intelligent key apparatus, process is as follows:
Second intelligent key apparatus generates communication key at random, and the reference function that generates random key is: Generate3DES Key (3DES Key);
Second intelligent key apparatus is that parameter is encrypted with the communication key 3DES Key and the second key SecondKey, and the communication key 3DES Key after the output encryption, and its reference function is:
Encrypt(SecondKey,3DES?Key,&Encrypted3DES?Key)。
In the practical application, can also communication key and IP address be formed a string data,, carry out the IP address and transmit by sending client after first secret key encryption by the service end computing machine.
In the practical application, can also in service end first intelligent key apparatus, preset the legitimate client IP address list, spendable client computer in the restriction service end network of living in.
The embodiment of the invention, preset the legitimate ip address tabulation in second intelligent key apparatus that client computer connects, when the IP Address requests is obtained in the transmission of client computer software to service end, send client computer behind the IP address encryption of service end with himself, making this software can only provide at the service end computing machine in its belonging network under the situation of service could move, its legitimacy also will be judged by the legitimate ip address tabulation by second intelligent key apparatus in the IP address of service end computing machine transmission simultaneously, guarantee that client computer is the legal computing machine in the service end genus network of living in.
A kind of method for protecting software that the embodiment of the invention provides based on the space; realized the binding of service end Computer IP address in client computer software and its belonging network; make the software of protecting can only provide at the service end computing machine in its belonging network under the situation of service and could move; the support of leaving service end then can not move; improved the security of client software; the transmission of IP address simultaneously needs the encryption of intelligent key apparatus, has further improved software and has cracked difficulty.
The above; only for the preferable embodiment of the present invention, but protection scope of the present invention is not limited thereto, and anyly is familiar with those skilled in the art in the technical scope that the present invention discloses; the variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection domain of claim.

Claims (7)

1. the method for protecting software based on the space is characterized in that, described method comprises the following steps:
Steps A: first intelligent key apparatus is connected in the service end computing machine, and second intelligent key apparatus is connected in client computer;
Step B: described client computer starts its inner installed software, and described software sends and obtains the IP Address requests to described service end computing machine;
Step C: described service end computing machine reads self IP address, passes to described first intelligent key apparatus, and described first intelligent key apparatus is encrypted described IP address and sent to described client computer;
Step D: described client computer receives the IP address of described encryption, pass to described second intelligent key apparatus, after described second intelligent key apparatus is deciphered the IP address of described encryption, judge whether described IP address is legal IP address, if, then described second intelligent key apparatus can be used, and client computer is in conjunction with the second intelligent key apparatus operating software; Otherwise described second intelligent key apparatus is unavailable;
The legitimate ip address tabulation has been preset in the described second intelligent key apparatus inside;
Describedly judge whether described IP address is that legal IP address is: after described second intelligent key apparatus deciphering obtains described IP address, the legitimate ip address tabulation that more described IP presets with it address, if described IP address is in described legitimate ip address tabulation scope, then described IP address is legal; Otherwise described IP address is illegal.
2. a kind of method for protecting software according to claim 1 based on the space, it is characterized in that, first key has been preset in the described first intelligent key apparatus inside, and described first intelligent key apparatus is encrypted described IP address and is specially: described first intelligent key apparatus is with its described IP of first secret key encryption address of presetting;
Second key with described first key match has been preset in the described second intelligent key apparatus inside, and described second intelligent key apparatus is deciphered described encryption IP address and is specially: described second intelligent key apparatus is with the IP address of its described encryption of second secret key decryption of presetting.
3. a kind of method for protecting software based on the space according to claim 2 is characterized in that, described first key and described second key are that identical symmetric key or unsymmetrical key inequality are right.
4. a kind of method for protecting software based on the space according to claim 1 is characterized in that, after described client computer started its inner installed software, described software sent and obtains the IP Address requests to before the service end computing machine, also comprises:
Described software sends the obtaining communication key request to described service end computing machine;
Described service end computer random generates communication key, is stored in first intelligent key apparatus, and sends client computer after first secret key encryption of first intelligent key apparatus;
Described client computer receives the communication key after the described encryption, after described second intelligent key apparatus, second secret key decryption, is stored in second intelligent key apparatus.
5. a kind of method for protecting software according to claim 1 based on the space, it is characterized in that, the described IP of obtaining Address requests also comprises communication key, then before described service end computing machine reads self IP address, also comprise: described client computer generates described communication key at random and is stored in second intelligent key apparatus, and second secret key encryption in described second intelligent key apparatus comprises that the described IP of the obtaining Address requests of communication key sends the service end computing machine;
Described service end computing machine receive described encryption comprise communication key obtain the IP Address requests, after described first intelligent key apparatus, first secret key decryption, store described communication key in first intelligent key apparatus.
6. a kind of method for protecting software based on the space according to claim 1 is characterized in that, described first intelligent key apparatus is encrypted described IP address, also is specially: described first intelligent key apparatus is encrypted described IP address with the communication key of its storage.
7. a kind of method for protecting software according to claim 1 based on the space; it is characterized in that; described second intelligent key apparatus is deciphered the IP address of described encryption, also is specially: described second intelligent key apparatus is deciphered the IP address of described encryption with the communication key of its storage.
CN2009100833160A 2009-04-29 2009-04-29 Software protection method based on space Expired - Fee Related CN101539978B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009100833160A CN101539978B (en) 2009-04-29 2009-04-29 Software protection method based on space

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100833160A CN101539978B (en) 2009-04-29 2009-04-29 Software protection method based on space

Publications (2)

Publication Number Publication Date
CN101539978A CN101539978A (en) 2009-09-23
CN101539978B true CN101539978B (en) 2011-08-17

Family

ID=41123162

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100833160A Expired - Fee Related CN101539978B (en) 2009-04-29 2009-04-29 Software protection method based on space

Country Status (1)

Country Link
CN (1) CN101539978B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102752311B (en) * 2012-07-16 2016-04-06 天地融科技股份有限公司 A kind of authentication method, system and device
CN106663151A (en) 2015-06-04 2017-05-10 华为技术有限公司 Software security protection method and device
CN105354447B (en) * 2015-11-01 2018-09-04 广州安士维信息科技有限公司 A method of protecting computer software is realized based on network communication
CN105426704B (en) * 2015-11-01 2018-05-01 佛山市电子政务科技有限公司 A kind of method that protecting computer software is realized based on network service

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1900941A (en) * 2006-04-28 2007-01-24 傅玉生 Computer safety protective method based on software identity identifying technology
CN1940801A (en) * 2005-09-28 2007-04-04 鸿富锦精密工业(深圳)有限公司 Software encryption system and method
CN101005361A (en) * 2007-01-22 2007-07-25 北京飞天诚信科技有限公司 Server and software protection method and system
CN101132282A (en) * 2007-09-13 2008-02-27 天津市天锻压力机有限公司 Control method for binding hardware login of user computer in LAN

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1940801A (en) * 2005-09-28 2007-04-04 鸿富锦精密工业(深圳)有限公司 Software encryption system and method
CN1900941A (en) * 2006-04-28 2007-01-24 傅玉生 Computer safety protective method based on software identity identifying technology
CN101005361A (en) * 2007-01-22 2007-07-25 北京飞天诚信科技有限公司 Server and software protection method and system
CN101132282A (en) * 2007-09-13 2008-02-27 天津市天锻压力机有限公司 Control method for binding hardware login of user computer in LAN

Also Published As

Publication number Publication date
CN101539978A (en) 2009-09-23

Similar Documents

Publication Publication Date Title
JP5815294B2 (en) Secure field programmable gate array (FPGA) architecture
CN101539977B (en) Method for protecting computer software
US20030074562A1 (en) Authentication receipt
CN1659821A (en) Method for secure data exchange between two devices
CN110868291B (en) Data encryption transmission method, device, system and storage medium
CN104253694A (en) Encrypting method for network data transmission
CN103678174A (en) Data safety method, storage device and data safety system
CN108809936B (en) Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
CN109684129B (en) Data backup recovery method, storage medium, encryption machine, client and server
CN107465665A (en) A kind of file encryption-decryption method based on fingerprint identification technology
CN111970114B (en) File encryption method, system, server and storage medium
CN104270242A (en) Encryption and decryption device used for network data encryption transmission
US20020021804A1 (en) System and method for data encryption
CN111884814B (en) Method and system for preventing intelligent terminal from being counterfeited
US9571273B2 (en) Method and system for the accelerated decryption of cryptographically protected user data units
CN103177225B (en) A kind of data managing method and system
CN104767766A (en) Web Service interface verification method, Web Service server and client side
CN101539978B (en) Software protection method based on space
CN111224958A (en) Data transmission method and system
CN110611679A (en) Data transmission method, device, equipment and system
CN102056156B (en) Computer Data Security is downloaded to the method and system of mobile terminal
CN109726584B (en) Cloud database key management system
CN100561913C (en) A kind of method of access code equipment
CN101325486B (en) Method and apparatus for transferring field permission cryptographic key
CN106972928B (en) Bastion machine private key management method, device and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: FEITIAN TECHNOLOGIES CO., LTD.

Free format text: FORMER NAME: BEIJING FEITIAN CHENGXIN TECHNOLOGY CO., LTD.

CP03 Change of name, title or address

Address after: 100085 Beijing city Haidian District Xueqing Road No. 9 Ebizal building B block 17 layer

Patentee after: Feitian Technologies Co.,Ltd.

Address before: 100083, Haidian District, Xueyuan Road, No. 40 research, 7 floor, 5 floor, Beijing

Patentee before: FEITIAN TECHNOLOGIES Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110817

CF01 Termination of patent right due to non-payment of annual fee