CN107368712B - The guard method and system of software - Google Patents
The guard method and system of software Download PDFInfo
- Publication number
- CN107368712B CN107368712B CN201710631247.7A CN201710631247A CN107368712B CN 107368712 B CN107368712 B CN 107368712B CN 201710631247 A CN201710631247 A CN 201710631247A CN 107368712 B CN107368712 B CN 107368712B
- Authority
- CN
- China
- Prior art keywords
- software
- security component
- feature
- protected
- protected software
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 238000004458 analytical method Methods 0.000 claims abstract description 62
- 238000005336 cracking Methods 0.000 claims description 38
- 230000003068 static effect Effects 0.000 claims description 21
- 238000004891 communication Methods 0.000 claims description 15
- 238000001514 detection method Methods 0.000 claims description 15
- 238000012545 processing Methods 0.000 claims description 8
- 238000012360 testing method Methods 0.000 claims description 4
- 230000006399 behavior Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- OWZREIFADZCYQD-NSHGMRRFSA-N deltamethrin Chemical compound CC1(C)[C@@H](C=C(Br)Br)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 OWZREIFADZCYQD-NSHGMRRFSA-N 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 239000000047 product Substances 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 238000005303 weighing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
- Stored Programmes (AREA)
Abstract
The invention discloses a kind of guard method of software and systems; it uses and protected software is protected according to the method for the present invention with the security component of protected software binding; the described method includes: during protected software operation; the security component is according to the pirate patch feature in pre-set safety database and/or cracks analysis tool feature, detects to each software;If the security component detect at least one software include the pirate patch feature and/or it is described crack analysis tool feature, the security component takes predetermined measures to the protected software.Guard method according to the present invention, which is used, protects monitored software with the security component of monitored software binding.
Description
Technical field
This application involves software protection more particularly to a kind of guard method of software and systems.
Background technique
After software developer issues software, often perplexed by problem of piracy.Pirate (also known as " reprint ") refers to without all
In the case where weighing people's agreement, the behavior that its works, publication are replicated, distributed again, and to encroach right made of this behavior
Product.Although this behavior of bootlegger is defined as the illegal activities of piracy of intellectual property rights, even in many countries and regions
Criminal offence will receive the punishment of the country one belongs to.
In software field, so-called piracy software usually for example increase appended document as robber to software by bootlegger
The processing of the version modes such as patch uses the function of the software to allow consumer to avoid the relevant verifying of the software owner,
Usual piracy software can not provide legal document of title (rights certificate), can not provide after-sale service for user, however disappear
Expense person is also intended to due to the cheap of piracy software or freely using piracy software.
Since software (or software product) iteration of present society itself is very fast, if software developer takes judicial means
Problem of piracy is solved, not only right-safeguarding is at high cost, and poor in timeliness.Thus whenever encountering piracy, software developer is common square
Method is oneself to spend a large amount of manpowers and time to analyze the problem of piracy collected on the market, customizes corresponding encryption side
Case, then issue software binary version again to solve the problem of piracy.Carry out processing software problem of piracy by this method
Disadvantage is:
1. increasing the development cost of software developer, and special messenger is needed to handle corresponding work, therefore whole
Right-safeguarding cost increase;
2. common software is opened since the logic of above-mentioned safety-related processing method and software itself does not have much relations
Hair quotient is usual and is bad at, unable to do what one wishes in processing, cannot reach the desired effect for guaranteeing that software ownership is inviolable;
3, it whenever encountering piracy, needs to issue the version of software again, it is more passive to handle this problem.
Summary of the invention
In order to improve software property protection dynamics and alleviate pressure of the software developer in terms of protecting software ownership
Power, the present invention provides a kind of guard method of software and systems.
According to an aspect of the invention, there is provided a kind of guard method of software, uses what is bound with protected software
Security component protects protected software, and method includes:
During protected software operation, security component is according to the pirate patch feature in pre-set safety database
And/or analysis tool feature is cracked, each software is detected;
Include pirate patch feature and/or crack analysis tool spy if security component detects at least one software
Sign, then security component takes predetermined measures to protected software.
Wherein, interface and static library are integrated in protected software;
Security component has binding relationship by interface and static library in protected software and protected software;
Security component is enabled by interface and static library in protected software starting.
In addition, according to the method for the present invention further include:
Security component also detects protected software running environment during to each software detection;
Running environment information that security component will test and the data generated in each software running process are uploaded to peace
Full server-side;
Security component receives feedback data from security service end, wherein feedback data includes following at least one: new robber
Version patch feature, it is new crack analysis tool feature and new security patch, feedback data is by security service end according to operation ring
The data generated in border information and/or each software running process generate.
It is preferably, according to the present invention further include:
If in the feedback data that security component receives include new security patch, protected software security patch into
Row upgrading;
If cracking analysis tool including new pirate patch feature and/or newly in the feedback data that security component receives
Feature, then security component updates new pirate patch feature and/or the new analysis tool feature that cracks into safety database.
According to another aspect of the present invention, provide it is a kind of for protecting the security component of software, with by protect it is soft
Part is bound to protect to it, and security component includes:
Detection unit is configured to during protected software is run, according to the robber in pre-set safety database
Version and/or cracks analysis tool feature at patch feature, detects to each software;
Processing unit, if be configured to security component and detect at least one software include pirate patch feature and/
Or cracking analysis tool feature, then security component takes predetermined measures to protected software.
According to another aspect of the present invention, a kind of protection system of software is provided comprising user terminal and server-side,
Wherein, user terminal includes protected software and security component, and system uses the security component bound with protected software to being protected
Shield software is protected, and security component includes:
Detection unit is configured to during protected software is run, according to the robber in pre-set safety database
Version and/or cracks analysis tool feature at patch feature, detects to each software;
Processing unit, if be configured to security component and detect at least one software include pirate patch feature and/
Or cracking analysis tool feature, then security component takes predetermined measures to protected software.
Wherein, interface and static library are integrated in protected software;
Security component has binding relationship by interface and static library in protected software and protected software;
Security component is enabled by interface and static library when protected software starts.
Further, detection unit is additionally configured to during to each software detection, also detects protected software
Running environment;
Security component further include:
Communication unit is configured to will test in running environment information and each software running process detected by unit
The data of generation are uploaded to security service end;
Security service end includes:
Data generating unit is configured to according to the number generated in running environment information and/or each software running process
According to feedback data is generated, feedback data includes following at least one: new pirate patch feature new cracks analysis tool feature
With new security patch;
The communication unit of security component is additionally configured to receive feedback data from security service end.
Preferably, security component further includes upgrade unit, issuance unit and updating unit,
If including new security patch in the feedback data that communication unit receives, upgrade unit security patch is to quilt
Protection software is upgraded;
If cracking analysis tool including new pirate patch feature and/or newly in the feedback data that communication unit receives
Feature, then updating unit updates new pirate patch feature and/or the new analysis tool feature that cracks into safety database.
Optionally, server-side further include:
Issuance unit is configured to for the feedback data of generation to be issued to all protected softwares.
The guard method of software through the invention and system at least can be realized it is following the utility model has the advantages that
By carrying out data statistics and analysis to running piracy software, pirate reason is positioned;
Piracy software progress security patch is issued by issuing form, to reach the mesh for making piracy software fail
's;
Current patch working condition is counted, piracy solves situation, and further tracks;
And among these, software developer does not need to do too many work, less it should be understood that its working principle, does not have to investment
Special manpower, it is only necessary to be absorbed in the business of itself industry.
Detailed description of the invention
Fig. 1 is the flow chart of one embodiment of method for protecting software according to the present invention;
Fig. 2 is the block diagram of one embodiment of the security component according to the present invention for protecting software;
Fig. 3 is the block diagram of one embodiment of the protection system of software according to the present invention;
Fig. 4 is the schematic diagram of a preferred embodiment of method for protecting software according to the present invention.
Specific embodiment
As shown in Figure 1 for according to the guard method of the software of one embodiment of the present of invention, this method is mainly used and quilt
The security component of protection software binding protects protected software, wherein and security component for example can be engine of cracking down upon evil forces, and
The binding of protected software and security component can be understood as the two function binding, thus when user uses protected software
It must operational safety component, and it is also to be understood that protected software " connecing using security component as communication with the outside world simultaneously
Mouthful ", so that the function that pirated disc copier can not separate security component without influencing protected software from protected software.The protection side
Method includes:
S1, during protected software operation, security component is according to the pirate patch in pre-set safety database
Feature and/or crack analysis tool feature, each software detected, each software may include protected software and with quilt
Protection software be in other softwares of same user terminal, wherein may include first subdata base in safety database with/
Or second subdata base, wherein first subdata base can be pirate patch property data base comprising pirate patch is special
Sign, which, which can be, cracks analysis tool property data base comprising cracks analysis tool feature, wherein with
Other softwares that protected software is in same user terminal may be to crack analysis tool, therefore, wherein there may be crack point
Analyse tool characteristics;
S2 includes pirate patch feature and/or cracks analysis tool if security component detects at least one software
Feature, then the security component takes predetermined measures to the protected software, the predetermined measures may include make to be protected it is soft
Part is unable to run, and can run current function but cannot carry out function upgrading again thus cannot use software developer in future
Upgrade function of publication etc. mechanism designed before protected software is distributed to user by developer.
Work of the software developer in terms of software security can be liberated by method for protecting software according to the present invention,
Because it only needs to be absorbed in the business of itself industry without putting into special manpower and time to pay close attention to this.
In one preferred embodiment, security component may include the safety database that dynamic updates, secure data
It include the piracy for being directed to protected software in advance in library, especially its first subdata base (such as pirate patch property data base)
Pirate patch feature that patch is collected and/or from the received pirate patch feature in security service end.It can wrap in the present embodiment
Three kinds of situations are included, three kinds of situations are carried out respectively below to description of illustrating in detail:
The first situation includes the robber for being directed to protected software in advance in safety database, especially the first subdata base
The pirate patch feature that version patch is collected, for example, first, software developer first develops and issued the A software (present invention to user
In protected software), after a period of time, it is found that the pirate situation of A software is serious, therefore it has collected for A software
The pirate patch feature of pirate patch, then by the safety database of these pirate patch feature deposit security components, and will peace
Whole assembly is bound with A software, and obtaining A plus software, (it is functionally identical with A software, is only that and is bundled with peace
Whole assembly), and A plus software has been issued, it only carries out option pack and/or security patch by security component from there on
Upgrading update, and the user for having A software is also transitioned into gradually using A plus software;Second, in software developer
A software is carried out to obtain B software after function/firmware upgrade, then binds security component according to the present invention, it is soft to obtain B plus
Part, it is assumed that (such as Chong Die 50% or more), Ke Yi in the case that B software has a certain proportion of function/overlapped attributes with A software
In the case where judging that the pirate patch for being directed to A software may also be directed to B software, collected by the piracy software for A software
Pirate patch feature can also add in the safety database for the security component bound with B software function;Third, one section of every mistake
Regular time (such as 1 year) just collects once for the pirate patch feature of the piracy software of A software, then adds to peace
In full database, then again by with updated safety database security component and protected software (or compared to former quilt
Protect the software with upgrade function of software) it is bound, then it is distributed to user;
Second situation includes from the received piracy in security service end in safety database, especially the first subdata base
Its running environment information is uploaded to server-side during monitoring protected software by patch feature, security component, is protected existing
Have pirate patch feature therefore can be from running environment information in the case where protecting software pirate version, in running environment information
It analyzes pirate patch feature and is supplemented to safety database, to be updated to the latter;In addition, second situation is also
It may include that server-side is directed to protected software by what its that its special interface to software developer is transmitted was collected
Piracy software, piracy software is analyzed in server-side, to obtain the pirate patch feature of these piracy software;
The third situation includes the robber for being directed to protected software in advance in safety database, especially the first subdata base
Pirate patch feature that version patch is collected and from the received pirate patch feature in security service end, for example, may include the first
Situation and second situation.
In a preferred embodiment, security component may include the safety database that dynamic updates, secure data
Library may include the second subdata base (such as the property data base for cracking analysis tool/crack analysis software) comprising in advance
Cracking feature that analysis tool (such as crack analysis software) is collected and/or received from security service end for protected software
Feature, in the present embodiment equally may include three kinds of situations, three kinds of situations are carried out respectively below in detail illustrate description:
The first situation includes in advance for the broken of protected software in safety database, especially the second subdata base
The feature that solution analysis tool (such as cracking analysis software) is collected, wherein it will be understood by those skilled in the art that it is soft to crack analysis
Part can be the softwares such as debugger or virtual machine, not due to the different and entirely different of every money software, crack point with a
Analysis software can be applied in different protected softwares, in embodiments of the present invention, can be in publication protected software
Before, it first collects existing crack in the prior art and analyzes software (including cracking analysis software specifically for protected software
It is already present in the prior art other to crack analysis software) feature, and be stored in safety database.Wherein, these are broken
The feature of solution analysis software may include storage position feature, name feature etc., wherein title can be process title, window
Title and file name etc.;
Second situation, include in safety database, especially the second subdata base from the received feature in security service end,
During the operation of protected software, its running environment information is uploaded to server-side by security component, there are protected softwares
Have the feature for cracking analysis software therefore can be from running environment information in the case where piracy, in running environment information
It analyzes the feature for cracking analysis software and is supplemented to safety database, to be updated to the latter;In addition, second
Situation can also include that server-side cracks analysis by what its that its special interface to software developer is transmitted was collected
Software is analyzed in server-side analysis software is cracked, and analyzes software to obtain these and crack cracking for analysis software
Feature;
The third situation includes in advance for the broken of protected software in safety database, especially the second subdata base
Feature that solution analysis tool (such as crack analysis software) is collected and/or from the received feature in security service end, for example, can wrap
Include the first situation and second situation.
Three kinds of situations and the second subdata base in above first subdata base (pirate patch property data base) (crack point
Analysis software features database) in three kinds of situations can be optionally combined, it is within the scope of the present invention.Pass through setting the
One database, can protected software run during, according to the pirate patch feature in first database to running environment into
Row detection, to find pirate patch with more growing with each passing hour to make successfully manage strategy in time;Pass through the second database
Setting, can be discovered whether during protected software is run according to the cracking analysis software features in the second database
Have and crack analysis software debugging or other behaviors for attempting to crack are carried out to protected software, is answered to carry out anti-debug etc. in time
To strategy.
In a further advantageous embodiment, the security component before being bound in protected software may include software
Developing instrument (Software Development Kit, SDK), SKD may include interface and static library, in the present embodiment,
Guard method according to the present invention may further include: after security component and protected software binding, this is protected soft
Interface and static library are integrated in part;Security component has by interface in protected software and static library with protected software
Binding relationship;Security component is enabled by interface and static library in protected software starting.
By the interface and static library integrated in protected software, to realize that the information of protected software and security component is handed over
Mutually, by the way that security component and protected software have been carried out the function binding of depth so that piracy can not crack protected it is soft
It by security component deletion or in vain when part, and can not also evade out security component when using the piracy software after cracking, make
Obtaining security component can run together with piracy software, to prepare to realize by what running environment information uploaded.
In a further advantageous embodiment, guard method according to the present invention further include: security component is to each software
During detection, protected software running environment is also detected;Running environment information that security component will test and each soft
The data generated in part operational process are uploaded to security service end;Security component receives feedback data from the security service end,
Wherein, feedback data includes following at least one: new pirate patch feature new cracks analysis tool feature and new safety
Patch, feedback data are raw according to the data generated in running environment information and/or each software running process by security service end
At.Due to running environment information can real-time/regular upload, server-side can grasp in real time whether protected software deposits
By pirate phenomenon, and based on the newest pirate patch of running environment acquisition of information being most recently detected and/or crack analysis
Pirate situation is limited in controlled range by tool characteristics to make countermeasure.In the present embodiment, further includes: be based on
According to server-side receive for protected software piracy software obtain pirate patch feature and/or crack analysis tool
Feature generates corresponding security patch, then its by new pirate patch feature, new crack analysis tool feature and new peace
Full patch is sent to security component as feedback data.In addition, pirate patch feature and/or cracking the acquisition of analysis tool feature
Channel be not it is single uploaded by security component, but can also include by security development quotient or the operator of server-side actively
Collect, be then transmitted in server-side by the special interface of server-side, this mode as supplement pirate patch feature with/
Or crack analysis tool feature obtain channel enable technical solution of the present invention obtain more comprehensively pirate patch feature and/
Or analysis tool feature is cracked, to make more comprehensively countermeasure.
In a preferred embodiment, according to the method for the present invention, if including in the feedback data that security component receives
New security patch, then protected software is upgraded with security patch;If in the feedback data that the security component receives
Including new pirate patch feature and/or it is new crack analysis tool feature, then security component is special by the new pirate patch
Sign and/or the new analysis tool feature that cracks are updated into safety database.Security component according to the present invention includes secure group
Part main body and multiple safety databases, wherein each safety database includes a corresponding protected software, and security component will connect
The patch feature received is updated into all safety databases.
The beneficial effect of this embodiment is equally that it is possible to dynamically improve database (especially its pirate patch feature
Library), to carry out corresponding countermeasure when detecting pirate patch feature and/or cracking analysis tool feature.
According to another embodiment of the invention, as shown in Fig. 2, provide it is a kind of for protecting the security component of software,
It can protect protected software using guard method shown in FIG. 1, the security component and protected software bind with
It is protected, security component according to the present invention may include:
Detection unit 22 is configured to during protected software is run, according in pre-set safety database
Pirate patch feature and/or analysis tool feature is cracked, each software is detected;
Processing unit 23 detects at least one software to include the pirate benefit if being configured to the security component
Fourth feature and/or it is described crack analysis tool feature, then the security component takes predetermined measures to the protected software.
Another preferred embodiment according to the present invention is wrapped as shown in figure 3, providing a kind of protection system of software
Include user terminal and server-side, wherein user terminal includes protected software and security component, and system use is bound with protected software
Security component protected software is protected, can be implemented by protection system for the aforesaid operations of guard method.Root
Include: according to security component of the invention
Detection unit 22 is configured to during protected software is run, according in pre-set safety database
Pirate patch feature and/or analysis tool feature is cracked, each software is detected;
Processing unit 23 detects at least one software to include the pirate benefit if being configured to the security component
Fourth feature and/or it is described crack analysis tool feature, then the security component takes predetermined measures to the protected software.
Wherein, interface and static library are integrated in protected software;The security component passes through in the protected software
Interface and static library and the protected software there is binding relationship;When the protected software starts by the interface and
Static library enables the security component.
Further, the detection unit is additionally configured to during to each software detection, and also detection is protected
Protect the running environment of software;
The security component further include:
Communication unit is configured to run running environment information detected by the detection unit and each software
The data generated in journey are uploaded to security service end;
The security service end includes:
Data generating unit is configured to generate according in the running environment information and/or each software running process
Data generate feedback data, the feedback data includes following at least one: new pirate patch feature new cracks analysis
Tool characteristics and new security patch;
The communication unit of the security component is additionally configured to receive feedback data from the security service end.
Preferably, security component according to the present invention can also include: upgrade unit, issuance unit and updating unit,
If in the feedback data that the communication unit receives including new security patch, described in the upgrade unit use
Security patch upgrades protected software;
If cracking analysis including new pirate patch feature and/or newly in the feedback data that the communication unit receives
Tool characteristics, then the updating unit arrives the new pirate patch feature and/or the new analysis tool feature update that cracks
In safety database.
According to a preferred embodiment of the present invention, in server of the system further include:
Issuance unit is configured to for the feedback data of generation to be issued to all protected softwares.
In the case where including new security patch in feedback data, issuance unit issues the new security patch of generation
To all protected softwares, so that protected software is upgraded with security patch.For example, software developer has issued 100
It is a to bind the legal protected software for having security component, and bootlegger is illegally made using one of copyrighted software (with collection
At the mode of pirate patch) go out 50 piracy software (also binding has security component), and in this 50 piracy software at least
One at runtime, running environment information can be uploaded to server-side by security component, and the operation ring of piracy software accordingly
Border information can obtain pirate patch feature and/or crack analysis tool feature, regenerate corresponding security patch be issued to this 150
In a software, then 50 piracy software can be when being upgraded, in the operation reserve in security patch using security patch.
In addition, the present invention is also included within and issues the business patch of protected software (software is using business patch come updating software release, function
Energy, database of software itself etc.) while issue security patch, thus save issue number, that is, it is understood that security component
It can be used for actively and/or passively, in real time and/or periodically pulling and/or receiving business patch from server-side and/or safety mended
Fourth.
In addition it is also possible to understand, pirate patch feature is being obtained every time and/or is cracking analysis tool feature simultaneously in server-side
After generating corresponding security patch, by pirate patch feature and/or analysis tool feature is cracked and corresponding security patch is equal
Associated storage is carried out, to detect a certain pirate patch feature in protected software and/or crack analysis tool feature
When, can actively the piracy patch feature be searched for from server-side and/or cracks the corresponding security patch of analysis tool feature, so
The security patch is actively obtained afterwards to be upgraded.
It is appreciated that the technical scheme is that being realized by network or other radio communication medias.
As shown in figure 4, for engine of cracking down upon evil forces can be used as security component according to a preferred embodiment of the present invention
Realize software protection, wherein engine of cracking down upon evil forces includes that Software Development Kit (SDK), current reference work package of cracking down upon evil forces (are cracked down upon evil forces and drawn
Hold up main body) and database (safety database i.e. above), wherein SDK includes static library and interface;Database is one dynamic
State library comprising pirate patch library and crack analysis software database.The present embodiment is described in detail below:
The interface of SKD is called to call for software developer protected software and engine of cracking down upon evil forces are established function connects, it
Afterwards, the protected software for establishing function connects with engine of cracking down upon evil forces is issued to user terminal;
In user terminal, during protected software operation, current reference work package of cracking down upon evil forces is responsible for the operation ring to software
Border monitoring (including according to pirate patch library to software carry out pirate detection and according to crack analysis software database to software into
The protection of row anti-debug), safety/business patch of software pulls, running environment information (includes in the case where software pirate version
Pirate data) upload etc.;
When needing to carry out data update, database is updated, is mainly used for the protected software for piracy occur
Be modified, with crack/pirate patch fought,
And on engine backstage (server-side) of cracking down upon evil forces, corresponding security patch is generated according to the pirate patch feature of upload, and
Being issued to all protected softwares upgrades the phase, make wherein piracy software stop working.
Beneficial effects of the present invention are broadly described again below:
1. software developer only needs to integrate the SDK for engine of cracking down upon evil forces using the related calling interface for engine offer of cracking down upon evil forces
Into itself software, without other operations.That is, software developer calls the interface in the Software Development Kit for engine of cracking down upon evil forces,
Realize the function binding of software with engine of cracking down upon evil forces.When carrying out the feature operations such as data encryption or network verification to software, need
It to be carried out by cracking down upon evil forces engine as " interface ", this function binding i.e. between software and engine of cracking down upon evil forces, by by software and anti-
Depth binding between black engine, so that piracy software can not evade engine of cracking down upon evil forces.
2. issuing software arrives end user, developer's software will be present under user environment and engine two parts of cracking down upon evil forces, crack down upon evil forces
Engine can play a protective role during software is run.
3. on the one hand engine of cracking down upon evil forces can protect developer's software and not encroached on, patch on the one hand is provided for developer's software
Upgrade service;When developer's software occurs pirate, crack down upon evil forces engine and engine background communication of cracking down upon evil forces learn that developer's software needs
To upgrade for current version, updated contents are the software patch for current safety problem.
4. engine of cracking down upon evil forces pulls upgrade patch from server-side, patch is issued to end user, and end user's piracy software is stopped
Only work.
5. after a period of time, statistics and analysis piracy situation, guarantee software work normally again.
Claims (10)
1. a kind of guard method of software, which is characterized in that soft to being protected using the security component bound with protected software
Part is protected, which comprises
During protected software operation, the security component is according to the pirate patch feature in pre-set safety database
And/or analysis tool feature is cracked, each software is detected;
Include the pirate patch feature and/or described crack analysis if the security component detects at least one software
Tool characteristics, then the security component takes predetermined measures to the protected software
Wherein, the protected software and the security component are bound the two function binding, or with the secure group
Interface of the part as the protected software communication with the outside world.
2. the method according to claim 1, wherein being integrated with interface and static library in the protected software;
The security component by interface in the protected software and static library and the protected software there is binding to close
System;
The security component is enabled by the interface and static library in protected software starting.
3. the method according to claim 1, wherein further include:
The security component also detects protected software running environment during to each software detection;
Running environment information that the security component will test and the data generated in each software running process are uploaded to peace
Full server-side;
The security component receives feedback data from the security service end, wherein the feedback data includes following at least one
Kind: new pirate patch feature, it is new crack analysis tool feature and new security patch, the feedback data is by the safety
Server-side is generated according to the data generated in the running environment information and/or each software running process.
4. according to the method described in claim 3, it is characterized by further comprising:
If in the feedback data that the security component receives including new security patch, the protected software peace
Full patch is upgraded;
If cracking analysis tool including new pirate patch feature and/or newly in the feedback data that the security component receives
Feature, then the security component updates the new pirate patch feature and/or the new analysis tool feature that cracks to safety
In database.
5. a kind of for protecting the security component of software, which is characterized in that it is bound with protected software to protect to it,
The security component includes:
Detection unit is configured to during protected software is run, and is mended according to the piracy in pre-set safety database
Fourth feature and/or analysis tool feature is cracked, each software is detected;
Processing unit detects at least one software to include the pirate patch feature if being configured to the security component
And/or it is described crack analysis tool feature, then the security component takes predetermined measures to the protected software,
Wherein, the protected software and the security component are bound the two function binding, or with the secure group
Interface of the part as the protected software communication with the outside world.
6. a kind of protection system of software, which is characterized in that it includes user terminal and server-side, wherein user terminal includes being protected
Software and security component are protected, the system uses the security component bound with protected software to protect protected software,
The security component includes:
Detection unit is configured to during protected software is run, and is mended according to the piracy in pre-set safety database
Fourth feature and/or analysis tool feature is cracked, each software is detected;
Processing unit detects at least one software to include the pirate patch feature if being configured to the security component
And/or it is described crack analysis tool feature, then the security component takes predetermined measures to the protected software,
Wherein, the protected software and the security component are bound the two function binding, or with the secure group
Interface of the part as the protected software communication with the outside world.
7. system according to claim 6, which is characterized in that be integrated with interface and static library in the protected software;
The security component by interface in the protected software and static library and the protected software there is binding to close
System;
The security component is enabled by the interface and static library when the protected software starts.
8. system according to claim 6, which is characterized in that
The detection unit is additionally configured to during to each software detection, also detects the operation ring of protected software
Border;
The security component further include:
Communication unit, being configured to will be in running environment information and each software running process detected by the detection unit
The data of generation are uploaded to security service end;
The security service end includes:
Data generating unit is configured to according to the number generated in the running environment information and/or each software running process
According to feedback data is generated, the feedback data includes following at least one: new pirate patch feature new cracks analysis tool
Feature and new security patch;
The communication unit of the security component is additionally configured to receive feedback data from the security service end.
9. system according to claim 8, which is characterized in that the security component further includes upgrade unit, issuance unit
And updating unit,
If in the feedback data that the communication unit receives including new security patch, the upgrade unit safety
Patch upgrades protected software;
If cracking analysis tool including new pirate patch feature and/or newly in the feedback data that the communication unit receives
Feature, then the updating unit updates the new pirate patch feature and/or the new analysis tool feature that cracks to safety
In database.
10. system according to claim 8, which is characterized in that the server-side further include: issuance unit is configured to
The feedback data of generation is issued to all protected softwares.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710631247.7A CN107368712B (en) | 2017-07-28 | 2017-07-28 | The guard method and system of software |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710631247.7A CN107368712B (en) | 2017-07-28 | 2017-07-28 | The guard method and system of software |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107368712A CN107368712A (en) | 2017-11-21 |
CN107368712B true CN107368712B (en) | 2018-12-25 |
Family
ID=60307797
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710631247.7A Active CN107368712B (en) | 2017-07-28 | 2017-07-28 | The guard method and system of software |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107368712B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108021415A (en) * | 2017-12-30 | 2018-05-11 | 有米科技股份有限公司 | Automatic packaging method, apparatus, computer equipment and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104133832A (en) * | 2014-05-15 | 2014-11-05 | 腾讯科技(深圳)有限公司 | Pirate application identification method and device |
CN106302449A (en) * | 2016-08-15 | 2017-01-04 | 中国科学院信息工程研究所 | A kind of ciphertext storage cloud service method open with searching ciphertext and system |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009093396A (en) * | 2007-10-09 | 2009-04-30 | Panasonic Corp | Method for rejecting pirated media, apparatus, program, and medium |
CN102385671B (en) * | 2010-09-02 | 2016-05-04 | 研祥智能科技股份有限公司 | Software enciphering method and system |
CN103164642B (en) * | 2011-12-19 | 2016-11-23 | 比亚迪股份有限公司 | A kind of method and system preventing software piracy |
CN106850519B (en) * | 2016-01-08 | 2020-11-17 | 北京万维星辰科技有限公司 | Application security authentication method and device |
-
2017
- 2017-07-28 CN CN201710631247.7A patent/CN107368712B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104133832A (en) * | 2014-05-15 | 2014-11-05 | 腾讯科技(深圳)有限公司 | Pirate application identification method and device |
CN106302449A (en) * | 2016-08-15 | 2017-01-04 | 中国科学院信息工程研究所 | A kind of ciphertext storage cloud service method open with searching ciphertext and system |
Also Published As
Publication number | Publication date |
---|---|
CN107368712A (en) | 2017-11-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100578522C (en) | Electronic device, update method for same and integrated circuit | |
US8566949B2 (en) | Software component, software component management method, and software component management system | |
AU2009287433B2 (en) | System and method for detection of malware | |
Schmittner et al. | Status of the Development of ISO/SAE 21434 | |
CN107766728A (en) | Mobile application security managing device, method and mobile operation safety protection system | |
CN103699844B (en) | Safety protection system and method | |
CN104811428A (en) | Method, device and system for verifying client identity by social relation data | |
CN105683990A (en) | Method and apparatus for protecting dynamic libraries | |
CN105631251A (en) | APK reinforcing protection method and system | |
CN103020495B (en) | Embedded-type software anti-piracy encryption method | |
CN103246848A (en) | Software security protection method and equipment | |
Okafor et al. | Sok: Analysis of software supply chain security by establishing secure design properties | |
CN104252594A (en) | Virus detection method and device | |
CN107368712B (en) | The guard method and system of software | |
CN103186730A (en) | Method and device for protecting.NET software security | |
RU2006103986A (en) | METHOD FOR ADMINISTRATING SOFTWARE COMPONENTS INTEGRATED INTO MOBILE SYSTEM | |
CN105184119B (en) | A kind of method for security protection of software | |
US20240095402A1 (en) | Methods and Systems for Recursive Descent Parsing | |
CN106250726A (en) | Software version state management-control method | |
CN101924794A (en) | Internet based method for monitoring total software operation quantity in real time | |
US10789338B2 (en) | Software algorithm security | |
CN111159718A (en) | Method and device for bug repair and household appliance | |
CN114428955A (en) | Method and system for judging abnormal risk based on operation information and electronic equipment | |
CN107609359B (en) | For protecting the method and system of software | |
CN103034806B (en) | Process method and the terminal of operation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder | ||
CP01 | Change in the name or title of a patent holder |
Address after: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing Patentee after: Beijing Shendun Technology Co.,Ltd. Address before: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd. |