CN104134020A - Intelligent terminal software anti-piracy method and intelligent terminal software anti-piracy system based on network database - Google Patents

Intelligent terminal software anti-piracy method and intelligent terminal software anti-piracy system based on network database Download PDF

Info

Publication number
CN104134020A
CN104134020A CN201310164485.3A CN201310164485A CN104134020A CN 104134020 A CN104134020 A CN 104134020A CN 201310164485 A CN201310164485 A CN 201310164485A CN 104134020 A CN104134020 A CN 104134020A
Authority
CN
China
Prior art keywords
intelligent terminal
encrypt file
encipheror
exist
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310164485.3A
Other languages
Chinese (zh)
Inventor
杨高赟
尹锐
崔伯磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201310164485.3A priority Critical patent/CN104134020A/en
Publication of CN104134020A publication Critical patent/CN104134020A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs

Abstract

The invention discloses an intelligent terminal software anti-piracy method and an intelligent terminal software anti-piracy system based on a network database. The problem that software of products adopting the same intelligent chip scheme can be easily pirated is solved; the manufacturer software investment is protected; and the technological innovation is better promoted. The method and the system provided by the invention have the advantages that the hardware cost does not need to be increased; the use is simple; and the blank of similar products in the market is filled. According to the method, when an intelligent terminal is started up, whether an encrypted file exists or not is checked; if the encrypted file exists, whether contents of the encrypted file are legal or not is checked; if the contents of the encrypted file are legal, the intelligent terminal is normally started up to be used, and otherwise, the forced shutdown is carried out if the contents of the encrypted file are illegal; if the encrypted file does not exist, a terminal unique identifier is sent to an encrypting server on the network; the encrypting server judges whether the unique identifier exists in the database or not; if the unique identifier exists in the database, it can be explained that the unique identifier is used, an error message is sent to the terminal, and the forced shutdown is carried out after a terminal program receives the message; and if the identifier does not exist in the database, the encrypting server inserts the identifier into the database and hereby generates an encrypted string to be returned to the terminal program, the terminal hereby generates the encrypted file, and then, the terminal is normally started up to be used.

Description

A kind of intelligent terminal software method for preventing piracy and system of database Network Based
Technical field
The present invention relates to network service, software anti-pirate field, relates in particular to intelligent terminal software method for preventing piracy and the system of database Network Based.
Technical background
Along with the integrated level of intelligent chip is more and more higher, the replacement time is shorter and shorter, and many terminals producer is in order to put out a new product sooner, and buying others ripe scheme is good selection.The hardware platform of many like this different products is the same, and just the each producer of software section has done different customizations.This has hidden a great risk, if the product of certain producer is in great demand, is easy to be copied personation by people.Therefore, if can invent a cover system both can prevent piracy software for the production of, can prevent again for brush machine having great practical value and commercial value.
Summary of the invention
Object of the present invention is just to provide a kind of intelligent terminal software method for preventing piracy and system of database Network Based; solve the product that uses identical intelligent chip scheme; software, easily by pirate problem, has been protected manufacturer software input, promotes better technological innovation.And the present invention do not need to increase hardware cost, use simply, fill up the vacancy of market similar products.
According to an aspect of the present invention, provide a kind of intelligent terminal software method for preventing piracy of database Network Based, comprised the steps:
A. intelligent terminal completes in factory-assembled, and when start, system judges whether certain encrypt file exists;
If B. encrypt file exists, whether legal by a set of proof of algorithm file content, if do not conform to rule forced shutdown; If legal normal boot-strap uses;
If C. encrypt file does not exist, intelligent terminal is issued encryption server checking certain identification information.The latter checks in database whether have this identification information, if exist, returns to authentication failed information, and intelligent terminal is by automatic shutdown; If do not exist, return to a string key to intelligent terminal, the latter generates encrypt file accordingly, then normally uses.
D., after intelligent terminal is sold, each start all can be checked this encrypt file, if do not exist, and forced shutdown; If exist, verify that whether content is legal, only have legal could continuation to use.
Wherein, steps A is specially:
A1. when intelligent terminal is started shooting, system starts encipheror, and the latter searches certain encrypt file;
A2. this file is not that system carries, and is below according to some Information generations.
Wherein, step B is specially:
If B1. system exists certain encrypt file, whether encipheror is legal by this file content of a set of proof of algorithm;
If B2. legal, normal boot-strap uses; If illegal, forced shutdown.
Wherein, step C is specially:
C1. the encipheror on intelligent terminal is issued the encryption server on network by TCP/UDP agreement unique identification information;
C2. encryption server is searched database, sees whether this identification information exists, if exist explanation to be used, returns to authentication failed message to encipheror on intelligent terminal, and the latter shuts down forced system; If this identification information does not exist, will be this identification information write into Databasce, and a string key is returned to encipheror on intelligent terminal, after generate accordingly encrypt file.
Wherein, step D is specially:
D1. after intelligent terminal is sold, start at every turn, encipheror all can be checked this encrypt file;
D2. only have this encrypt file to exist and content legality, could normally use; Otherwise system is by automatic shutdown.
Wherein, described system comprises:
Encipheror on intelligent terminal;
Encryption server;
Wired or wireless network, for above between the two network service path is provided.
Wherein, the encipheror on described intelligent terminal comprises:
Search encrypt file module, be responsible for checking encrypt file, and checking encrypted content;
Generate encrypt file module, be responsible for producing encrypt file;
Network communication module, is responsible for communicating by letter with encryption server;
Forced shutdown module, is responsible for forcing system power supply to be closed.
Wherein, described encryption server comprises:
Network communication module, is responsible for communicating by letter with encipheror on intelligent terminal, and refusal disabled user connect;
Database processing module, is responsible for the storehouse that reads and writes data, and searches or write relevant information;
Key production module, generates key string according to certain rule, sends to encipheror on intelligent terminal;
Wherein, described intelligent terminal comprises:
Smart mobile phone, Intelligent flat computer, Intelligent set top box etc.;
Compare with existing similar techniques, beneficial effect of the present invention exists: for using the manufacturer of identical intelligent chip scheme, not needing to revise hardware, do not increase in the situation of hardware cost, realized the software anti-pirate solution of a set of simple possible.
Brief description of the drawings
Fig. 1 is that the terminal software that the embodiment of the present invention provides is encrypted and checking process flow diagram;
Embodiment
Below in conjunction with accompanying drawing, the preferred embodiment of the present invention is elaborated, it should be pointed out that following illustrated preferred embodiment, only for explaining and explanation the present invention, is not intended to limit the present invention.
Fig. 1 is that the terminal software that the embodiment of the present invention provides is encrypted and checking process flow diagram. as shown in Figure 1, intelligent terminal start s11, inspection be there is certain encrypt file s12 by whether system; If exist according to the whether legal s18 of certain proof of algorithm file content, legal normal boot-strap uses s17, non-rule forced shutdown s19.If encrypt file does not exist, system will send to the unique identifier of this intelligent terminal the close server s13 that on network, appointment adds.Encryption server judges whether this unique identification exists in database, if exist explanation to be used, returns to error message to this terminal s20, and the program in terminal obtains forced shutdown s19 after this message; If mark does not exist in database, encryption server will and generate accordingly an encryption string this unique identification write into Databasce and send to terminal s15.Terminal program is received and is encrypted after string, generates accordingly encrypt file s16, then system normal boot-strap use s17.
Although above the present invention is had been described in detail, the invention is not restricted to this, those skilled in the art of the present technique can carry out various amendments according to know-why of the present invention.Therefore, all amendments of doing according to the principle of the invention, all should be understood to fall into protection scope of the present invention.

Claims (9)

1. intelligent terminal software method for preventing piracy and the system of database Network Based, is characterized in that, described method comprises the steps:
A. intelligent terminal completes in factory-assembled, and when start, system judges whether certain encrypt file exists;
If B. encrypt file exists, whether legal by a set of proof of algorithm file content, if do not conform to rule forced shutdown; If legal normal boot-strap uses;
If C. encrypt file does not exist, intelligent terminal is issued encryption server checking certain identification information.The latter checks in database whether have this identification information, if exist, returns to authentication failed information, and intelligent terminal is by automatic shutdown; If do not exist, return to a string key to intelligent terminal, the latter generates encrypt file accordingly, then normally uses.
D., after intelligent terminal is sold, each start all can be checked this encrypt file, if do not exist, and forced shutdown; If exist, verify that whether content is legal, only have legal could continuation to use.
2. method according to claim 1, is characterized in that, described steps A is specially:
A1. when intelligent terminal is started shooting, system starts encipheror, and the latter searches certain encrypt file;
A2. this file is not that system carries, and is below according to some Information generations.
3. method according to claim 1, is characterized in that, described step B is specially:
If B1. system exists certain encrypt file, whether encipheror is legal by this file content of a set of proof of algorithm;
If B2. legal, normal boot-strap uses; If illegal, forced shutdown.
4. method according to claim 1, is characterized in that, described step C is specially:
C1. the encipheror on intelligent terminal is issued the encryption server on network by TCP/UDP agreement unique identification information;
C2. encryption server is searched database, sees whether this identification information exists, if exist explanation to be used, returns to authentication failed message to encipheror on intelligent terminal, and the latter shuts down forced system; If this identification information does not exist, will be this identification information write into Databasce, and a string key is returned to encipheror on intelligent terminal, after generate accordingly encrypt file.
5. method according to claim 1, is characterized in that, described step D is specially:
D1. after intelligent terminal is sold, start at every turn, encipheror all can be checked this encrypt file;
D2. only have this encrypt file to exist and content legality, could normally use; Otherwise system is by automatic shutdown.
6. an intelligent terminal software anti-piracy for database Network Based, is characterized in that, described system comprises:
Encipheror on intelligent terminal;
Encryption server;
Wired or wireless network, for above between the two network service path is provided.
7. according to the method described in right 1 to 6 any one, it is characterized in that, the encipheror on described intelligent terminal comprises:
Search encrypt file module, be responsible for checking encrypt file, and checking encrypted content;
Generate encrypt file module, be responsible for producing encrypt file;
Network communication module, is responsible for communicating by letter with encryption server;
Forced shutdown module, is responsible for forcing system power supply to be closed.
8. according to the method described in right 1 to 6 any one, it is characterized in that, described encryption server comprises:
Network communication module, is responsible for communicating by letter with encipheror on intelligent terminal, and refusal disabled user connect;
Database processing module, is responsible for the storehouse that reads and writes data, and searches or write relevant information;
Key production module, generates key string according to certain rule, sends to encipheror on intelligent terminal.
9. according to the method described in right 1 to 6 any one, it is characterized in that, described intelligent terminal comprises:
Smart mobile phone, Intelligent flat computer, Intelligent set top box etc.
CN201310164485.3A 2013-05-03 2013-05-03 Intelligent terminal software anti-piracy method and intelligent terminal software anti-piracy system based on network database Pending CN104134020A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310164485.3A CN104134020A (en) 2013-05-03 2013-05-03 Intelligent terminal software anti-piracy method and intelligent terminal software anti-piracy system based on network database

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310164485.3A CN104134020A (en) 2013-05-03 2013-05-03 Intelligent terminal software anti-piracy method and intelligent terminal software anti-piracy system based on network database

Publications (1)

Publication Number Publication Date
CN104134020A true CN104134020A (en) 2014-11-05

Family

ID=51806695

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310164485.3A Pending CN104134020A (en) 2013-05-03 2013-05-03 Intelligent terminal software anti-piracy method and intelligent terminal software anti-piracy system based on network database

Country Status (1)

Country Link
CN (1) CN104134020A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105335667A (en) * 2015-10-16 2016-02-17 北京源创云网络科技有限公司 Innovation and creativity data processing method, device and system and certificate storing equipment
CN109564598A (en) * 2017-03-13 2019-04-02 华为技术有限公司 A kind of endpoint detection methods and terminal
CN113141362A (en) * 2021-04-22 2021-07-20 中山亿联智能科技有限公司 Intelligent terminal and server safety interaction control method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105335667A (en) * 2015-10-16 2016-02-17 北京源创云网络科技有限公司 Innovation and creativity data processing method, device and system and certificate storing equipment
CN105335667B (en) * 2015-10-16 2017-03-15 北京源创云网络科技有限公司 Innovate creative data processing method, device, system and deposit card equipment
CN109564598A (en) * 2017-03-13 2019-04-02 华为技术有限公司 A kind of endpoint detection methods and terminal
CN113141362A (en) * 2021-04-22 2021-07-20 中山亿联智能科技有限公司 Intelligent terminal and server safety interaction control method

Similar Documents

Publication Publication Date Title
CN101908119B (en) Method and device for processing dynamic link library (DLL) file
CN103906054A (en) Method and system for authorization of software function modules of internet of things
CN103123709A (en) Bar-code-based information verification system
JP5837219B2 (en) Method and system for lending digital content
CN104463026B (en) A kind of system and method for the anti-flight of hardware
CN106503494A (en) A kind of firmware protection location and guard method with flash memory microcontroller on piece
CN105631361A (en) Application program channel source identification method and device
US20150067719A1 (en) Method for controlling digital film play-count and a system thereof
CN103186723B (en) The method and system of digital content security cooperation
CN104966003A (en) Encryption and verification method for embedded equipment
CN104134020A (en) Intelligent terminal software anti-piracy method and intelligent terminal software anti-piracy system based on network database
CN104683299A (en) Control method for software registration, authentication server and terminal
CN110969445A (en) Anti-counterfeiting method based on NFC
US8612771B2 (en) Verifying authenticity of playback device
KR101559380B1 (en) Apparatus and method for obfuscating contents
CN103324868A (en) Copyright protection audio and video cloud application system
US20140230068A1 (en) System and method for packaging and authenticating a software product
CN105930713A (en) Method and terminal for generating identifying codes
CN105022651B (en) A kind of method for preventing piracy in equipment production process and firmware programming device
KR101744697B1 (en) Encoded Package Manufacturing and Transmission System for E-training Contents
CN107273255A (en) A kind of electronic equipment hardware verification method
CN103198241A (en) Safety management method for software license
CN113868691B (en) Authorized operation method and device of block chain based on cloud-native technology
CN109471810B (en) Hardware configuration validation method and device
CN102332066A (en) Authentication management system and method of code jumping chip identification codes

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20141105