CN106971096A - Method for protecting software and system - Google Patents

Method for protecting software and system Download PDF

Info

Publication number
CN106971096A
CN106971096A CN201710221050.6A CN201710221050A CN106971096A CN 106971096 A CN106971096 A CN 106971096A CN 201710221050 A CN201710221050 A CN 201710221050A CN 106971096 A CN106971096 A CN 106971096A
Authority
CN
China
Prior art keywords
software
executable program
request
simulator
mark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710221050.6A
Other languages
Chinese (zh)
Other versions
CN106971096B (en
Inventor
孙吉平
刘荣华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Senseshield Technology Co Ltd
Original Assignee
Beijing Senseshield Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Senseshield Technology Co Ltd filed Critical Beijing Senseshield Technology Co Ltd
Priority to CN201710221050.6A priority Critical patent/CN106971096B/en
Publication of CN106971096A publication Critical patent/CN106971096A/en
Application granted granted Critical
Publication of CN106971096B publication Critical patent/CN106971096B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of method for protecting software; wherein, at least one executable program applied to hardware lock is uploaded into cloud lock platform, at least one executable program and at least one protected code section of software are corresponding respectively; cloud lock platform is provided with simulator, and methods described includes:The request that performs from software is received, performing request is used to ask to perform the corresponding executable program at least one executable program, and performs in request with the mark for performing parameter and the corresponding executable program of correspondence;Simulator loads corresponding executable program according to mark and carries out translation execution, and when needing input parameter in translating implementation procedure, input performs parameter, so that data of obtaining a result;To software returning result data.Executable program in hardware lock is seamlessly used for cloud and locks platform by the method for protecting software of disclosure of the invention, so as to using unlimited expansible Internet resources, improve again can infinite expanding execution performance.

Description

Method for protecting software and system
Technical field
The present invention relates to software security field, more particularly to a kind of method for protecting software and system.
Background technology
In existing software engineering, completed in software (being all kinds of softwares herein, also referred to as " application turns part ") exploitation Afterwards, it runs in software developer () uncontrollable environment in text also referred to as " developer ", and all details of the software are equal In face of user, if it is intended to crack the software, traditional salvo can only postpone it and crack progress, and can not Effectively software is prevented to be cracked.
Current maximally effective method for protecting software is that some key codes that must use runs software are put into " safety collar Run in border ", i.e. developer thinks to consider to select these key codes according to development process, can will crack difficulty raising To the degree close to software-rewritten.
So-called in the prior art " security context " is provided by specific hardware, such as the hardware lock based on intelligent chip (that is, hardware encryption lock), it is also that this hardware lock is in the majority to be easy to due to it in routine use, therefore actual use, and it can be provided A certain degree of safety.Study carefully its concrete principle, this hardware lock is generally built-in with embedded OS, can run embedded Program, based on this embedded OS, the software that last developer is developed with the embedded program in hardware lock by leading to Letter, accesses data in lock, with the use of control software.Specifically, operation such as Fig. 1 that developer is carried out to the software after design It is shown:
Step 1, the key code for extracting designed application software;
Step 2, the key code extracted is packaged;
Step 3, the embedded program for being compiled as can perform in lock by the key code after encapsulation (can be also simply referred to as " in lock Executable program " or " executable program ");
Step 4, by (hardware lock provider provides) import tool above-mentioned executable program imported into hardware lock, from And complete the exploitation of application software.
After aforesaid operations, when runs software, can by being communicated with the executable program in hardware lock, To access data in lock, with the use of control software.
However, the technology is having following problems using process:
First, developer needs to provide one or many to software purchasers (namely end user of software, user) Hardware lock, therefore, software purchasers not only need to undertake the hardware cost of purchase hardware lock, and need burden thus to bring Hardware lock buying and management cost etc.;
Second, computer (the personal computer of hardware lock often with the user of software;PC) there is matching and ask Topic, causes user can not use software, or needs user to reset system for computer, or even changes computer;Have a strong impact on The software of user is used;
Third, the memory space of hardware lock in itself is small, developer is caused to transplant a small amount of key code or logic extremely Hardware lock, thus the low level security of running software can only be ensured;
Fourth, although the hardware lock of industry all includes intelligent chip, performance is developed in addition far away from the performance of computer If the software comparison of person's exploitation is huge, or requires higher to operational performance, then the performance of hardware lock just can not be met The use requirement of software, thus the good usability of software can be reduced.
The content of the invention
Based on background above, the present invention proposes a kind of method for protecting software, and it is by the executable program applied to hardware lock The seamless cloud that is used for locks platform, by setting the container environment that simulator is locked come analog hardware in locking platform in cloud, so as to profit With unlimited expansible Internet resources, both without using limited hardware lock, improve again can infinite expanding execution performance.
According to an aspect of the invention, there is provided a kind of method for protecting software, by applied to hardware lock at least one Executable program uploads to cloud lock platform, and at least one protected code section of at least one executable program and software is right respectively Should, cloud lock platform is provided with simulator,
It can be included according to the method for protecting software of the present invention:
The request that performs from software is received, execution request performs corresponding at least one executable program for request Executable program, and perform in request with the mark for performing parameter and the corresponding executable program of correspondence;
Simulator loads corresponding executable program according to mark and carries out translation execution, is being needed in translation implementation procedure Input during input parameter is wanted to perform parameter, so that data of obtaining a result;
To software returning result data.
In addition, before at least one executable program applied to hardware lock to be uploaded to cloud lock platform, according to this hair Bright method for protecting software can also include:Extract at least one code segment in software;To at least one code segment of extraction It is packaged respectively;At least one code segment after encapsulation is compiled at least one executable program respectively.
Alternatively, executable program can be binary executable.
Further, simulator can be ARM instruction set simulator, then above-mentioned simulator accordingly may be used according to mark loading Configuration processor and carry out translation execution can include:ARM instruction set simulator loads corresponding executable program according to mark, right Binary sequence in corresponding executable program carries out what is translated into the source code for meeting ARM instruction set standard and perform one by one Processing.
In addition, can also be included according to the method for protecting software of the present invention:Accordingly may be used in simulator according to mark loading While configuration processor, platform side application is locked at least two buffering areas in cloud, one of buffering area is used to store input ginseng Number, another buffering area is used to store result data.
Alternatively, it can also be included according to the method for protecting software of the present invention:It is asked receiving the execution from software Afterwards, judge to perform the request permissions for asking whether possess for corresponding executable program;It is not possess request in judged result During authority, refusal processing performs request.
According to another aspect of the present invention there is provided a kind of security system for software, security system for software prestores application In at least one executable program of hardware lock, at least one protected code section point of at least one executable program and software Not Dui Ying, the apparatus according to the invention can include:Interface module, it is configured to receive the request that performs from software, execution Ask for asking to perform the corresponding executable program at least one executable program, and perform in request with execution The mark of parameter and the corresponding executable program of correspondence;Simulator, it is configured to load corresponding executable program according to mark And translation execution is carried out, when needing input parameter in translating implementation procedure, input performs parameter, so that data of obtaining a result; Interface module is additionally configured to software returning result data.
Wherein, and executable program can be binary executable.
Further, simulator can be ARM instruction set simulator, and ARM instruction set simulator is configurable to according to mark Know the corresponding executable program of loading, the binary sequence in corresponding executable program translate into meeting ARM one by one The source code of instruction set standard and the processing performed.
Alternatively, simulator can be further configured to, while corresponding executable program is loaded according to mark, Apply for that one of buffering area is for storing input parameter, another buffering at least two buffering areas in security system for software Area is used to store result data.
Preferably, the apparatus according to the invention can also include:Determination module, is configured to judge holding for interface module reception Whether row request possesses the request permissions for corresponding executable program, wherein, simulator is configured to sentencing in determination module When disconnected result does not possess request permissions to perform request, refusal processing performs request.
Brief description of the drawings
Fig. 1 show the flow chart of the operation that software developer is carried out to the software after design in the prior art;
Fig. 2 show the flow chart of method for protecting software according to an embodiment of the invention;
Fig. 3 show the block diagram of security system for software according to an embodiment of the invention;
Fig. 4 show security system for software according to an embodiment of the invention.
Embodiment
Term referred in present invention is explained at this, what translation performed service (see Fig. 4) simulation is hardware lock Container environment, what ARM instruction set simulator was simulated is the routine call process of code in hardware lock, i.e. in the embodiment of the present invention In, the module in hardware lock is using software come simulated implementation.Wherein, ARM instruction set is a set of stereotyped command, ARM instruction set mould It is that, for explaining and performing ARM instruction set, executable program is the sequence for the binary representation for meeting ARM instruction set to intend device Stream.
It is according to the present invention's as shown in Figure 2 according to one embodiment of present invention there is provided a kind of method for protecting software The flow chart of method for protecting software.In the method for protecting software according to the present invention, in advance by least one applied to hardware lock Individual executable program uploads at least one protected code section difference of cloud lock platform, at least one executable program and software Correspondence, cloud lock platform is provided with simulator.
It can be included according to the method for protecting software of the present invention:
S1, receives the request that performs from software, and performing request is used to ask to perform at least one executable program Corresponding executable program, and perform in request with the mark for performing parameter and the corresponding executable program of correspondence;
S2, simulator loads corresponding executable program according to mark and carries out translation execution, in translation implementation procedure When needing input parameter, input performs parameter, so that data of obtaining a result;
S3, to software returning result data.
In addition, before at least one executable program applied to hardware lock to be uploaded to cloud lock platform in advance, according to The method for protecting software of the present invention can also include:Extract at least one code segment in software;To at least one generation of extraction Code section is packaged respectively;At least one code segment after encapsulation is compiled at least one executable program respectively.
In embodiments of the present invention, executable program can be binary executable.
Further, simulator can be ARM instruction set simulator, and simulator loads phase according to mark in above-mentioned S2 steps The executable program answered simultaneously carries out translation execution and can included:ARM instruction set simulator is corresponding executable according to mark loading Program, carries out translating into the source code for meeting ARM instruction set standard one by one to the binary sequence in corresponding executable program And the processing performed, so as to after the completion of the binary sequence in saying executable program is translated, almost complete executable simultaneously The simulation implementation procedure of program.
In addition, can also be included according to the method for protecting software of the present invention:Accordingly may be used in simulator according to mark loading While configuration processor, platform side application is locked at least two buffering areas in cloud, one of buffering area is used to store input ginseng Number, another buffering area is used to store result data.
Alternatively, it can also be included according to the method for protecting software of the present invention:It is asked receiving the execution from software Afterwards, judge to perform the request permissions for asking whether possess for corresponding executable program;It is not possess request in judged result During authority, refusal processing performs request.
According to a preferred embodiment of the present invention, lock provider provides and the mandate pipe in hardware lock for software developer The compiler of system matches is managed, then software developer extracts at least one code segment in developed software;To extraction At least one code segment is packaged respectively;Using locking the above-mentioned compiler of provider's offer by least one code after encapsulation Section is compiled at least one executable program respectively, at least one protected code section of at least one executable program and software Correspond to respectively, wherein, executable program is binary executable or referred to as binary sequence.It is above-mentioned at least one can hold Line program can be imported into hardware lock, so that software developer is managed by authentication management system to hardware lock.It is above-mentioned At least one executable program can not also import hardware lock, but by software developer directly by compiled above-mentioned at least one Individual executable program is uploaded in the database for the cloud lock platform that lock provider is provided, and its medium cloud lock platform is provided with simulation Device, it is preferably ARM instruction set simulator, and it is used for the container environment of analog hardware lock.
According to one embodiment of present invention, it can be included according to the method for protecting software of the present invention:Receive and come from software Perform request, the execution ask for ask perform at least one executable program in corresponding executable program, and Perform in request with parameter and the mark corresponding to corresponding executable program is performed, then judge to perform whether request possesses For the request permissions of corresponding executable program;In judged result for when not possessing request permissions, refusal processing performs request, If it is judged that being stored in for parameter when possessing request permissions, will be performed in the internal memory of cloud lock platform;
Simulator loads corresponding executable program according to mark, while corresponding executable program is loaded, in cloud Platform side application is locked at least two buffering areas, wherein can include a buffering area is used to store input parameter, is being loaded After, simulator carries out translation execution to the executable program of loading, if being translated in translation implementation procedure needs input During the power function of parameter, execution parameter is transferred from buffering area and inputs the power function and carrys out operation function function, so as to draw Result data, and result data is stored in another buffering area, it is preferable that in simulator be ARM instruction set simulator In the case of, ARM instruction set simulator can load corresponding executable program according to mark, in corresponding executable program Binary sequence carries out translating into the source code for meeting ARM instruction set standard and the processing performed one by one;
To software returning result data.
There is provided a kind of security system for software according to another aspect of the present invention.It is according to the present invention's as shown in Figure 3 The block diagram of security system for software.It can be held applied at least one of hardware lock being prestored according to the security system for software of the present invention Line program, at least one executable program and at least one protected code section of software are corresponding respectively, and what it is according to the present invention is System can include:
Interface module, it is configured to receive the request that performs from software, and performing request is used to ask to perform at least one Corresponding executable program in executable program, and perform in request with execution parameter and corresponding journey executable accordingly The mark of sequence;
Simulator, it is configured to load corresponding executable program according to mark and carries out translation execution, is performed in translation During when needing input parameter input perform parameter so that data of obtaining a result;
Interface module is additionally configured to software returning result data.
Wherein, executable program can be binary executable.
Further, simulator can be ARM instruction set simulator, and ARM instruction set simulator is configurable to according to mark Know the corresponding executable program of loading, the binary sequence in corresponding executable program translate into meeting ARM one by one The source code of instruction set standard and the processing performed.
Alternatively, simulator can be further configured to, while corresponding executable program is loaded according to mark, Apply for that one of buffering area is for storing input parameter, another buffering at least two buffering areas in security system for software Area is used to store result data.
Preferably, the apparatus according to the invention can also include:Determination module, is configured to judge holding for interface module reception Whether row request possesses the request permissions for corresponding executable program, wherein, simulator is configured to sentencing in determination module When disconnected result does not possess request permissions to perform request, refusal processing performs request.
It is preferably the cloud lock system in cloud system according to the security system for software of the present invention, because its memory space is big, Therefore multiple executable programs can be uploaded, these executable programs can correspond to multiple codes that need to be protected in a software Section (such as when one software has multiple functions to be protected, it needs critical code section to be protected just to be multiple), or it is multiple soft Multiple code segments in part, each software at least has a shielded code segment, and this multiple software can license to one Individual or multiple users.In the case of there are multiple executable programs in cloud lock system, request is performed for the multiple users of reply, Cloud lock system can have multiple interface modules and multiple emulation modules, and the execution received at the same time transmitted by multiple softwares please When asking, request can be performed so that multiple threads are multiple.Alternatively, each simulator can enter according to the difference of executable program The different matching configuration of row, or in the case of the application frequently of some executable program, configure multiple for the executable program Corresponding simulator.So as to meet the demand of user.
According to one embodiment of present invention there is provided a kind of cloud lock system and the system of application software, as shown in figure 4, Show software developer, application software and cloud lock platform three end.The interaction at this three end is described as follows:
1. software developer is believed in the cloud lock platform (the official website enrollment page as locked provider) that lock provider provides Breath registration;
2. developer logs in cloud lock platform using account, the executable program that upload is applied to hardware lock locks platform to cloud On, cloud lock platform is stored it in database, and the executable program of upload corresponds to the protected functional module of software;
2.1 developers can also manage the software of oneself on cloud lock platform, be the different mandate of different software design patterns Mode;
For example, developer A has a set of calculator software Calculator, it is assumed that the software has 2 functional modules:Addition and Subtraction;
Now, developer A adds mandate on platform, it is assumed that numbering is 1001:Limit only to that addition can be used, can hold Line code code1 (addition function code);
Developer A adds mandate on platform, it is assumed that numbering is 1002:Limit only to that subtraction can be used, generation can be performed Code code2 (subtraction function code);
2.2 developers can also lock in cloud manage the software users (additions and deletions change look into etc. such) of oneself on platform, Different authorizations are configured for different software users;
For example, developer A adds an account on platform for the software users sam of oneself:Sam@163.com, and match somebody with somebody Account information (password, personally identifiable information etc.) is put;
Then, developer A is authorized on platform for sam account configuration, as described above, the mandate that selection numbering is 1001 Distribute to sam account;
In this way, when sam logs in software using account, then content as defined in mandate 1001 can only be used;
-- how management software user and how for user configuring mandate be to enumerate example not in the scope of the claims, above Son helps to understand whole flow process;
3. in this way, developer A locks the soft ware authorization that the software users of oneself have just easily been managed on platform in cloud;
4. software users sam is taken after the software of developer A packings, runs software, input account logs in after software (exploitation The registration network address that the account or sam oneself that person provides are provided by developer is voluntarily registered) the corresponding work(of software can be used Energy:
4.1 users input account is logged in, and software locks platform access service from cloud by account and (particularly authorizes access clothes Business) on inquire about authorized content, the authorized content that cloud lock platform returns to the account is:Addition can only be used;Now, software is only shown Addition function;
4.2 users input two numerals, perform addition function, and software is (unique by two numerals, the mark of executable program Mark), account information (being indicated by token/session) be submitted to access service (particularly generation of cloud lock platform Code performs access service), ask implementing result;
4.3 codes perform access service and receive request, according to account information data base querying awarding to the account beyond the clouds It is the code1 that A developer uploads to weigh code in the lock of association, and code performs access service and is submitted to two numerals and code1 Back-end code performs service;
4.4 back-end codes perform service and receive request, by the ARM instruction set simulator code code1 that receives of execution and Backtracking result after two parameter, execution;
4.5 softwares receive result includes on interface or continues follow-up operation by it.
Technique according to the invention scheme, the executable program applied to hardware lock is without in change in the prior art The cloud lock platform for passing to high in the clouds is used, and cloud be can be used to lock platform and is carried out management software mandate instead of hardware lock, so as to save to hardware The management cost of lock and time.
The method that the embodiment of the present invention is realized the executable program applied to hardware lock and can performed beyond the clouds is to carry beyond the clouds For simulator, such as ARM simulators, by simulating holding for executable program to the translation implementation procedure of above-mentioned executable program Row process, reaches the implementation effect same with hardware lock.Here ARM simulators can be the ARM simulators of standard, either The ARM simulators customized by hardware lock provider.In this way, can both be performed with portion executable program in hardware lock, also may be used Performed with locking platform in cloud, accomplished to compile an executable program, just may be implemented in hardware lock and cloud is locked in platform With the effect of operation, and no longer limited by the performance and memory space of hardware lock, if having network can distributed software, no Secure hardware (hardware lock) etc. must be posted to the end user of software.Due to being no longer limited by the performance of secure hardware, actually may be used Greatly increased with the size of code of transplanting, and software key algorithm is beyond the clouds, and the personnel that crack can not more contact implementation and crack, significantly Improve the security of software.
The section Example of the present invention is illustrated above, but the invention is not restricted to embodiments above, but A variety of modifications or modification can be carried out to embodiment in the case where not departing from present inventive concept scope.

Claims (11)

1. a kind of method for protecting software, it is characterised in that at least one executable program applied to hardware lock is uploaded into cloud Platform is locked, at least one described executable program and at least one protected code section of software are corresponding respectively, and the cloud lock is flat Platform is provided with simulator,
Methods described includes:
The request that performs from software is received, described perform asks to be used to ask to perform at least one described executable program With the mark for performing parameter and corresponding corresponding executable program in corresponding executable program, and the execution request Know;
The simulator loads corresponding executable program according to the mark and carries out translation execution, is performed in translation The execution parameter is inputted in journey when needing input parameter, so that data of obtaining a result;
The result data is returned to software.
2. method for protecting software according to claim 1, it is characterised in that by can applied at least one of hardware lock Configuration processor is uploaded to before cloud lock platform, and methods described also includes:
Extract at least one code segment in software;
At least one code segment of extraction is packaged respectively;
At least one code segment after encapsulation is compiled at least one executable program respectively.
3. method for protecting software according to claim 1, it is characterised in that the executable program is executable for binary system Program.
4. method for protecting software according to claim 3, it is characterised in that the simulator is ARM instruction set simulator, Then the simulator loads corresponding executable program according to the mark and carries out translation execution and includes:
The ARM instruction set simulator loads corresponding executable program according to the mark, is held to corresponding Binary sequence in line program carries out translating into the source code for meeting ARM instruction set standard and the processing performed one by one.
5. method for protecting software according to claim 1, it is characterised in that also include:
While the simulator loads corresponding executable program according to the mark, in cloud lock platform side Shen Please at least two buffering areas, one of buffering area is used to store the input parameter, and another buffering area is used to store institute State result data.
6. method for protecting software according to claim 1, it is characterised in that also include:
After the request of the execution from software is received, judge described perform asks whether to possess for corresponding executable The request permissions of program;
In judged result request is performed for when not possessing request permissions, refusal processing is described.
7. a kind of security system for software, it is characterised in that the security system for software prestores at least one applied to hardware lock Individual executable program, at least one described executable program and at least one protected code section of software are corresponding respectively,
Described device includes:
Interface module, it is configured to reception and performs request from software, and described perform asks to be used to ask described in execution at least Corresponding executable program in one executable program, and described perform carries execution parameter and the correspondence phase in request The mark for the executable program answered;
Simulator, it is configured to load corresponding executable program according to the mark and carries out translation execution, in translation The execution parameter is inputted in implementation procedure when needing input parameter, so that data of obtaining a result;
The interface module is additionally configured to return to the result data to software.
8. security system for software according to claim 7, it is characterised in that the executable program is executable for binary system Program.
9. security system for software according to claim 8, it is characterised in that the simulator is ARM instruction set simulator, The ARM instruction set simulator is configured to load corresponding executable program according to the mark, to it is corresponding can Binary sequence in configuration processor carries out translating into the source code for meeting ARM instruction set standard and the processing performed one by one.
10. security system for software according to claim 7, it is characterised in that the simulator is further configured to, in root While loading corresponding executable program according to the mark, apply for slow at least two in the security system for software Area is rushed, one of buffering area is used to store the input parameter, and another buffering area is used to store the result data.
11. security system for software according to claim 7, it is characterised in that also include:
Determination module, be configured to judge execution request that the interface module is received whether possess for it is corresponding can The request permissions of configuration processor,
Wherein, the simulator is configured to when the judged result of determination module does not possess request permissions for the execution request, Refusal processing is described to perform request.
CN201710221050.6A 2017-04-06 2017-04-06 Method for protecting software and system Active CN106971096B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710221050.6A CN106971096B (en) 2017-04-06 2017-04-06 Method for protecting software and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710221050.6A CN106971096B (en) 2017-04-06 2017-04-06 Method for protecting software and system

Publications (2)

Publication Number Publication Date
CN106971096A true CN106971096A (en) 2017-07-21
CN106971096B CN106971096B (en) 2018-12-18

Family

ID=59336668

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710221050.6A Active CN106971096B (en) 2017-04-06 2017-04-06 Method for protecting software and system

Country Status (1)

Country Link
CN (1) CN106971096B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108733987A (en) * 2018-04-12 2018-11-02 惠州市源医科技有限公司 A kind of encryption method and device of the binary object file based on embedded device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1419191A (en) * 2001-10-31 2003-05-21 亚普公司 Intermediate code executive system and method, computer program products for executing intermediate code
CN200966072Y (en) * 2006-03-17 2007-10-24 北京飞天诚信科技有限公司 Network software-based information safety protector
CN102685122A (en) * 2012-05-06 2012-09-19 北京深思洛克软件技术股份有限公司 Software protection method based on cloud server
CN103106356A (en) * 2013-02-01 2013-05-15 北京深思洛克软件技术股份有限公司 Method for generating code in safe environment and improving software protection intensity
CN104392151A (en) * 2014-11-27 2015-03-04 北京深思数盾科技有限公司 Software protection method and system
CN104462882A (en) * 2014-12-18 2015-03-25 北京深思数盾科技有限公司 Software protection method, hardware encryption equipment and software protection system comprising hardware encryption equipment
CN106407751A (en) * 2016-08-31 2017-02-15 北京深思数盾科技股份有限公司 Method and device for protecting executable file

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1419191A (en) * 2001-10-31 2003-05-21 亚普公司 Intermediate code executive system and method, computer program products for executing intermediate code
CN200966072Y (en) * 2006-03-17 2007-10-24 北京飞天诚信科技有限公司 Network software-based information safety protector
CN102685122A (en) * 2012-05-06 2012-09-19 北京深思洛克软件技术股份有限公司 Software protection method based on cloud server
CN103106356A (en) * 2013-02-01 2013-05-15 北京深思洛克软件技术股份有限公司 Method for generating code in safe environment and improving software protection intensity
CN104392151A (en) * 2014-11-27 2015-03-04 北京深思数盾科技有限公司 Software protection method and system
CN104462882A (en) * 2014-12-18 2015-03-25 北京深思数盾科技有限公司 Software protection method, hardware encryption equipment and software protection system comprising hardware encryption equipment
CN106407751A (en) * 2016-08-31 2017-02-15 北京深思数盾科技股份有限公司 Method and device for protecting executable file

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108733987A (en) * 2018-04-12 2018-11-02 惠州市源医科技有限公司 A kind of encryption method and device of the binary object file based on embedded device

Also Published As

Publication number Publication date
CN106971096B (en) 2018-12-18

Similar Documents

Publication Publication Date Title
CN101997912A (en) Mandatory access control device based on Android platform and control method thereof
Fitzgerald et al. Vienna development method
CN108196872A (en) The upgrade method of intelligent contract in a kind of block catenary system
US20060130026A1 (en) Method and system for automatically identifying and marking subsets of localizable resources
CN105765527A (en) Method and apparatus for custom software development kit (SDK) generation
CN107092518A (en) A kind of Compilation Method for protecting mimicry system of defense software layer safe
CN101393521A (en) Extracting system for internal curing data of windows application program
CN105339889A (en) Techniques for language translation localization for computer applications
CN109255107A (en) Configuration software processing method, device, computer equipment and storage medium
CN109413189B (en) Electronic transaction system based on bottom translation
Maidl et al. A comprehensive framework for security in engineering projects-based on IEC 62443
CN110457869B (en) Program compiling and encrypting method and device, storage medium and electronic equipment
SG182015A1 (en) Method and system for protecting intellectual property in software
CN107797996A (en) A kind of word translation method and device
CN106971096B (en) Method for protecting software and system
CN110597496B (en) Method and device for acquiring bytecode file of application program
Reascos et al. A conceptual framework for the implantation of enterprise applications in small and medium enterprises (SMEs)
Moretti Accellera’s Support for ESL Verification and Stimulus Reuse
Whiting et al. Automated model-based attack tree analysis using HiP-HOPS
CN106873992B (en) Multi-element access control mechanism description and analysis method
CN115455430A (en) Security protection method and system based on Kyverno security policy
CN110633077B (en) Quick development system and method based on modularization
Jaß et al. Bit-precise formal verification for SystemC using satisfiability modulo theories solving
Sun et al. A supporting tool for creating and maintaining security targets according to ISO/IEC 15408
CN113050927A (en) Permission control method and device based on user-defined instruction and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee after: Beijing Shendun Technology Co.,Ltd.

Address before: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

CP01 Change in the name or title of a patent holder