CN107368712B - The guard method and system of software - Google Patents

The guard method and system of software Download PDF

Info

Publication number
CN107368712B
CN107368712B CN201710631247.7A CN201710631247A CN107368712B CN 107368712 B CN107368712 B CN 107368712B CN 201710631247 A CN201710631247 A CN 201710631247A CN 107368712 B CN107368712 B CN 107368712B
Authority
CN
China
Prior art keywords
software
security component
feature
protected
protected software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710631247.7A
Other languages
Chinese (zh)
Other versions
CN107368712A (en
Inventor
孙吉平
张伟双
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Senseshield Technology Co Ltd
Original Assignee
Beijing Senseshield Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Senseshield Technology Co Ltd filed Critical Beijing Senseshield Technology Co Ltd
Priority to CN201710631247.7A priority Critical patent/CN107368712B/en
Publication of CN107368712A publication Critical patent/CN107368712A/en
Application granted granted Critical
Publication of CN107368712B publication Critical patent/CN107368712B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses a kind of guard method of software and systems; it uses and protected software is protected according to the method for the present invention with the security component of protected software binding; the described method includes: during protected software operation; the security component is according to the pirate patch feature in pre-set safety database and/or cracks analysis tool feature, detects to each software;If the security component detect at least one software include the pirate patch feature and/or it is described crack analysis tool feature, the security component takes predetermined measures to the protected software.Guard method according to the present invention, which is used, protects monitored software with the security component of monitored software binding.

Description

The guard method and system of software
Technical field
This application involves software protection more particularly to a kind of guard method of software and systems.
Background technique
After software developer issues software, often perplexed by problem of piracy.Pirate (also known as " reprint ") refers to without all In the case where weighing people's agreement, the behavior that its works, publication are replicated, distributed again, and to encroach right made of this behavior Product.Although this behavior of bootlegger is defined as the illegal activities of piracy of intellectual property rights, even in many countries and regions Criminal offence will receive the punishment of the country one belongs to.
In software field, so-called piracy software usually for example increase appended document as robber to software by bootlegger The processing of the version modes such as patch uses the function of the software to allow consumer to avoid the relevant verifying of the software owner, Usual piracy software can not provide legal document of title (rights certificate), can not provide after-sale service for user, however disappear Expense person is also intended to due to the cheap of piracy software or freely using piracy software.
Since software (or software product) iteration of present society itself is very fast, if software developer takes judicial means Problem of piracy is solved, not only right-safeguarding is at high cost, and poor in timeliness.Thus whenever encountering piracy, software developer is common square Method is oneself to spend a large amount of manpowers and time to analyze the problem of piracy collected on the market, customizes corresponding encryption side Case, then issue software binary version again to solve the problem of piracy.Carry out processing software problem of piracy by this method Disadvantage is:
1. increasing the development cost of software developer, and special messenger is needed to handle corresponding work, therefore whole Right-safeguarding cost increase;
2. common software is opened since the logic of above-mentioned safety-related processing method and software itself does not have much relations Hair quotient is usual and is bad at, unable to do what one wishes in processing, cannot reach the desired effect for guaranteeing that software ownership is inviolable;
3, it whenever encountering piracy, needs to issue the version of software again, it is more passive to handle this problem.
Summary of the invention
In order to improve software property protection dynamics and alleviate pressure of the software developer in terms of protecting software ownership Power, the present invention provides a kind of guard method of software and systems.
According to an aspect of the invention, there is provided a kind of guard method of software, uses what is bound with protected software Security component protects protected software, and method includes:
During protected software operation, security component is according to the pirate patch feature in pre-set safety database And/or analysis tool feature is cracked, each software is detected;
Include pirate patch feature and/or crack analysis tool spy if security component detects at least one software Sign, then security component takes predetermined measures to protected software.
Wherein, interface and static library are integrated in protected software;
Security component has binding relationship by interface and static library in protected software and protected software;
Security component is enabled by interface and static library in protected software starting.
In addition, according to the method for the present invention further include:
Security component also detects protected software running environment during to each software detection;
Running environment information that security component will test and the data generated in each software running process are uploaded to peace Full server-side;
Security component receives feedback data from security service end, wherein feedback data includes following at least one: new robber Version patch feature, it is new crack analysis tool feature and new security patch, feedback data is by security service end according to operation ring The data generated in border information and/or each software running process generate.
It is preferably, according to the present invention further include:
If in the feedback data that security component receives include new security patch, protected software security patch into Row upgrading;
If cracking analysis tool including new pirate patch feature and/or newly in the feedback data that security component receives Feature, then security component updates new pirate patch feature and/or the new analysis tool feature that cracks into safety database.
According to another aspect of the present invention, provide it is a kind of for protecting the security component of software, with by protect it is soft Part is bound to protect to it, and security component includes:
Detection unit is configured to during protected software is run, according to the robber in pre-set safety database Version and/or cracks analysis tool feature at patch feature, detects to each software;
Processing unit, if be configured to security component and detect at least one software include pirate patch feature and/ Or cracking analysis tool feature, then security component takes predetermined measures to protected software.
According to another aspect of the present invention, a kind of protection system of software is provided comprising user terminal and server-side, Wherein, user terminal includes protected software and security component, and system uses the security component bound with protected software to being protected Shield software is protected, and security component includes:
Detection unit is configured to during protected software is run, according to the robber in pre-set safety database Version and/or cracks analysis tool feature at patch feature, detects to each software;
Processing unit, if be configured to security component and detect at least one software include pirate patch feature and/ Or cracking analysis tool feature, then security component takes predetermined measures to protected software.
Wherein, interface and static library are integrated in protected software;
Security component has binding relationship by interface and static library in protected software and protected software;
Security component is enabled by interface and static library when protected software starts.
Further, detection unit is additionally configured to during to each software detection, also detects protected software Running environment;
Security component further include:
Communication unit is configured to will test in running environment information and each software running process detected by unit The data of generation are uploaded to security service end;
Security service end includes:
Data generating unit is configured to according to the number generated in running environment information and/or each software running process According to feedback data is generated, feedback data includes following at least one: new pirate patch feature new cracks analysis tool feature With new security patch;
The communication unit of security component is additionally configured to receive feedback data from security service end.
Preferably, security component further includes upgrade unit, issuance unit and updating unit,
If including new security patch in the feedback data that communication unit receives, upgrade unit security patch is to quilt Protection software is upgraded;
If cracking analysis tool including new pirate patch feature and/or newly in the feedback data that communication unit receives Feature, then updating unit updates new pirate patch feature and/or the new analysis tool feature that cracks into safety database.
Optionally, server-side further include:
Issuance unit is configured to for the feedback data of generation to be issued to all protected softwares.
The guard method of software through the invention and system at least can be realized it is following the utility model has the advantages that
By carrying out data statistics and analysis to running piracy software, pirate reason is positioned;
Piracy software progress security patch is issued by issuing form, to reach the mesh for making piracy software fail 's;
Current patch working condition is counted, piracy solves situation, and further tracks;
And among these, software developer does not need to do too many work, less it should be understood that its working principle, does not have to investment Special manpower, it is only necessary to be absorbed in the business of itself industry.
Detailed description of the invention
Fig. 1 is the flow chart of one embodiment of method for protecting software according to the present invention;
Fig. 2 is the block diagram of one embodiment of the security component according to the present invention for protecting software;
Fig. 3 is the block diagram of one embodiment of the protection system of software according to the present invention;
Fig. 4 is the schematic diagram of a preferred embodiment of method for protecting software according to the present invention.
Specific embodiment
As shown in Figure 1 for according to the guard method of the software of one embodiment of the present of invention, this method is mainly used and quilt The security component of protection software binding protects protected software, wherein and security component for example can be engine of cracking down upon evil forces, and The binding of protected software and security component can be understood as the two function binding, thus when user uses protected software It must operational safety component, and it is also to be understood that protected software " connecing using security component as communication with the outside world simultaneously Mouthful ", so that the function that pirated disc copier can not separate security component without influencing protected software from protected software.The protection side Method includes:
S1, during protected software operation, security component is according to the pirate patch in pre-set safety database Feature and/or crack analysis tool feature, each software detected, each software may include protected software and with quilt Protection software be in other softwares of same user terminal, wherein may include first subdata base in safety database with/ Or second subdata base, wherein first subdata base can be pirate patch property data base comprising pirate patch is special Sign, which, which can be, cracks analysis tool property data base comprising cracks analysis tool feature, wherein with Other softwares that protected software is in same user terminal may be to crack analysis tool, therefore, wherein there may be crack point Analyse tool characteristics;
S2 includes pirate patch feature and/or cracks analysis tool if security component detects at least one software Feature, then the security component takes predetermined measures to the protected software, the predetermined measures may include make to be protected it is soft Part is unable to run, and can run current function but cannot carry out function upgrading again thus cannot use software developer in future Upgrade function of publication etc. mechanism designed before protected software is distributed to user by developer.
Work of the software developer in terms of software security can be liberated by method for protecting software according to the present invention, Because it only needs to be absorbed in the business of itself industry without putting into special manpower and time to pay close attention to this.
In one preferred embodiment, security component may include the safety database that dynamic updates, secure data It include the piracy for being directed to protected software in advance in library, especially its first subdata base (such as pirate patch property data base) Pirate patch feature that patch is collected and/or from the received pirate patch feature in security service end.It can wrap in the present embodiment Three kinds of situations are included, three kinds of situations are carried out respectively below to description of illustrating in detail:
The first situation includes the robber for being directed to protected software in advance in safety database, especially the first subdata base The pirate patch feature that version patch is collected, for example, first, software developer first develops and issued the A software (present invention to user In protected software), after a period of time, it is found that the pirate situation of A software is serious, therefore it has collected for A software The pirate patch feature of pirate patch, then by the safety database of these pirate patch feature deposit security components, and will peace Whole assembly is bound with A software, and obtaining A plus software, (it is functionally identical with A software, is only that and is bundled with peace Whole assembly), and A plus software has been issued, it only carries out option pack and/or security patch by security component from there on Upgrading update, and the user for having A software is also transitioned into gradually using A plus software;Second, in software developer A software is carried out to obtain B software after function/firmware upgrade, then binds security component according to the present invention, it is soft to obtain B plus Part, it is assumed that (such as Chong Die 50% or more), Ke Yi in the case that B software has a certain proportion of function/overlapped attributes with A software In the case where judging that the pirate patch for being directed to A software may also be directed to B software, collected by the piracy software for A software Pirate patch feature can also add in the safety database for the security component bound with B software function;Third, one section of every mistake Regular time (such as 1 year) just collects once for the pirate patch feature of the piracy software of A software, then adds to peace In full database, then again by with updated safety database security component and protected software (or compared to former quilt Protect the software with upgrade function of software) it is bound, then it is distributed to user;
Second situation includes from the received piracy in security service end in safety database, especially the first subdata base Its running environment information is uploaded to server-side during monitoring protected software by patch feature, security component, is protected existing Have pirate patch feature therefore can be from running environment information in the case where protecting software pirate version, in running environment information It analyzes pirate patch feature and is supplemented to safety database, to be updated to the latter;In addition, second situation is also It may include that server-side is directed to protected software by what its that its special interface to software developer is transmitted was collected Piracy software, piracy software is analyzed in server-side, to obtain the pirate patch feature of these piracy software;
The third situation includes the robber for being directed to protected software in advance in safety database, especially the first subdata base Pirate patch feature that version patch is collected and from the received pirate patch feature in security service end, for example, may include the first Situation and second situation.
In a preferred embodiment, security component may include the safety database that dynamic updates, secure data Library may include the second subdata base (such as the property data base for cracking analysis tool/crack analysis software) comprising in advance Cracking feature that analysis tool (such as crack analysis software) is collected and/or received from security service end for protected software Feature, in the present embodiment equally may include three kinds of situations, three kinds of situations are carried out respectively below in detail illustrate description:
The first situation includes in advance for the broken of protected software in safety database, especially the second subdata base The feature that solution analysis tool (such as cracking analysis software) is collected, wherein it will be understood by those skilled in the art that it is soft to crack analysis Part can be the softwares such as debugger or virtual machine, not due to the different and entirely different of every money software, crack point with a Analysis software can be applied in different protected softwares, in embodiments of the present invention, can be in publication protected software Before, it first collects existing crack in the prior art and analyzes software (including cracking analysis software specifically for protected software It is already present in the prior art other to crack analysis software) feature, and be stored in safety database.Wherein, these are broken The feature of solution analysis software may include storage position feature, name feature etc., wherein title can be process title, window Title and file name etc.;
Second situation, include in safety database, especially the second subdata base from the received feature in security service end, During the operation of protected software, its running environment information is uploaded to server-side by security component, there are protected softwares Have the feature for cracking analysis software therefore can be from running environment information in the case where piracy, in running environment information It analyzes the feature for cracking analysis software and is supplemented to safety database, to be updated to the latter;In addition, second Situation can also include that server-side cracks analysis by what its that its special interface to software developer is transmitted was collected Software is analyzed in server-side analysis software is cracked, and analyzes software to obtain these and crack cracking for analysis software Feature;
The third situation includes in advance for the broken of protected software in safety database, especially the second subdata base Feature that solution analysis tool (such as crack analysis software) is collected and/or from the received feature in security service end, for example, can wrap Include the first situation and second situation.
Three kinds of situations and the second subdata base in above first subdata base (pirate patch property data base) (crack point Analysis software features database) in three kinds of situations can be optionally combined, it is within the scope of the present invention.Pass through setting the One database, can protected software run during, according to the pirate patch feature in first database to running environment into Row detection, to find pirate patch with more growing with each passing hour to make successfully manage strategy in time;Pass through the second database Setting, can be discovered whether during protected software is run according to the cracking analysis software features in the second database Have and crack analysis software debugging or other behaviors for attempting to crack are carried out to protected software, is answered to carry out anti-debug etc. in time To strategy.
In a further advantageous embodiment, the security component before being bound in protected software may include software Developing instrument (Software Development Kit, SDK), SKD may include interface and static library, in the present embodiment, Guard method according to the present invention may further include: after security component and protected software binding, this is protected soft Interface and static library are integrated in part;Security component has by interface in protected software and static library with protected software Binding relationship;Security component is enabled by interface and static library in protected software starting.
By the interface and static library integrated in protected software, to realize that the information of protected software and security component is handed over Mutually, by the way that security component and protected software have been carried out the function binding of depth so that piracy can not crack protected it is soft It by security component deletion or in vain when part, and can not also evade out security component when using the piracy software after cracking, make Obtaining security component can run together with piracy software, to prepare to realize by what running environment information uploaded.
In a further advantageous embodiment, guard method according to the present invention further include: security component is to each software During detection, protected software running environment is also detected;Running environment information that security component will test and each soft The data generated in part operational process are uploaded to security service end;Security component receives feedback data from the security service end, Wherein, feedback data includes following at least one: new pirate patch feature new cracks analysis tool feature and new safety Patch, feedback data are raw according to the data generated in running environment information and/or each software running process by security service end At.Due to running environment information can real-time/regular upload, server-side can grasp in real time whether protected software deposits By pirate phenomenon, and based on the newest pirate patch of running environment acquisition of information being most recently detected and/or crack analysis Pirate situation is limited in controlled range by tool characteristics to make countermeasure.In the present embodiment, further includes: be based on According to server-side receive for protected software piracy software obtain pirate patch feature and/or crack analysis tool Feature generates corresponding security patch, then its by new pirate patch feature, new crack analysis tool feature and new peace Full patch is sent to security component as feedback data.In addition, pirate patch feature and/or cracking the acquisition of analysis tool feature Channel be not it is single uploaded by security component, but can also include by security development quotient or the operator of server-side actively Collect, be then transmitted in server-side by the special interface of server-side, this mode as supplement pirate patch feature with/ Or crack analysis tool feature obtain channel enable technical solution of the present invention obtain more comprehensively pirate patch feature and/ Or analysis tool feature is cracked, to make more comprehensively countermeasure.
In a preferred embodiment, according to the method for the present invention, if including in the feedback data that security component receives New security patch, then protected software is upgraded with security patch;If in the feedback data that the security component receives Including new pirate patch feature and/or it is new crack analysis tool feature, then security component is special by the new pirate patch Sign and/or the new analysis tool feature that cracks are updated into safety database.Security component according to the present invention includes secure group Part main body and multiple safety databases, wherein each safety database includes a corresponding protected software, and security component will connect The patch feature received is updated into all safety databases.
The beneficial effect of this embodiment is equally that it is possible to dynamically improve database (especially its pirate patch feature Library), to carry out corresponding countermeasure when detecting pirate patch feature and/or cracking analysis tool feature.
According to another embodiment of the invention, as shown in Fig. 2, provide it is a kind of for protecting the security component of software, It can protect protected software using guard method shown in FIG. 1, the security component and protected software bind with It is protected, security component according to the present invention may include:
Detection unit 22 is configured to during protected software is run, according in pre-set safety database Pirate patch feature and/or analysis tool feature is cracked, each software is detected;
Processing unit 23 detects at least one software to include the pirate benefit if being configured to the security component Fourth feature and/or it is described crack analysis tool feature, then the security component takes predetermined measures to the protected software.
Another preferred embodiment according to the present invention is wrapped as shown in figure 3, providing a kind of protection system of software Include user terminal and server-side, wherein user terminal includes protected software and security component, and system use is bound with protected software Security component protected software is protected, can be implemented by protection system for the aforesaid operations of guard method.Root Include: according to security component of the invention
Detection unit 22 is configured to during protected software is run, according in pre-set safety database Pirate patch feature and/or analysis tool feature is cracked, each software is detected;
Processing unit 23 detects at least one software to include the pirate benefit if being configured to the security component Fourth feature and/or it is described crack analysis tool feature, then the security component takes predetermined measures to the protected software.
Wherein, interface and static library are integrated in protected software;The security component passes through in the protected software Interface and static library and the protected software there is binding relationship;When the protected software starts by the interface and Static library enables the security component.
Further, the detection unit is additionally configured to during to each software detection, and also detection is protected Protect the running environment of software;
The security component further include:
Communication unit is configured to run running environment information detected by the detection unit and each software The data generated in journey are uploaded to security service end;
The security service end includes:
Data generating unit is configured to generate according in the running environment information and/or each software running process Data generate feedback data, the feedback data includes following at least one: new pirate patch feature new cracks analysis Tool characteristics and new security patch;
The communication unit of the security component is additionally configured to receive feedback data from the security service end.
Preferably, security component according to the present invention can also include: upgrade unit, issuance unit and updating unit,
If in the feedback data that the communication unit receives including new security patch, described in the upgrade unit use Security patch upgrades protected software;
If cracking analysis including new pirate patch feature and/or newly in the feedback data that the communication unit receives Tool characteristics, then the updating unit arrives the new pirate patch feature and/or the new analysis tool feature update that cracks In safety database.
According to a preferred embodiment of the present invention, in server of the system further include:
Issuance unit is configured to for the feedback data of generation to be issued to all protected softwares.
In the case where including new security patch in feedback data, issuance unit issues the new security patch of generation To all protected softwares, so that protected software is upgraded with security patch.For example, software developer has issued 100 It is a to bind the legal protected software for having security component, and bootlegger is illegally made using one of copyrighted software (with collection At the mode of pirate patch) go out 50 piracy software (also binding has security component), and in this 50 piracy software at least One at runtime, running environment information can be uploaded to server-side by security component, and the operation ring of piracy software accordingly Border information can obtain pirate patch feature and/or crack analysis tool feature, regenerate corresponding security patch be issued to this 150 In a software, then 50 piracy software can be when being upgraded, in the operation reserve in security patch using security patch. In addition, the present invention is also included within and issues the business patch of protected software (software is using business patch come updating software release, function Energy, database of software itself etc.) while issue security patch, thus save issue number, that is, it is understood that security component It can be used for actively and/or passively, in real time and/or periodically pulling and/or receiving business patch from server-side and/or safety mended Fourth.
In addition it is also possible to understand, pirate patch feature is being obtained every time and/or is cracking analysis tool feature simultaneously in server-side After generating corresponding security patch, by pirate patch feature and/or analysis tool feature is cracked and corresponding security patch is equal Associated storage is carried out, to detect a certain pirate patch feature in protected software and/or crack analysis tool feature When, can actively the piracy patch feature be searched for from server-side and/or cracks the corresponding security patch of analysis tool feature, so The security patch is actively obtained afterwards to be upgraded.
It is appreciated that the technical scheme is that being realized by network or other radio communication medias.
As shown in figure 4, for engine of cracking down upon evil forces can be used as security component according to a preferred embodiment of the present invention Realize software protection, wherein engine of cracking down upon evil forces includes that Software Development Kit (SDK), current reference work package of cracking down upon evil forces (are cracked down upon evil forces and drawn Hold up main body) and database (safety database i.e. above), wherein SDK includes static library and interface;Database is one dynamic State library comprising pirate patch library and crack analysis software database.The present embodiment is described in detail below:
The interface of SKD is called to call for software developer protected software and engine of cracking down upon evil forces are established function connects, it Afterwards, the protected software for establishing function connects with engine of cracking down upon evil forces is issued to user terminal;
In user terminal, during protected software operation, current reference work package of cracking down upon evil forces is responsible for the operation ring to software Border monitoring (including according to pirate patch library to software carry out pirate detection and according to crack analysis software database to software into The protection of row anti-debug), safety/business patch of software pulls, running environment information (includes in the case where software pirate version Pirate data) upload etc.;
When needing to carry out data update, database is updated, is mainly used for the protected software for piracy occur Be modified, with crack/pirate patch fought,
And on engine backstage (server-side) of cracking down upon evil forces, corresponding security patch is generated according to the pirate patch feature of upload, and Being issued to all protected softwares upgrades the phase, make wherein piracy software stop working.
Beneficial effects of the present invention are broadly described again below:
1. software developer only needs to integrate the SDK for engine of cracking down upon evil forces using the related calling interface for engine offer of cracking down upon evil forces Into itself software, without other operations.That is, software developer calls the interface in the Software Development Kit for engine of cracking down upon evil forces, Realize the function binding of software with engine of cracking down upon evil forces.When carrying out the feature operations such as data encryption or network verification to software, need It to be carried out by cracking down upon evil forces engine as " interface ", this function binding i.e. between software and engine of cracking down upon evil forces, by by software and anti- Depth binding between black engine, so that piracy software can not evade engine of cracking down upon evil forces.
2. issuing software arrives end user, developer's software will be present under user environment and engine two parts of cracking down upon evil forces, crack down upon evil forces Engine can play a protective role during software is run.
3. on the one hand engine of cracking down upon evil forces can protect developer's software and not encroached on, patch on the one hand is provided for developer's software Upgrade service;When developer's software occurs pirate, crack down upon evil forces engine and engine background communication of cracking down upon evil forces learn that developer's software needs To upgrade for current version, updated contents are the software patch for current safety problem.
4. engine of cracking down upon evil forces pulls upgrade patch from server-side, patch is issued to end user, and end user's piracy software is stopped Only work.
5. after a period of time, statistics and analysis piracy situation, guarantee software work normally again.

Claims (10)

1. a kind of guard method of software, which is characterized in that soft to being protected using the security component bound with protected software Part is protected, which comprises
During protected software operation, the security component is according to the pirate patch feature in pre-set safety database And/or analysis tool feature is cracked, each software is detected;
Include the pirate patch feature and/or described crack analysis if the security component detects at least one software Tool characteristics, then the security component takes predetermined measures to the protected software
Wherein, the protected software and the security component are bound the two function binding, or with the secure group Interface of the part as the protected software communication with the outside world.
2. the method according to claim 1, wherein being integrated with interface and static library in the protected software;
The security component by interface in the protected software and static library and the protected software there is binding to close System;
The security component is enabled by the interface and static library in protected software starting.
3. the method according to claim 1, wherein further include:
The security component also detects protected software running environment during to each software detection;
Running environment information that the security component will test and the data generated in each software running process are uploaded to peace Full server-side;
The security component receives feedback data from the security service end, wherein the feedback data includes following at least one Kind: new pirate patch feature, it is new crack analysis tool feature and new security patch, the feedback data is by the safety Server-side is generated according to the data generated in the running environment information and/or each software running process.
4. according to the method described in claim 3, it is characterized by further comprising:
If in the feedback data that the security component receives including new security patch, the protected software peace Full patch is upgraded;
If cracking analysis tool including new pirate patch feature and/or newly in the feedback data that the security component receives Feature, then the security component updates the new pirate patch feature and/or the new analysis tool feature that cracks to safety In database.
5. a kind of for protecting the security component of software, which is characterized in that it is bound with protected software to protect to it, The security component includes:
Detection unit is configured to during protected software is run, and is mended according to the piracy in pre-set safety database Fourth feature and/or analysis tool feature is cracked, each software is detected;
Processing unit detects at least one software to include the pirate patch feature if being configured to the security component And/or it is described crack analysis tool feature, then the security component takes predetermined measures to the protected software,
Wherein, the protected software and the security component are bound the two function binding, or with the secure group Interface of the part as the protected software communication with the outside world.
6. a kind of protection system of software, which is characterized in that it includes user terminal and server-side, wherein user terminal includes being protected Software and security component are protected, the system uses the security component bound with protected software to protect protected software, The security component includes:
Detection unit is configured to during protected software is run, and is mended according to the piracy in pre-set safety database Fourth feature and/or analysis tool feature is cracked, each software is detected;
Processing unit detects at least one software to include the pirate patch feature if being configured to the security component And/or it is described crack analysis tool feature, then the security component takes predetermined measures to the protected software,
Wherein, the protected software and the security component are bound the two function binding, or with the secure group Interface of the part as the protected software communication with the outside world.
7. system according to claim 6, which is characterized in that be integrated with interface and static library in the protected software;
The security component by interface in the protected software and static library and the protected software there is binding to close System;
The security component is enabled by the interface and static library when the protected software starts.
8. system according to claim 6, which is characterized in that
The detection unit is additionally configured to during to each software detection, also detects the operation ring of protected software Border;
The security component further include:
Communication unit, being configured to will be in running environment information and each software running process detected by the detection unit The data of generation are uploaded to security service end;
The security service end includes:
Data generating unit is configured to according to the number generated in the running environment information and/or each software running process According to feedback data is generated, the feedback data includes following at least one: new pirate patch feature new cracks analysis tool Feature and new security patch;
The communication unit of the security component is additionally configured to receive feedback data from the security service end.
9. system according to claim 8, which is characterized in that the security component further includes upgrade unit, issuance unit And updating unit,
If in the feedback data that the communication unit receives including new security patch, the upgrade unit safety Patch upgrades protected software;
If cracking analysis tool including new pirate patch feature and/or newly in the feedback data that the communication unit receives Feature, then the updating unit updates the new pirate patch feature and/or the new analysis tool feature that cracks to safety In database.
10. system according to claim 8, which is characterized in that the server-side further include: issuance unit is configured to The feedback data of generation is issued to all protected softwares.
CN201710631247.7A 2017-07-28 2017-07-28 The guard method and system of software Active CN107368712B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710631247.7A CN107368712B (en) 2017-07-28 2017-07-28 The guard method and system of software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710631247.7A CN107368712B (en) 2017-07-28 2017-07-28 The guard method and system of software

Publications (2)

Publication Number Publication Date
CN107368712A CN107368712A (en) 2017-11-21
CN107368712B true CN107368712B (en) 2018-12-25

Family

ID=60307797

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710631247.7A Active CN107368712B (en) 2017-07-28 2017-07-28 The guard method and system of software

Country Status (1)

Country Link
CN (1) CN107368712B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108021415A (en) * 2017-12-30 2018-05-11 有米科技股份有限公司 Automatic packaging method, apparatus, computer equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104133832A (en) * 2014-05-15 2014-11-05 腾讯科技(深圳)有限公司 Pirate application identification method and device
CN106302449A (en) * 2016-08-15 2017-01-04 中国科学院信息工程研究所 A kind of ciphertext storage cloud service method open with searching ciphertext and system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009093396A (en) * 2007-10-09 2009-04-30 Panasonic Corp Method for rejecting pirated media, apparatus, program, and medium
CN102385671B (en) * 2010-09-02 2016-05-04 研祥智能科技股份有限公司 Software enciphering method and system
CN103164642B (en) * 2011-12-19 2016-11-23 比亚迪股份有限公司 A kind of method and system preventing software piracy
CN106850519B (en) * 2016-01-08 2020-11-17 北京万维星辰科技有限公司 Application security authentication method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104133832A (en) * 2014-05-15 2014-11-05 腾讯科技(深圳)有限公司 Pirate application identification method and device
CN106302449A (en) * 2016-08-15 2017-01-04 中国科学院信息工程研究所 A kind of ciphertext storage cloud service method open with searching ciphertext and system

Also Published As

Publication number Publication date
CN107368712A (en) 2017-11-21

Similar Documents

Publication Publication Date Title
CN100578522C (en) Electronic device, update method for same and integrated circuit
US8566949B2 (en) Software component, software component management method, and software component management system
AU2009287433B2 (en) System and method for detection of malware
Schmittner et al. Status of the Development of ISO/SAE 21434
CN107766728A (en) Mobile application security managing device, method and mobile operation safety protection system
CN103699844B (en) Safety protection system and method
CN104811428A (en) Method, device and system for verifying client identity by social relation data
CN105683990A (en) Method and apparatus for protecting dynamic libraries
CN105631251A (en) APK reinforcing protection method and system
CN103020495B (en) Embedded-type software anti-piracy encryption method
CN103246848A (en) Software security protection method and equipment
Okafor et al. Sok: Analysis of software supply chain security by establishing secure design properties
CN104252594A (en) Virus detection method and device
CN107368712B (en) The guard method and system of software
CN103186730A (en) Method and device for protecting.NET software security
RU2006103986A (en) METHOD FOR ADMINISTRATING SOFTWARE COMPONENTS INTEGRATED INTO MOBILE SYSTEM
CN105184119B (en) A kind of method for security protection of software
US20240095402A1 (en) Methods and Systems for Recursive Descent Parsing
CN106250726A (en) Software version state management-control method
CN101924794A (en) Internet based method for monitoring total software operation quantity in real time
US10789338B2 (en) Software algorithm security
CN111159718A (en) Method and device for bug repair and household appliance
CN114428955A (en) Method and system for judging abnormal risk based on operation information and electronic equipment
CN107609359B (en) For protecting the method and system of software
CN103034806B (en) Process method and the terminal of operation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee after: Beijing Shendun Technology Co.,Ltd.

Address before: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.