CN106971096A - Method for protecting software and system - Google Patents
Method for protecting software and system Download PDFInfo
- Publication number
- CN106971096A CN106971096A CN201710221050.6A CN201710221050A CN106971096A CN 106971096 A CN106971096 A CN 106971096A CN 201710221050 A CN201710221050 A CN 201710221050A CN 106971096 A CN106971096 A CN 106971096A
- Authority
- CN
- China
- Prior art keywords
- software
- executable program
- request
- simulator
- mark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 45
- 238000013519 translation Methods 0.000 claims abstract description 19
- 230000003139 buffering effect Effects 0.000 claims description 21
- 238000012545 processing Methods 0.000 claims description 14
- 238000005538 encapsulation Methods 0.000 claims description 5
- 239000000284 extract Substances 0.000 claims description 4
- 238000000605 extraction Methods 0.000 claims description 4
- 229910002056 binary alloy Inorganic materials 0.000 claims 2
- 230000006870 function Effects 0.000 description 9
- 238000007792 addition Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 5
- 238000004088 simulation Methods 0.000 description 3
- 241000208340 Araliaceae Species 0.000 description 2
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 2
- 235000003140 Panax quinquefolius Nutrition 0.000 description 2
- 238000013475 authorization Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 235000008434 ginseng Nutrition 0.000 description 2
- 230000008676 import Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012856 packing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of method for protecting software; wherein, at least one executable program applied to hardware lock is uploaded into cloud lock platform, at least one executable program and at least one protected code section of software are corresponding respectively; cloud lock platform is provided with simulator, and methods described includes:The request that performs from software is received, performing request is used to ask to perform the corresponding executable program at least one executable program, and performs in request with the mark for performing parameter and the corresponding executable program of correspondence;Simulator loads corresponding executable program according to mark and carries out translation execution, and when needing input parameter in translating implementation procedure, input performs parameter, so that data of obtaining a result;To software returning result data.Executable program in hardware lock is seamlessly used for cloud and locks platform by the method for protecting software of disclosure of the invention, so as to using unlimited expansible Internet resources, improve again can infinite expanding execution performance.
Description
Technical field
The present invention relates to software security field, more particularly to a kind of method for protecting software and system.
Background technology
In existing software engineering, completed in software (being all kinds of softwares herein, also referred to as " application turns part ") exploitation
Afterwards, it runs in software developer () uncontrollable environment in text also referred to as " developer ", and all details of the software are equal
In face of user, if it is intended to crack the software, traditional salvo can only postpone it and crack progress, and can not
Effectively software is prevented to be cracked.
Current maximally effective method for protecting software is that some key codes that must use runs software are put into " safety collar
Run in border ", i.e. developer thinks to consider to select these key codes according to development process, can will crack difficulty raising
To the degree close to software-rewritten.
So-called in the prior art " security context " is provided by specific hardware, such as the hardware lock based on intelligent chip
(that is, hardware encryption lock), it is also that this hardware lock is in the majority to be easy to due to it in routine use, therefore actual use, and it can be provided
A certain degree of safety.Study carefully its concrete principle, this hardware lock is generally built-in with embedded OS, can run embedded
Program, based on this embedded OS, the software that last developer is developed with the embedded program in hardware lock by leading to
Letter, accesses data in lock, with the use of control software.Specifically, operation such as Fig. 1 that developer is carried out to the software after design
It is shown:
Step 1, the key code for extracting designed application software;
Step 2, the key code extracted is packaged;
Step 3, the embedded program for being compiled as can perform in lock by the key code after encapsulation (can be also simply referred to as " in lock
Executable program " or " executable program ");
Step 4, by (hardware lock provider provides) import tool above-mentioned executable program imported into hardware lock, from
And complete the exploitation of application software.
After aforesaid operations, when runs software, can by being communicated with the executable program in hardware lock,
To access data in lock, with the use of control software.
However, the technology is having following problems using process:
First, developer needs to provide one or many to software purchasers (namely end user of software, user)
Hardware lock, therefore, software purchasers not only need to undertake the hardware cost of purchase hardware lock, and need burden thus to bring
Hardware lock buying and management cost etc.;
Second, computer (the personal computer of hardware lock often with the user of software;PC) there is matching and ask
Topic, causes user can not use software, or needs user to reset system for computer, or even changes computer;Have a strong impact on
The software of user is used;
Third, the memory space of hardware lock in itself is small, developer is caused to transplant a small amount of key code or logic extremely
Hardware lock, thus the low level security of running software can only be ensured;
Fourth, although the hardware lock of industry all includes intelligent chip, performance is developed in addition far away from the performance of computer
If the software comparison of person's exploitation is huge, or requires higher to operational performance, then the performance of hardware lock just can not be met
The use requirement of software, thus the good usability of software can be reduced.
The content of the invention
Based on background above, the present invention proposes a kind of method for protecting software, and it is by the executable program applied to hardware lock
The seamless cloud that is used for locks platform, by setting the container environment that simulator is locked come analog hardware in locking platform in cloud, so as to profit
With unlimited expansible Internet resources, both without using limited hardware lock, improve again can infinite expanding execution performance.
According to an aspect of the invention, there is provided a kind of method for protecting software, by applied to hardware lock at least one
Executable program uploads to cloud lock platform, and at least one protected code section of at least one executable program and software is right respectively
Should, cloud lock platform is provided with simulator,
It can be included according to the method for protecting software of the present invention:
The request that performs from software is received, execution request performs corresponding at least one executable program for request
Executable program, and perform in request with the mark for performing parameter and the corresponding executable program of correspondence;
Simulator loads corresponding executable program according to mark and carries out translation execution, is being needed in translation implementation procedure
Input during input parameter is wanted to perform parameter, so that data of obtaining a result;
To software returning result data.
In addition, before at least one executable program applied to hardware lock to be uploaded to cloud lock platform, according to this hair
Bright method for protecting software can also include:Extract at least one code segment in software;To at least one code segment of extraction
It is packaged respectively;At least one code segment after encapsulation is compiled at least one executable program respectively.
Alternatively, executable program can be binary executable.
Further, simulator can be ARM instruction set simulator, then above-mentioned simulator accordingly may be used according to mark loading
Configuration processor and carry out translation execution can include:ARM instruction set simulator loads corresponding executable program according to mark, right
Binary sequence in corresponding executable program carries out what is translated into the source code for meeting ARM instruction set standard and perform one by one
Processing.
In addition, can also be included according to the method for protecting software of the present invention:Accordingly may be used in simulator according to mark loading
While configuration processor, platform side application is locked at least two buffering areas in cloud, one of buffering area is used to store input ginseng
Number, another buffering area is used to store result data.
Alternatively, it can also be included according to the method for protecting software of the present invention:It is asked receiving the execution from software
Afterwards, judge to perform the request permissions for asking whether possess for corresponding executable program;It is not possess request in judged result
During authority, refusal processing performs request.
According to another aspect of the present invention there is provided a kind of security system for software, security system for software prestores application
In at least one executable program of hardware lock, at least one protected code section point of at least one executable program and software
Not Dui Ying, the apparatus according to the invention can include:Interface module, it is configured to receive the request that performs from software, execution
Ask for asking to perform the corresponding executable program at least one executable program, and perform in request with execution
The mark of parameter and the corresponding executable program of correspondence;Simulator, it is configured to load corresponding executable program according to mark
And translation execution is carried out, when needing input parameter in translating implementation procedure, input performs parameter, so that data of obtaining a result;
Interface module is additionally configured to software returning result data.
Wherein, and executable program can be binary executable.
Further, simulator can be ARM instruction set simulator, and ARM instruction set simulator is configurable to according to mark
Know the corresponding executable program of loading, the binary sequence in corresponding executable program translate into meeting ARM one by one
The source code of instruction set standard and the processing performed.
Alternatively, simulator can be further configured to, while corresponding executable program is loaded according to mark,
Apply for that one of buffering area is for storing input parameter, another buffering at least two buffering areas in security system for software
Area is used to store result data.
Preferably, the apparatus according to the invention can also include:Determination module, is configured to judge holding for interface module reception
Whether row request possesses the request permissions for corresponding executable program, wherein, simulator is configured to sentencing in determination module
When disconnected result does not possess request permissions to perform request, refusal processing performs request.
Brief description of the drawings
Fig. 1 show the flow chart of the operation that software developer is carried out to the software after design in the prior art;
Fig. 2 show the flow chart of method for protecting software according to an embodiment of the invention;
Fig. 3 show the block diagram of security system for software according to an embodiment of the invention;
Fig. 4 show security system for software according to an embodiment of the invention.
Embodiment
Term referred in present invention is explained at this, what translation performed service (see Fig. 4) simulation is hardware lock
Container environment, what ARM instruction set simulator was simulated is the routine call process of code in hardware lock, i.e. in the embodiment of the present invention
In, the module in hardware lock is using software come simulated implementation.Wherein, ARM instruction set is a set of stereotyped command, ARM instruction set mould
It is that, for explaining and performing ARM instruction set, executable program is the sequence for the binary representation for meeting ARM instruction set to intend device
Stream.
It is according to the present invention's as shown in Figure 2 according to one embodiment of present invention there is provided a kind of method for protecting software
The flow chart of method for protecting software.In the method for protecting software according to the present invention, in advance by least one applied to hardware lock
Individual executable program uploads at least one protected code section difference of cloud lock platform, at least one executable program and software
Correspondence, cloud lock platform is provided with simulator.
It can be included according to the method for protecting software of the present invention:
S1, receives the request that performs from software, and performing request is used to ask to perform at least one executable program
Corresponding executable program, and perform in request with the mark for performing parameter and the corresponding executable program of correspondence;
S2, simulator loads corresponding executable program according to mark and carries out translation execution, in translation implementation procedure
When needing input parameter, input performs parameter, so that data of obtaining a result;
S3, to software returning result data.
In addition, before at least one executable program applied to hardware lock to be uploaded to cloud lock platform in advance, according to
The method for protecting software of the present invention can also include:Extract at least one code segment in software;To at least one generation of extraction
Code section is packaged respectively;At least one code segment after encapsulation is compiled at least one executable program respectively.
In embodiments of the present invention, executable program can be binary executable.
Further, simulator can be ARM instruction set simulator, and simulator loads phase according to mark in above-mentioned S2 steps
The executable program answered simultaneously carries out translation execution and can included:ARM instruction set simulator is corresponding executable according to mark loading
Program, carries out translating into the source code for meeting ARM instruction set standard one by one to the binary sequence in corresponding executable program
And the processing performed, so as to after the completion of the binary sequence in saying executable program is translated, almost complete executable simultaneously
The simulation implementation procedure of program.
In addition, can also be included according to the method for protecting software of the present invention:Accordingly may be used in simulator according to mark loading
While configuration processor, platform side application is locked at least two buffering areas in cloud, one of buffering area is used to store input ginseng
Number, another buffering area is used to store result data.
Alternatively, it can also be included according to the method for protecting software of the present invention:It is asked receiving the execution from software
Afterwards, judge to perform the request permissions for asking whether possess for corresponding executable program;It is not possess request in judged result
During authority, refusal processing performs request.
According to a preferred embodiment of the present invention, lock provider provides and the mandate pipe in hardware lock for software developer
The compiler of system matches is managed, then software developer extracts at least one code segment in developed software;To extraction
At least one code segment is packaged respectively;Using locking the above-mentioned compiler of provider's offer by least one code after encapsulation
Section is compiled at least one executable program respectively, at least one protected code section of at least one executable program and software
Correspond to respectively, wherein, executable program is binary executable or referred to as binary sequence.It is above-mentioned at least one can hold
Line program can be imported into hardware lock, so that software developer is managed by authentication management system to hardware lock.It is above-mentioned
At least one executable program can not also import hardware lock, but by software developer directly by compiled above-mentioned at least one
Individual executable program is uploaded in the database for the cloud lock platform that lock provider is provided, and its medium cloud lock platform is provided with simulation
Device, it is preferably ARM instruction set simulator, and it is used for the container environment of analog hardware lock.
According to one embodiment of present invention, it can be included according to the method for protecting software of the present invention:Receive and come from software
Perform request, the execution ask for ask perform at least one executable program in corresponding executable program, and
Perform in request with parameter and the mark corresponding to corresponding executable program is performed, then judge to perform whether request possesses
For the request permissions of corresponding executable program;In judged result for when not possessing request permissions, refusal processing performs request,
If it is judged that being stored in for parameter when possessing request permissions, will be performed in the internal memory of cloud lock platform;
Simulator loads corresponding executable program according to mark, while corresponding executable program is loaded, in cloud
Platform side application is locked at least two buffering areas, wherein can include a buffering area is used to store input parameter, is being loaded
After, simulator carries out translation execution to the executable program of loading, if being translated in translation implementation procedure needs input
During the power function of parameter, execution parameter is transferred from buffering area and inputs the power function and carrys out operation function function, so as to draw
Result data, and result data is stored in another buffering area, it is preferable that in simulator be ARM instruction set simulator
In the case of, ARM instruction set simulator can load corresponding executable program according to mark, in corresponding executable program
Binary sequence carries out translating into the source code for meeting ARM instruction set standard and the processing performed one by one;
To software returning result data.
There is provided a kind of security system for software according to another aspect of the present invention.It is according to the present invention's as shown in Figure 3
The block diagram of security system for software.It can be held applied at least one of hardware lock being prestored according to the security system for software of the present invention
Line program, at least one executable program and at least one protected code section of software are corresponding respectively, and what it is according to the present invention is
System can include:
Interface module, it is configured to receive the request that performs from software, and performing request is used to ask to perform at least one
Corresponding executable program in executable program, and perform in request with execution parameter and corresponding journey executable accordingly
The mark of sequence;
Simulator, it is configured to load corresponding executable program according to mark and carries out translation execution, is performed in translation
During when needing input parameter input perform parameter so that data of obtaining a result;
Interface module is additionally configured to software returning result data.
Wherein, executable program can be binary executable.
Further, simulator can be ARM instruction set simulator, and ARM instruction set simulator is configurable to according to mark
Know the corresponding executable program of loading, the binary sequence in corresponding executable program translate into meeting ARM one by one
The source code of instruction set standard and the processing performed.
Alternatively, simulator can be further configured to, while corresponding executable program is loaded according to mark,
Apply for that one of buffering area is for storing input parameter, another buffering at least two buffering areas in security system for software
Area is used to store result data.
Preferably, the apparatus according to the invention can also include:Determination module, is configured to judge holding for interface module reception
Whether row request possesses the request permissions for corresponding executable program, wherein, simulator is configured to sentencing in determination module
When disconnected result does not possess request permissions to perform request, refusal processing performs request.
It is preferably the cloud lock system in cloud system according to the security system for software of the present invention, because its memory space is big,
Therefore multiple executable programs can be uploaded, these executable programs can correspond to multiple codes that need to be protected in a software
Section (such as when one software has multiple functions to be protected, it needs critical code section to be protected just to be multiple), or it is multiple soft
Multiple code segments in part, each software at least has a shielded code segment, and this multiple software can license to one
Individual or multiple users.In the case of there are multiple executable programs in cloud lock system, request is performed for the multiple users of reply,
Cloud lock system can have multiple interface modules and multiple emulation modules, and the execution received at the same time transmitted by multiple softwares please
When asking, request can be performed so that multiple threads are multiple.Alternatively, each simulator can enter according to the difference of executable program
The different matching configuration of row, or in the case of the application frequently of some executable program, configure multiple for the executable program
Corresponding simulator.So as to meet the demand of user.
According to one embodiment of present invention there is provided a kind of cloud lock system and the system of application software, as shown in figure 4,
Show software developer, application software and cloud lock platform three end.The interaction at this three end is described as follows:
1. software developer is believed in the cloud lock platform (the official website enrollment page as locked provider) that lock provider provides
Breath registration;
2. developer logs in cloud lock platform using account, the executable program that upload is applied to hardware lock locks platform to cloud
On, cloud lock platform is stored it in database, and the executable program of upload corresponds to the protected functional module of software;
2.1 developers can also manage the software of oneself on cloud lock platform, be the different mandate of different software design patterns
Mode;
For example, developer A has a set of calculator software Calculator, it is assumed that the software has 2 functional modules:Addition and
Subtraction;
Now, developer A adds mandate on platform, it is assumed that numbering is 1001:Limit only to that addition can be used, can hold
Line code code1 (addition function code);
Developer A adds mandate on platform, it is assumed that numbering is 1002:Limit only to that subtraction can be used, generation can be performed
Code code2 (subtraction function code);
2.2 developers can also lock in cloud manage the software users (additions and deletions change look into etc. such) of oneself on platform,
Different authorizations are configured for different software users;
For example, developer A adds an account on platform for the software users sam of oneself:Sam@163.com, and match somebody with somebody
Account information (password, personally identifiable information etc.) is put;
Then, developer A is authorized on platform for sam account configuration, as described above, the mandate that selection numbering is 1001
Distribute to sam account;
In this way, when sam logs in software using account, then content as defined in mandate 1001 can only be used;
-- how management software user and how for user configuring mandate be to enumerate example not in the scope of the claims, above
Son helps to understand whole flow process;
3. in this way, developer A locks the soft ware authorization that the software users of oneself have just easily been managed on platform in cloud;
4. software users sam is taken after the software of developer A packings, runs software, input account logs in after software (exploitation
The registration network address that the account or sam oneself that person provides are provided by developer is voluntarily registered) the corresponding work(of software can be used
Energy:
4.1 users input account is logged in, and software locks platform access service from cloud by account and (particularly authorizes access clothes
Business) on inquire about authorized content, the authorized content that cloud lock platform returns to the account is:Addition can only be used;Now, software is only shown
Addition function;
4.2 users input two numerals, perform addition function, and software is (unique by two numerals, the mark of executable program
Mark), account information (being indicated by token/session) be submitted to access service (particularly generation of cloud lock platform
Code performs access service), ask implementing result;
4.3 codes perform access service and receive request, according to account information data base querying awarding to the account beyond the clouds
It is the code1 that A developer uploads to weigh code in the lock of association, and code performs access service and is submitted to two numerals and code1
Back-end code performs service;
4.4 back-end codes perform service and receive request, by the ARM instruction set simulator code code1 that receives of execution and
Backtracking result after two parameter, execution;
4.5 softwares receive result includes on interface or continues follow-up operation by it.
Technique according to the invention scheme, the executable program applied to hardware lock is without in change in the prior art
The cloud lock platform for passing to high in the clouds is used, and cloud be can be used to lock platform and is carried out management software mandate instead of hardware lock, so as to save to hardware
The management cost of lock and time.
The method that the embodiment of the present invention is realized the executable program applied to hardware lock and can performed beyond the clouds is to carry beyond the clouds
For simulator, such as ARM simulators, by simulating holding for executable program to the translation implementation procedure of above-mentioned executable program
Row process, reaches the implementation effect same with hardware lock.Here ARM simulators can be the ARM simulators of standard, either
The ARM simulators customized by hardware lock provider.In this way, can both be performed with portion executable program in hardware lock, also may be used
Performed with locking platform in cloud, accomplished to compile an executable program, just may be implemented in hardware lock and cloud is locked in platform
With the effect of operation, and no longer limited by the performance and memory space of hardware lock, if having network can distributed software, no
Secure hardware (hardware lock) etc. must be posted to the end user of software.Due to being no longer limited by the performance of secure hardware, actually may be used
Greatly increased with the size of code of transplanting, and software key algorithm is beyond the clouds, and the personnel that crack can not more contact implementation and crack, significantly
Improve the security of software.
The section Example of the present invention is illustrated above, but the invention is not restricted to embodiments above, but
A variety of modifications or modification can be carried out to embodiment in the case where not departing from present inventive concept scope.
Claims (11)
1. a kind of method for protecting software, it is characterised in that at least one executable program applied to hardware lock is uploaded into cloud
Platform is locked, at least one described executable program and at least one protected code section of software are corresponding respectively, and the cloud lock is flat
Platform is provided with simulator,
Methods described includes:
The request that performs from software is received, described perform asks to be used to ask to perform at least one described executable program
With the mark for performing parameter and corresponding corresponding executable program in corresponding executable program, and the execution request
Know;
The simulator loads corresponding executable program according to the mark and carries out translation execution, is performed in translation
The execution parameter is inputted in journey when needing input parameter, so that data of obtaining a result;
The result data is returned to software.
2. method for protecting software according to claim 1, it is characterised in that by can applied at least one of hardware lock
Configuration processor is uploaded to before cloud lock platform, and methods described also includes:
Extract at least one code segment in software;
At least one code segment of extraction is packaged respectively;
At least one code segment after encapsulation is compiled at least one executable program respectively.
3. method for protecting software according to claim 1, it is characterised in that the executable program is executable for binary system
Program.
4. method for protecting software according to claim 3, it is characterised in that the simulator is ARM instruction set simulator,
Then the simulator loads corresponding executable program according to the mark and carries out translation execution and includes:
The ARM instruction set simulator loads corresponding executable program according to the mark, is held to corresponding
Binary sequence in line program carries out translating into the source code for meeting ARM instruction set standard and the processing performed one by one.
5. method for protecting software according to claim 1, it is characterised in that also include:
While the simulator loads corresponding executable program according to the mark, in cloud lock platform side Shen
Please at least two buffering areas, one of buffering area is used to store the input parameter, and another buffering area is used to store institute
State result data.
6. method for protecting software according to claim 1, it is characterised in that also include:
After the request of the execution from software is received, judge described perform asks whether to possess for corresponding executable
The request permissions of program;
In judged result request is performed for when not possessing request permissions, refusal processing is described.
7. a kind of security system for software, it is characterised in that the security system for software prestores at least one applied to hardware lock
Individual executable program, at least one described executable program and at least one protected code section of software are corresponding respectively,
Described device includes:
Interface module, it is configured to reception and performs request from software, and described perform asks to be used to ask described in execution at least
Corresponding executable program in one executable program, and described perform carries execution parameter and the correspondence phase in request
The mark for the executable program answered;
Simulator, it is configured to load corresponding executable program according to the mark and carries out translation execution, in translation
The execution parameter is inputted in implementation procedure when needing input parameter, so that data of obtaining a result;
The interface module is additionally configured to return to the result data to software.
8. security system for software according to claim 7, it is characterised in that the executable program is executable for binary system
Program.
9. security system for software according to claim 8, it is characterised in that the simulator is ARM instruction set simulator,
The ARM instruction set simulator is configured to load corresponding executable program according to the mark, to it is corresponding can
Binary sequence in configuration processor carries out translating into the source code for meeting ARM instruction set standard and the processing performed one by one.
10. security system for software according to claim 7, it is characterised in that the simulator is further configured to, in root
While loading corresponding executable program according to the mark, apply for slow at least two in the security system for software
Area is rushed, one of buffering area is used to store the input parameter, and another buffering area is used to store the result data.
11. security system for software according to claim 7, it is characterised in that also include:
Determination module, be configured to judge execution request that the interface module is received whether possess for it is corresponding can
The request permissions of configuration processor,
Wherein, the simulator is configured to when the judged result of determination module does not possess request permissions for the execution request,
Refusal processing is described to perform request.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710221050.6A CN106971096B (en) | 2017-04-06 | 2017-04-06 | Method for protecting software and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710221050.6A CN106971096B (en) | 2017-04-06 | 2017-04-06 | Method for protecting software and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106971096A true CN106971096A (en) | 2017-07-21 |
CN106971096B CN106971096B (en) | 2018-12-18 |
Family
ID=59336668
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710221050.6A Active CN106971096B (en) | 2017-04-06 | 2017-04-06 | Method for protecting software and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106971096B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108733987A (en) * | 2018-04-12 | 2018-11-02 | 惠州市源医科技有限公司 | A kind of encryption method and device of the binary object file based on embedded device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1419191A (en) * | 2001-10-31 | 2003-05-21 | 亚普公司 | Intermediate code executive system and method, computer program products for executing intermediate code |
CN200966072Y (en) * | 2006-03-17 | 2007-10-24 | 北京飞天诚信科技有限公司 | Network software-based information safety protector |
CN102685122A (en) * | 2012-05-06 | 2012-09-19 | 北京深思洛克软件技术股份有限公司 | Software protection method based on cloud server |
CN103106356A (en) * | 2013-02-01 | 2013-05-15 | 北京深思洛克软件技术股份有限公司 | Method for generating code in safe environment and improving software protection intensity |
CN104392151A (en) * | 2014-11-27 | 2015-03-04 | 北京深思数盾科技有限公司 | Software protection method and system |
CN104462882A (en) * | 2014-12-18 | 2015-03-25 | 北京深思数盾科技有限公司 | Software protection method, hardware encryption equipment and software protection system comprising hardware encryption equipment |
CN106407751A (en) * | 2016-08-31 | 2017-02-15 | 北京深思数盾科技股份有限公司 | Method and device for protecting executable file |
-
2017
- 2017-04-06 CN CN201710221050.6A patent/CN106971096B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1419191A (en) * | 2001-10-31 | 2003-05-21 | 亚普公司 | Intermediate code executive system and method, computer program products for executing intermediate code |
CN200966072Y (en) * | 2006-03-17 | 2007-10-24 | 北京飞天诚信科技有限公司 | Network software-based information safety protector |
CN102685122A (en) * | 2012-05-06 | 2012-09-19 | 北京深思洛克软件技术股份有限公司 | Software protection method based on cloud server |
CN103106356A (en) * | 2013-02-01 | 2013-05-15 | 北京深思洛克软件技术股份有限公司 | Method for generating code in safe environment and improving software protection intensity |
CN104392151A (en) * | 2014-11-27 | 2015-03-04 | 北京深思数盾科技有限公司 | Software protection method and system |
CN104462882A (en) * | 2014-12-18 | 2015-03-25 | 北京深思数盾科技有限公司 | Software protection method, hardware encryption equipment and software protection system comprising hardware encryption equipment |
CN106407751A (en) * | 2016-08-31 | 2017-02-15 | 北京深思数盾科技股份有限公司 | Method and device for protecting executable file |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108733987A (en) * | 2018-04-12 | 2018-11-02 | 惠州市源医科技有限公司 | A kind of encryption method and device of the binary object file based on embedded device |
Also Published As
Publication number | Publication date |
---|---|
CN106971096B (en) | 2018-12-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101997912A (en) | Mandatory access control device based on Android platform and control method thereof | |
Fitzgerald et al. | Vienna development method | |
CN108196872A (en) | The upgrade method of intelligent contract in a kind of block catenary system | |
US20060130026A1 (en) | Method and system for automatically identifying and marking subsets of localizable resources | |
CN105765527A (en) | Method and apparatus for custom software development kit (SDK) generation | |
CN107092518A (en) | A kind of Compilation Method for protecting mimicry system of defense software layer safe | |
CN101393521A (en) | Extracting system for internal curing data of windows application program | |
CN105339889A (en) | Techniques for language translation localization for computer applications | |
CN109255107A (en) | Configuration software processing method, device, computer equipment and storage medium | |
CN109413189B (en) | Electronic transaction system based on bottom translation | |
Maidl et al. | A comprehensive framework for security in engineering projects-based on IEC 62443 | |
CN110457869B (en) | Program compiling and encrypting method and device, storage medium and electronic equipment | |
SG182015A1 (en) | Method and system for protecting intellectual property in software | |
CN107797996A (en) | A kind of word translation method and device | |
CN106971096B (en) | Method for protecting software and system | |
CN110597496B (en) | Method and device for acquiring bytecode file of application program | |
Reascos et al. | A conceptual framework for the implantation of enterprise applications in small and medium enterprises (SMEs) | |
Moretti | Accellera’s Support for ESL Verification and Stimulus Reuse | |
Whiting et al. | Automated model-based attack tree analysis using HiP-HOPS | |
CN106873992B (en) | Multi-element access control mechanism description and analysis method | |
CN115455430A (en) | Security protection method and system based on Kyverno security policy | |
CN110633077B (en) | Quick development system and method based on modularization | |
Jaß et al. | Bit-precise formal verification for SystemC using satisfiability modulo theories solving | |
Sun et al. | A supporting tool for creating and maintaining security targets according to ISO/IEC 15408 | |
CN113050927A (en) | Permission control method and device based on user-defined instruction and computer equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing Patentee after: Beijing Shendun Technology Co.,Ltd. Address before: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd. |
|
CP01 | Change in the name or title of a patent holder |