CN108881223A - A method of protecting computer software is realized based on network communication - Google Patents
A method of protecting computer software is realized based on network communication Download PDFInfo
- Publication number
- CN108881223A CN108881223A CN201810625010.2A CN201810625010A CN108881223A CN 108881223 A CN108881223 A CN 108881223A CN 201810625010 A CN201810625010 A CN 201810625010A CN 108881223 A CN108881223 A CN 108881223A
- Authority
- CN
- China
- Prior art keywords
- software
- client
- storage unit
- network communication
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a kind of methods for realizing protecting computer software based on network communication; it comprises the following methods; a, builds network communication local area network group, and local area network group includes software business man's client, multiple user clients, software business man's server, database and client server;B analyzes software, handles the obtained software instruction section of analysis, the software instruction section that generates that treated;Software instruction section that treated described in rearranging, generates and runs new software;C, the software start to execute;Declare the storage unit, so that the software obtains a control of the storage unit;D, to software carry out encryption handling, computer operation in from solidify in memory read solidify preservation target program ciphertext.The invention patent can carry out multiple check and protection to the vital document in software program, while encrypt to file, carry out real-time perfoming detection protection using communication local area network group.
Description
Technical field
The present invention relates to computer software technical fields, especially a kind of to realize protecting computer software based on network communication
Method.
Background technique
Computer software (Software, also referred to as software) refers to that program and its document in computer system, program are meters
The description of the process object and processing rule of calculation task;Document is for the ease of illustrating property data needed for understanding program.Program
Must be installed into inside machine could work, and document is usually to see to people, not necessarily be packed into machine.
Computer software is totally divided into system software and application software two major classes:System software is each type operating system, such as
Windows, Linux, UNIX etc. further include the patch and hardware drive program of operating system, are system software classes.It answers
The type that can be segmented with software is just more, such as tool software, Games Software, management software belong to application software class.
System software is responsible for various independent hardware in management computer system, so that they can be with co-ordination.System software makes
Computer user and other software by computer as an entirety without how being with respect to each hardware of bottom
Work.In general, system software includes operating system and a series of basic tools(Such as compiler, data base administration,
Memory formats, file system management, subscriber authentication, driven management, the tool of be connected to the network etc.).However mesh
Preceding often to will appear some internet worms, invasion destroys computer software, and traditional method relatively mostly uses antivirus software, however kills
Malicious software can not timely update newest viral data, this is easy for causing software that can be destroyed, and causes biggish loss, needle
To above problem, herein it is proposed that a kind of method for realizing protecting computer software based on network communication.
Summary of the invention
The present invention is to solve above-mentioned phenomenon, and using the technical solution of following modification, one kind is realized based on network communication and calculated
The method of machine software protection, comprises the following methods,
A, builds network communication local area network group, and local area network group includes software business man's client, multiple user clients, software business man's service
Device, database and client server, software business man's client are connected by wireless and/or cable network and software business man's server
It connects, software business man's server passes through local area network by Internal security of Intranet network connection data library, the client server
Internal security network connection data library, the multiple user client are connect by internet with client server;
B analyzes software, handles the obtained software instruction section of analysis, the software instruction section that generates that treated;It rearranges
Treated the software instruction section, generates and runs new software;The new software is according to the fortune of treated software instruction section
Row result continues or terminates operation;
C, the software start to execute;Declare the storage unit, so that the software obtains a control of the storage unit;Generating should
One status volume label of storage unit;In the data that the state tag is set as an init state to initialize the storage unit
Hold;The state tag is set as an access status so that the software carries out an access to the storage unit;And set the state
Label is an elimination state so that the software releases the control to the storage unit;
D, to software carry out encryption handling, computer operation in from solidify in memory read solidify preservation target program it is close
Text is encrypted software by the Encryption Algorithm that the programmable gate array FPGA inside running is realized, synchronous to obtain after encryption
To file be saved in the SRAM inside hardware protection module;CPU reads the bios program on plate in ROM first, is loaded into
RAM is simultaneously executed, and completes the encipherment protection of software.
As present invention further optimization mode, in step b, to the software instruction section that analysis obtains carry out processing for plus
Part instruction in the close software instruction section writes function and external preservation according to the instruction of the part of the encryption, by software
Described in the vacant position that partially instructs replace with index functions instruction, the index functions instruction is for calling the function.
As present invention further optimization mode, in step a, constructing local network network information includes that user client calculates
Machine local hardware information, network entry time and user client computer IP address.
As present invention further optimization mode, software business man's client includes authorization code application module, described to award
Weighted code application module is used for the permission and user information for obtaining the dbase that need to be authorized, needing to open, and generates authorization code application
Information is simultaneously sent to software business man's server, receives the authorization code that software business man's server sends over and shows.
As present invention further optimization mode, in step d, cryptographic algorithm is commercial encryption algorithm or national secret algorithm.
It further include initializing test in step d as present invention further optimization mode, when the check results received are soft
When part legitimacy of the procedure, allow initializers program;When the check results received are that software program is illegal, it is soft to terminate initialization
Part program.
The invention patent can carry out multiple check and protection to the vital document in software program, need through the invention
Checking procedure, the just parameter information of available vital document, and then ensure that the interests of software developer, while to text
Part encrypts, and carries out real-time perfoming detection protection using communication local area network group, whole safer using software.
Specific embodiment
Below in conjunction in the embodiment of the present invention, technical solution in the embodiment of the present invention is clearly and completely retouched
It states, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Based on the present invention
In embodiment, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
The present invention provides a kind of technical solution, a method of protecting computer software is realized based on network communication, including
Following methods step,
A, builds network communication local area network group, and local area network group includes software business man's client, multiple user clients, software business man's service
Device, database and client server, software business man's client are connected by wireless and/or cable network and software business man's server
It connects, software business man's server passes through local area network by Internal security of Intranet network connection data library, the client server
Internal security network connection data library, the multiple user client are connect by internet with client server;
B analyzes software, handles the obtained software instruction section of analysis, the software instruction section that generates that treated;It rearranges
Treated the software instruction section, generates and runs new software;The new software is according to the fortune of treated software instruction section
Row result continues or terminates operation;
C, the software start to execute;Declare the storage unit, so that the software obtains a control of the storage unit;Generating should
One status volume label of storage unit;In the data that the state tag is set as an init state to initialize the storage unit
Hold;The state tag is set as an access status so that the software carries out an access to the storage unit;And set the state
Label is an elimination state so that the software releases the control to the storage unit;
D, to software carry out encryption handling, computer operation in from solidify in memory read solidify preservation target program it is close
Text is encrypted software by the Encryption Algorithm that the programmable gate array FPGA inside running is realized, synchronous to obtain after encryption
To file be saved in the SRAM inside hardware protection module;CPU reads the bios program on plate in ROM first, is loaded into
RAM is simultaneously executed, and completes the encipherment protection of software.
In step b, processing is carried out to the software instruction section that analysis obtains and is referred to encrypt the part in the software instruction section
It enables, function and external preservation is write according to the instruction of the part of the encryption, the vacant position partially instructed described in software is replaced
It is changed to index functions instruction, the index functions instruction is for calling the function.
In step a, constructing local network network information includes user client computer local hardware information, network entry time and use
Family client computer IP address.
Software business man's client includes authorization code application module, and the authorization code application module is used to obtaining and need to authorize
The permission and user information that dbase, needs are opened generate authorization code application information and are sent to software business man's server, receive
Authorization code that software business man's server sends over simultaneously is shown.
In step d, cryptographic algorithm is commercial encryption algorithm or national secret algorithm.
Further include initializing test in step d, when the check results received are that software program is legal, allows initializers
Program;When the check results received are that software program is illegal, initializers program is terminated.
To sum up, the invention patent can carry out multiple check and protection to the vital document in software program, need to pass through
Checking procedure of the invention, the parameter information of the available vital document of, and then ensure that the interests of software developer, together
When file is encrypted, carry out real-time perfoming detection protection using communication local area network group, it is whole more to be pacified using software
Entirely.
Finally it should be noted that:The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention,
Although the present invention is described in detail referring to the foregoing embodiments, for those skilled in the art, still may be used
To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features.
All within the spirits and principles of the present invention, any modification, equivalent replacement, improvement and so on should be included in of the invention
Within protection scope.
Claims (6)
1. a kind of method for realizing protecting computer software based on network communication, it is characterised in that:It comprises the following methods,
A, builds network communication local area network group, and local area network group includes software business man's client, multiple user clients, software business man's service
Device, database and client server, software business man's client are connected by wireless and/or cable network and software business man's server
It connects, software business man's server passes through local area network by Internal security of Intranet network connection data library, the client server
Internal security network connection data library, the multiple user client are connect by internet with client server;
B analyzes software, handles the obtained software instruction section of analysis, the software instruction section that generates that treated;It rearranges
Treated the software instruction section, generates and runs new software;The new software is according to the fortune of treated software instruction section
Row result continues or terminates operation;
C, the software start to execute;Declare the storage unit, so that the software obtains a control of the storage unit;Generating should
One status volume label of storage unit;In the data that the state tag is set as an init state to initialize the storage unit
Hold;The state tag is set as an access status so that the software carries out an access to the storage unit;And set the state
Label is an elimination state so that the software releases the control to the storage unit;
D, to software carry out encryption handling, computer operation in from solidify in memory read solidify preservation target program it is close
Text is encrypted software by the Encryption Algorithm that the programmable gate array FPGA inside running is realized, synchronous to obtain after encryption
To file be saved in the SRAM inside hardware protection module;CPU reads the bios program on plate in ROM first, is loaded into
RAM is simultaneously executed, and completes the encipherment protection of software.
2. a kind of method for realizing protecting computer software based on network communication according to claim 1, which is characterized in that
In step b, the part for carrying out processing to the software instruction section that analysis obtains to encrypt in the software instruction section is instructed, according to institute
Function and external preservation are write in the part instruction for stating encryption, and the vacant position partially instructed described in software is replaced with function rope
Draw instruction, the index functions instruction is for calling the function.
3. a kind of method for realizing protecting computer software based on network communication according to claim 1, which is characterized in that
In step a, constructing local network network information includes user client computer local hardware information, network entry time and user client
Computer IP address.
4. a kind of method for realizing protecting computer software based on network communication according to claim 1, which is characterized in that
Software business man's client includes authorization code application module, and the authorization code application module is for obtaining the software name that need to be authorized
The permission and user information for claiming, needing to open generate authorization code application information and are sent to software business man's server, receive software business man
Authorization code that server sends over simultaneously is shown.
5. a kind of method for realizing protecting computer software based on network communication according to claim 1, feature exist
In in step d, cryptographic algorithm is commercial encryption algorithm or national secret algorithm.
6. a kind of method for realizing protecting computer software based on network communication according to claim 1, which is characterized in that
Further include initializing test in step d, when the check results received are that software program is legal, allows initializers program;
When the check results received are that software program is illegal, initializers program is terminated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810625010.2A CN108881223A (en) | 2018-06-17 | 2018-06-17 | A method of protecting computer software is realized based on network communication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810625010.2A CN108881223A (en) | 2018-06-17 | 2018-06-17 | A method of protecting computer software is realized based on network communication |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108881223A true CN108881223A (en) | 2018-11-23 |
Family
ID=64339392
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810625010.2A Pending CN108881223A (en) | 2018-06-17 | 2018-06-17 | A method of protecting computer software is realized based on network communication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108881223A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110213283A (en) * | 2019-06-11 | 2019-09-06 | 山东管理学院 | A kind of trade economy information interconnected network transmission method |
CN110737898A (en) * | 2019-09-06 | 2020-01-31 | 浙江无极互联科技有限公司 | computer software protection system |
CN111444107A (en) * | 2020-04-10 | 2020-07-24 | 山东理工职业学院 | Software evaluation method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101751346A (en) * | 2008-11-28 | 2010-06-23 | 英业达股份有限公司 | Software protection method |
CN101853357A (en) * | 2010-04-28 | 2010-10-06 | 北京飞天诚信科技有限公司 | Software protection method |
US20120265998A1 (en) * | 2006-12-29 | 2012-10-18 | Kumar Mohan J | Methods And Apparatus For Authenticating Components Of Processing Systems |
CN103488916A (en) * | 2013-08-12 | 2014-01-01 | 中国航天科工集团第三研究院第八三五七研究所 | On-missile software encipherment protection method |
CN104361267A (en) * | 2014-11-19 | 2015-02-18 | 厦门海迈科技股份有限公司 | Software authorization and protection device and method based on asymmetric cryptographic algorithm |
-
2018
- 2018-06-17 CN CN201810625010.2A patent/CN108881223A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120265998A1 (en) * | 2006-12-29 | 2012-10-18 | Kumar Mohan J | Methods And Apparatus For Authenticating Components Of Processing Systems |
CN101751346A (en) * | 2008-11-28 | 2010-06-23 | 英业达股份有限公司 | Software protection method |
CN101853357A (en) * | 2010-04-28 | 2010-10-06 | 北京飞天诚信科技有限公司 | Software protection method |
CN103488916A (en) * | 2013-08-12 | 2014-01-01 | 中国航天科工集团第三研究院第八三五七研究所 | On-missile software encipherment protection method |
CN104361267A (en) * | 2014-11-19 | 2015-02-18 | 厦门海迈科技股份有限公司 | Software authorization and protection device and method based on asymmetric cryptographic algorithm |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110213283A (en) * | 2019-06-11 | 2019-09-06 | 山东管理学院 | A kind of trade economy information interconnected network transmission method |
CN110737898A (en) * | 2019-09-06 | 2020-01-31 | 浙江无极互联科技有限公司 | computer software protection system |
CN111444107A (en) * | 2020-04-10 | 2020-07-24 | 山东理工职业学院 | Software evaluation method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10454916B2 (en) | Systems and methods for implementing security | |
US9805206B2 (en) | Systems and methods for containerized data security | |
US10153906B2 (en) | Systems and methods for implementing computer security | |
Hsiao et al. | The static analysis of WannaCry ransomware | |
CN104662551B (en) | In a network environment to the inspection of the data of encryption | |
CN102291387B (en) | The network traffic interception of encryption and inspection | |
US10616344B2 (en) | System-on-chip data security appliance encryption device and methods of operating the same | |
US7743260B2 (en) | Firewall+storage apparatus, method and system | |
CN103563278B (en) | Securing encrypted virtual hard disks | |
US20150026767A1 (en) | Systems and methods for implementing computer security | |
US20070157311A1 (en) | Security modeling and the application life cycle | |
CN110637301B (en) | Reducing disclosure of sensitive data in virtual machines | |
CN108595982B (en) | Secure computing architecture method and device based on multi-container separation processing | |
CN108881223A (en) | A method of protecting computer software is realized based on network communication | |
CN113014539A (en) | Internet of things equipment safety protection system and method | |
MX2007013310A (en) | Method, system, and program product for connecting a client to a network. | |
US11227032B1 (en) | Dynamic posture assessment to mitigate reverse engineering | |
Vernotte et al. | In-depth modeling of the UNIX operating system for architectural cyber security analysis | |
Simpson et al. | Cloud forensics issues | |
Falk et al. | Enhancing integrity protection for industrial cyber physical systems | |
Nejad | Cyber Security | |
Askan | Securing an operational fintech web platform | |
Najat et al. | Comparative study of the Security Analysis of IoT systems using attack trees algorithm | |
CN117667301A (en) | Protection container ecosystem | |
CN115442090A (en) | Sensitive information acquisition method and device applied to script |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181123 |
|
RJ01 | Rejection of invention patent application after publication |