CN104134020A - Intelligent terminal software anti-piracy method and intelligent terminal software anti-piracy system based on network database - Google Patents
Intelligent terminal software anti-piracy method and intelligent terminal software anti-piracy system based on network database Download PDFInfo
- Publication number
- CN104134020A CN104134020A CN201310164485.3A CN201310164485A CN104134020A CN 104134020 A CN104134020 A CN 104134020A CN 201310164485 A CN201310164485 A CN 201310164485A CN 104134020 A CN104134020 A CN 104134020A
- Authority
- CN
- China
- Prior art keywords
- intelligent terminal
- encrypt file
- encipheror
- exist
- database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 16
- 238000004519 manufacturing process Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
Abstract
The invention discloses an intelligent terminal software anti-piracy method and an intelligent terminal software anti-piracy system based on a network database. The problem that software of products adopting the same intelligent chip scheme can be easily pirated is solved; the manufacturer software investment is protected; and the technological innovation is better promoted. The method and the system provided by the invention have the advantages that the hardware cost does not need to be increased; the use is simple; and the blank of similar products in the market is filled. According to the method, when an intelligent terminal is started up, whether an encrypted file exists or not is checked; if the encrypted file exists, whether contents of the encrypted file are legal or not is checked; if the contents of the encrypted file are legal, the intelligent terminal is normally started up to be used, and otherwise, the forced shutdown is carried out if the contents of the encrypted file are illegal; if the encrypted file does not exist, a terminal unique identifier is sent to an encrypting server on the network; the encrypting server judges whether the unique identifier exists in the database or not; if the unique identifier exists in the database, it can be explained that the unique identifier is used, an error message is sent to the terminal, and the forced shutdown is carried out after a terminal program receives the message; and if the identifier does not exist in the database, the encrypting server inserts the identifier into the database and hereby generates an encrypted string to be returned to the terminal program, the terminal hereby generates the encrypted file, and then, the terminal is normally started up to be used.
Description
Technical field
The present invention relates to network service, software anti-pirate field, relates in particular to intelligent terminal software method for preventing piracy and the system of database Network Based.
Technical background
Along with the integrated level of intelligent chip is more and more higher, the replacement time is shorter and shorter, and many terminals producer is in order to put out a new product sooner, and buying others ripe scheme is good selection.The hardware platform of many like this different products is the same, and just the each producer of software section has done different customizations.This has hidden a great risk, if the product of certain producer is in great demand, is easy to be copied personation by people.Therefore, if can invent a cover system both can prevent piracy software for the production of, can prevent again for brush machine having great practical value and commercial value.
Summary of the invention
Object of the present invention is just to provide a kind of intelligent terminal software method for preventing piracy and system of database Network Based; solve the product that uses identical intelligent chip scheme; software, easily by pirate problem, has been protected manufacturer software input, promotes better technological innovation.And the present invention do not need to increase hardware cost, use simply, fill up the vacancy of market similar products.
According to an aspect of the present invention, provide a kind of intelligent terminal software method for preventing piracy of database Network Based, comprised the steps:
A. intelligent terminal completes in factory-assembled, and when start, system judges whether certain encrypt file exists;
If B. encrypt file exists, whether legal by a set of proof of algorithm file content, if do not conform to rule forced shutdown; If legal normal boot-strap uses;
If C. encrypt file does not exist, intelligent terminal is issued encryption server checking certain identification information.The latter checks in database whether have this identification information, if exist, returns to authentication failed information, and intelligent terminal is by automatic shutdown; If do not exist, return to a string key to intelligent terminal, the latter generates encrypt file accordingly, then normally uses.
D., after intelligent terminal is sold, each start all can be checked this encrypt file, if do not exist, and forced shutdown; If exist, verify that whether content is legal, only have legal could continuation to use.
Wherein, steps A is specially:
A1. when intelligent terminal is started shooting, system starts encipheror, and the latter searches certain encrypt file;
A2. this file is not that system carries, and is below according to some Information generations.
Wherein, step B is specially:
If B1. system exists certain encrypt file, whether encipheror is legal by this file content of a set of proof of algorithm;
If B2. legal, normal boot-strap uses; If illegal, forced shutdown.
Wherein, step C is specially:
C1. the encipheror on intelligent terminal is issued the encryption server on network by TCP/UDP agreement unique identification information;
C2. encryption server is searched database, sees whether this identification information exists, if exist explanation to be used, returns to authentication failed message to encipheror on intelligent terminal, and the latter shuts down forced system; If this identification information does not exist, will be this identification information write into Databasce, and a string key is returned to encipheror on intelligent terminal, after generate accordingly encrypt file.
Wherein, step D is specially:
D1. after intelligent terminal is sold, start at every turn, encipheror all can be checked this encrypt file;
D2. only have this encrypt file to exist and content legality, could normally use; Otherwise system is by automatic shutdown.
Wherein, described system comprises:
Encipheror on intelligent terminal;
Encryption server;
Wired or wireless network, for above between the two network service path is provided.
Wherein, the encipheror on described intelligent terminal comprises:
Search encrypt file module, be responsible for checking encrypt file, and checking encrypted content;
Generate encrypt file module, be responsible for producing encrypt file;
Network communication module, is responsible for communicating by letter with encryption server;
Forced shutdown module, is responsible for forcing system power supply to be closed.
Wherein, described encryption server comprises:
Network communication module, is responsible for communicating by letter with encipheror on intelligent terminal, and refusal disabled user connect;
Database processing module, is responsible for the storehouse that reads and writes data, and searches or write relevant information;
Key production module, generates key string according to certain rule, sends to encipheror on intelligent terminal;
Wherein, described intelligent terminal comprises:
Smart mobile phone, Intelligent flat computer, Intelligent set top box etc.;
Compare with existing similar techniques, beneficial effect of the present invention exists: for using the manufacturer of identical intelligent chip scheme, not needing to revise hardware, do not increase in the situation of hardware cost, realized the software anti-pirate solution of a set of simple possible.
Brief description of the drawings
Fig. 1 is that the terminal software that the embodiment of the present invention provides is encrypted and checking process flow diagram;
Embodiment
Below in conjunction with accompanying drawing, the preferred embodiment of the present invention is elaborated, it should be pointed out that following illustrated preferred embodiment, only for explaining and explanation the present invention, is not intended to limit the present invention.
Fig. 1 is that the terminal software that the embodiment of the present invention provides is encrypted and checking process flow diagram. as shown in Figure 1, intelligent terminal start s11, inspection be there is certain encrypt file s12 by whether system; If exist according to the whether legal s18 of certain proof of algorithm file content, legal normal boot-strap uses s17, non-rule forced shutdown s19.If encrypt file does not exist, system will send to the unique identifier of this intelligent terminal the close server s13 that on network, appointment adds.Encryption server judges whether this unique identification exists in database, if exist explanation to be used, returns to error message to this terminal s20, and the program in terminal obtains forced shutdown s19 after this message; If mark does not exist in database, encryption server will and generate accordingly an encryption string this unique identification write into Databasce and send to terminal s15.Terminal program is received and is encrypted after string, generates accordingly encrypt file s16, then system normal boot-strap use s17.
Although above the present invention is had been described in detail, the invention is not restricted to this, those skilled in the art of the present technique can carry out various amendments according to know-why of the present invention.Therefore, all amendments of doing according to the principle of the invention, all should be understood to fall into protection scope of the present invention.
Claims (9)
1. intelligent terminal software method for preventing piracy and the system of database Network Based, is characterized in that, described method comprises the steps:
A. intelligent terminal completes in factory-assembled, and when start, system judges whether certain encrypt file exists;
If B. encrypt file exists, whether legal by a set of proof of algorithm file content, if do not conform to rule forced shutdown; If legal normal boot-strap uses;
If C. encrypt file does not exist, intelligent terminal is issued encryption server checking certain identification information.The latter checks in database whether have this identification information, if exist, returns to authentication failed information, and intelligent terminal is by automatic shutdown; If do not exist, return to a string key to intelligent terminal, the latter generates encrypt file accordingly, then normally uses.
D., after intelligent terminal is sold, each start all can be checked this encrypt file, if do not exist, and forced shutdown; If exist, verify that whether content is legal, only have legal could continuation to use.
2. method according to claim 1, is characterized in that, described steps A is specially:
A1. when intelligent terminal is started shooting, system starts encipheror, and the latter searches certain encrypt file;
A2. this file is not that system carries, and is below according to some Information generations.
3. method according to claim 1, is characterized in that, described step B is specially:
If B1. system exists certain encrypt file, whether encipheror is legal by this file content of a set of proof of algorithm;
If B2. legal, normal boot-strap uses; If illegal, forced shutdown.
4. method according to claim 1, is characterized in that, described step C is specially:
C1. the encipheror on intelligent terminal is issued the encryption server on network by TCP/UDP agreement unique identification information;
C2. encryption server is searched database, sees whether this identification information exists, if exist explanation to be used, returns to authentication failed message to encipheror on intelligent terminal, and the latter shuts down forced system; If this identification information does not exist, will be this identification information write into Databasce, and a string key is returned to encipheror on intelligent terminal, after generate accordingly encrypt file.
5. method according to claim 1, is characterized in that, described step D is specially:
D1. after intelligent terminal is sold, start at every turn, encipheror all can be checked this encrypt file;
D2. only have this encrypt file to exist and content legality, could normally use; Otherwise system is by automatic shutdown.
6. an intelligent terminal software anti-piracy for database Network Based, is characterized in that, described system comprises:
Encipheror on intelligent terminal;
Encryption server;
Wired or wireless network, for above between the two network service path is provided.
7. according to the method described in right 1 to 6 any one, it is characterized in that, the encipheror on described intelligent terminal comprises:
Search encrypt file module, be responsible for checking encrypt file, and checking encrypted content;
Generate encrypt file module, be responsible for producing encrypt file;
Network communication module, is responsible for communicating by letter with encryption server;
Forced shutdown module, is responsible for forcing system power supply to be closed.
8. according to the method described in right 1 to 6 any one, it is characterized in that, described encryption server comprises:
Network communication module, is responsible for communicating by letter with encipheror on intelligent terminal, and refusal disabled user connect;
Database processing module, is responsible for the storehouse that reads and writes data, and searches or write relevant information;
Key production module, generates key string according to certain rule, sends to encipheror on intelligent terminal.
9. according to the method described in right 1 to 6 any one, it is characterized in that, described intelligent terminal comprises:
Smart mobile phone, Intelligent flat computer, Intelligent set top box etc.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310164485.3A CN104134020A (en) | 2013-05-03 | 2013-05-03 | Intelligent terminal software anti-piracy method and intelligent terminal software anti-piracy system based on network database |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310164485.3A CN104134020A (en) | 2013-05-03 | 2013-05-03 | Intelligent terminal software anti-piracy method and intelligent terminal software anti-piracy system based on network database |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104134020A true CN104134020A (en) | 2014-11-05 |
Family
ID=51806695
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310164485.3A Pending CN104134020A (en) | 2013-05-03 | 2013-05-03 | Intelligent terminal software anti-piracy method and intelligent terminal software anti-piracy system based on network database |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104134020A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105335667A (en) * | 2015-10-16 | 2016-02-17 | 北京源创云网络科技有限公司 | Innovation and creativity data processing method, device and system and certificate storing equipment |
CN109564598A (en) * | 2017-03-13 | 2019-04-02 | 华为技术有限公司 | A kind of endpoint detection methods and terminal |
CN113141362A (en) * | 2021-04-22 | 2021-07-20 | 中山亿联智能科技有限公司 | Intelligent terminal and server safety interaction control method |
-
2013
- 2013-05-03 CN CN201310164485.3A patent/CN104134020A/en active Pending
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105335667A (en) * | 2015-10-16 | 2016-02-17 | 北京源创云网络科技有限公司 | Innovation and creativity data processing method, device and system and certificate storing equipment |
CN105335667B (en) * | 2015-10-16 | 2017-03-15 | 北京源创云网络科技有限公司 | Innovate creative data processing method, device, system and deposit card equipment |
CN109564598A (en) * | 2017-03-13 | 2019-04-02 | 华为技术有限公司 | A kind of endpoint detection methods and terminal |
CN113141362A (en) * | 2021-04-22 | 2021-07-20 | 中山亿联智能科技有限公司 | Intelligent terminal and server safety interaction control method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101908119B (en) | Method and device for processing dynamic link library (DLL) file | |
CN103906054A (en) | Method and system for authorization of software function modules of internet of things | |
CN103123709A (en) | Bar-code-based information verification system | |
JP5837219B2 (en) | Method and system for lending digital content | |
CN104463026B (en) | A kind of system and method for the anti-flight of hardware | |
CN106503494A (en) | A kind of firmware protection location and guard method with flash memory microcontroller on piece | |
CN105631361A (en) | Application program channel source identification method and device | |
US20150067719A1 (en) | Method for controlling digital film play-count and a system thereof | |
CN103186723B (en) | The method and system of digital content security cooperation | |
CN104966003A (en) | Encryption and verification method for embedded equipment | |
CN104134020A (en) | Intelligent terminal software anti-piracy method and intelligent terminal software anti-piracy system based on network database | |
CN104683299A (en) | Control method for software registration, authentication server and terminal | |
CN110969445A (en) | Anti-counterfeiting method based on NFC | |
US8612771B2 (en) | Verifying authenticity of playback device | |
KR101559380B1 (en) | Apparatus and method for obfuscating contents | |
CN103324868A (en) | Copyright protection audio and video cloud application system | |
US20140230068A1 (en) | System and method for packaging and authenticating a software product | |
CN105930713A (en) | Method and terminal for generating identifying codes | |
CN105022651B (en) | A kind of method for preventing piracy in equipment production process and firmware programming device | |
KR101744697B1 (en) | Encoded Package Manufacturing and Transmission System for E-training Contents | |
CN107273255A (en) | A kind of electronic equipment hardware verification method | |
CN103198241A (en) | Safety management method for software license | |
CN113868691B (en) | Authorized operation method and device of block chain based on cloud-native technology | |
CN109471810B (en) | Hardware configuration validation method and device | |
CN102332066A (en) | Authentication management system and method of code jumping chip identification codes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20141105 |