CN108881223A - A method of protecting computer software is realized based on network communication - Google Patents

A method of protecting computer software is realized based on network communication Download PDF

Info

Publication number
CN108881223A
CN108881223A CN201810625010.2A CN201810625010A CN108881223A CN 108881223 A CN108881223 A CN 108881223A CN 201810625010 A CN201810625010 A CN 201810625010A CN 108881223 A CN108881223 A CN 108881223A
Authority
CN
China
Prior art keywords
software
client
storage unit
network communication
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810625010.2A
Other languages
Chinese (zh)
Inventor
张红卫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810625010.2A priority Critical patent/CN108881223A/en
Publication of CN108881223A publication Critical patent/CN108881223A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of methods for realizing protecting computer software based on network communication; it comprises the following methods; a, builds network communication local area network group, and local area network group includes software business man's client, multiple user clients, software business man's server, database and client server;B analyzes software, handles the obtained software instruction section of analysis, the software instruction section that generates that treated;Software instruction section that treated described in rearranging, generates and runs new software;C, the software start to execute;Declare the storage unit, so that the software obtains a control of the storage unit;D, to software carry out encryption handling, computer operation in from solidify in memory read solidify preservation target program ciphertext.The invention patent can carry out multiple check and protection to the vital document in software program, while encrypt to file, carry out real-time perfoming detection protection using communication local area network group.

Description

A method of protecting computer software is realized based on network communication
Technical field
The present invention relates to computer software technical fields, especially a kind of to realize protecting computer software based on network communication Method.
Background technique
Computer software (Software, also referred to as software) refers to that program and its document in computer system, program are meters The description of the process object and processing rule of calculation task;Document is for the ease of illustrating property data needed for understanding program.Program Must be installed into inside machine could work, and document is usually to see to people, not necessarily be packed into machine.
Computer software is totally divided into system software and application software two major classes:System software is each type operating system, such as Windows, Linux, UNIX etc. further include the patch and hardware drive program of operating system, are system software classes.It answers The type that can be segmented with software is just more, such as tool software, Games Software, management software belong to application software class. System software is responsible for various independent hardware in management computer system, so that they can be with co-ordination.System software makes Computer user and other software by computer as an entirety without how being with respect to each hardware of bottom Work.In general, system software includes operating system and a series of basic tools(Such as compiler, data base administration, Memory formats, file system management, subscriber authentication, driven management, the tool of be connected to the network etc.).However mesh Preceding often to will appear some internet worms, invasion destroys computer software, and traditional method relatively mostly uses antivirus software, however kills Malicious software can not timely update newest viral data, this is easy for causing software that can be destroyed, and causes biggish loss, needle To above problem, herein it is proposed that a kind of method for realizing protecting computer software based on network communication.
Summary of the invention
The present invention is to solve above-mentioned phenomenon, and using the technical solution of following modification, one kind is realized based on network communication and calculated The method of machine software protection, comprises the following methods,
A, builds network communication local area network group, and local area network group includes software business man's client, multiple user clients, software business man's service Device, database and client server, software business man's client are connected by wireless and/or cable network and software business man's server It connects, software business man's server passes through local area network by Internal security of Intranet network connection data library, the client server Internal security network connection data library, the multiple user client are connect by internet with client server;
B analyzes software, handles the obtained software instruction section of analysis, the software instruction section that generates that treated;It rearranges Treated the software instruction section, generates and runs new software;The new software is according to the fortune of treated software instruction section Row result continues or terminates operation;
C, the software start to execute;Declare the storage unit, so that the software obtains a control of the storage unit;Generating should One status volume label of storage unit;In the data that the state tag is set as an init state to initialize the storage unit Hold;The state tag is set as an access status so that the software carries out an access to the storage unit;And set the state Label is an elimination state so that the software releases the control to the storage unit;
D, to software carry out encryption handling, computer operation in from solidify in memory read solidify preservation target program it is close Text is encrypted software by the Encryption Algorithm that the programmable gate array FPGA inside running is realized, synchronous to obtain after encryption To file be saved in the SRAM inside hardware protection module;CPU reads the bios program on plate in ROM first, is loaded into RAM is simultaneously executed, and completes the encipherment protection of software.
As present invention further optimization mode, in step b, to the software instruction section that analysis obtains carry out processing for plus Part instruction in the close software instruction section writes function and external preservation according to the instruction of the part of the encryption, by software Described in the vacant position that partially instructs replace with index functions instruction, the index functions instruction is for calling the function.
As present invention further optimization mode, in step a, constructing local network network information includes that user client calculates Machine local hardware information, network entry time and user client computer IP address.
As present invention further optimization mode, software business man's client includes authorization code application module, described to award Weighted code application module is used for the permission and user information for obtaining the dbase that need to be authorized, needing to open, and generates authorization code application Information is simultaneously sent to software business man's server, receives the authorization code that software business man's server sends over and shows.
As present invention further optimization mode, in step d, cryptographic algorithm is commercial encryption algorithm or national secret algorithm.
It further include initializing test in step d as present invention further optimization mode, when the check results received are soft When part legitimacy of the procedure, allow initializers program;When the check results received are that software program is illegal, it is soft to terminate initialization Part program.
The invention patent can carry out multiple check and protection to the vital document in software program, need through the invention Checking procedure, the just parameter information of available vital document, and then ensure that the interests of software developer, while to text Part encrypts, and carries out real-time perfoming detection protection using communication local area network group, whole safer using software.
Specific embodiment
Below in conjunction in the embodiment of the present invention, technical solution in the embodiment of the present invention is clearly and completely retouched It states, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Based on the present invention In embodiment, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
The present invention provides a kind of technical solution, a method of protecting computer software is realized based on network communication, including Following methods step,
A, builds network communication local area network group, and local area network group includes software business man's client, multiple user clients, software business man's service Device, database and client server, software business man's client are connected by wireless and/or cable network and software business man's server It connects, software business man's server passes through local area network by Internal security of Intranet network connection data library, the client server Internal security network connection data library, the multiple user client are connect by internet with client server;
B analyzes software, handles the obtained software instruction section of analysis, the software instruction section that generates that treated;It rearranges Treated the software instruction section, generates and runs new software;The new software is according to the fortune of treated software instruction section Row result continues or terminates operation;
C, the software start to execute;Declare the storage unit, so that the software obtains a control of the storage unit;Generating should One status volume label of storage unit;In the data that the state tag is set as an init state to initialize the storage unit Hold;The state tag is set as an access status so that the software carries out an access to the storage unit;And set the state Label is an elimination state so that the software releases the control to the storage unit;
D, to software carry out encryption handling, computer operation in from solidify in memory read solidify preservation target program it is close Text is encrypted software by the Encryption Algorithm that the programmable gate array FPGA inside running is realized, synchronous to obtain after encryption To file be saved in the SRAM inside hardware protection module;CPU reads the bios program on plate in ROM first, is loaded into RAM is simultaneously executed, and completes the encipherment protection of software.
In step b, processing is carried out to the software instruction section that analysis obtains and is referred to encrypt the part in the software instruction section It enables, function and external preservation is write according to the instruction of the part of the encryption, the vacant position partially instructed described in software is replaced It is changed to index functions instruction, the index functions instruction is for calling the function.
In step a, constructing local network network information includes user client computer local hardware information, network entry time and use Family client computer IP address.
Software business man's client includes authorization code application module, and the authorization code application module is used to obtaining and need to authorize The permission and user information that dbase, needs are opened generate authorization code application information and are sent to software business man's server, receive Authorization code that software business man's server sends over simultaneously is shown.
In step d, cryptographic algorithm is commercial encryption algorithm or national secret algorithm.
Further include initializing test in step d, when the check results received are that software program is legal, allows initializers Program;When the check results received are that software program is illegal, initializers program is terminated.
To sum up, the invention patent can carry out multiple check and protection to the vital document in software program, need to pass through Checking procedure of the invention, the parameter information of the available vital document of, and then ensure that the interests of software developer, together When file is encrypted, carry out real-time perfoming detection protection using communication local area network group, it is whole more to be pacified using software Entirely.
Finally it should be noted that:The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, Although the present invention is described in detail referring to the foregoing embodiments, for those skilled in the art, still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features. All within the spirits and principles of the present invention, any modification, equivalent replacement, improvement and so on should be included in of the invention Within protection scope.

Claims (6)

1. a kind of method for realizing protecting computer software based on network communication, it is characterised in that:It comprises the following methods,
A, builds network communication local area network group, and local area network group includes software business man's client, multiple user clients, software business man's service Device, database and client server, software business man's client are connected by wireless and/or cable network and software business man's server It connects, software business man's server passes through local area network by Internal security of Intranet network connection data library, the client server Internal security network connection data library, the multiple user client are connect by internet with client server;
B analyzes software, handles the obtained software instruction section of analysis, the software instruction section that generates that treated;It rearranges Treated the software instruction section, generates and runs new software;The new software is according to the fortune of treated software instruction section Row result continues or terminates operation;
C, the software start to execute;Declare the storage unit, so that the software obtains a control of the storage unit;Generating should One status volume label of storage unit;In the data that the state tag is set as an init state to initialize the storage unit Hold;The state tag is set as an access status so that the software carries out an access to the storage unit;And set the state Label is an elimination state so that the software releases the control to the storage unit;
D, to software carry out encryption handling, computer operation in from solidify in memory read solidify preservation target program it is close Text is encrypted software by the Encryption Algorithm that the programmable gate array FPGA inside running is realized, synchronous to obtain after encryption To file be saved in the SRAM inside hardware protection module;CPU reads the bios program on plate in ROM first, is loaded into RAM is simultaneously executed, and completes the encipherment protection of software.
2. a kind of method for realizing protecting computer software based on network communication according to claim 1, which is characterized in that In step b, the part for carrying out processing to the software instruction section that analysis obtains to encrypt in the software instruction section is instructed, according to institute Function and external preservation are write in the part instruction for stating encryption, and the vacant position partially instructed described in software is replaced with function rope Draw instruction, the index functions instruction is for calling the function.
3. a kind of method for realizing protecting computer software based on network communication according to claim 1, which is characterized in that In step a, constructing local network network information includes user client computer local hardware information, network entry time and user client Computer IP address.
4. a kind of method for realizing protecting computer software based on network communication according to claim 1, which is characterized in that Software business man's client includes authorization code application module, and the authorization code application module is for obtaining the software name that need to be authorized The permission and user information for claiming, needing to open generate authorization code application information and are sent to software business man's server, receive software business man Authorization code that server sends over simultaneously is shown.
5. a kind of method for realizing protecting computer software based on network communication according to claim 1, feature exist In in step d, cryptographic algorithm is commercial encryption algorithm or national secret algorithm.
6. a kind of method for realizing protecting computer software based on network communication according to claim 1, which is characterized in that Further include initializing test in step d, when the check results received are that software program is legal, allows initializers program; When the check results received are that software program is illegal, initializers program is terminated.
CN201810625010.2A 2018-06-17 2018-06-17 A method of protecting computer software is realized based on network communication Pending CN108881223A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810625010.2A CN108881223A (en) 2018-06-17 2018-06-17 A method of protecting computer software is realized based on network communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810625010.2A CN108881223A (en) 2018-06-17 2018-06-17 A method of protecting computer software is realized based on network communication

Publications (1)

Publication Number Publication Date
CN108881223A true CN108881223A (en) 2018-11-23

Family

ID=64339392

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810625010.2A Pending CN108881223A (en) 2018-06-17 2018-06-17 A method of protecting computer software is realized based on network communication

Country Status (1)

Country Link
CN (1) CN108881223A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110213283A (en) * 2019-06-11 2019-09-06 山东管理学院 A kind of trade economy information interconnected network transmission method
CN110737898A (en) * 2019-09-06 2020-01-31 浙江无极互联科技有限公司 computer software protection system
CN111444107A (en) * 2020-04-10 2020-07-24 山东理工职业学院 Software evaluation method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101751346A (en) * 2008-11-28 2010-06-23 英业达股份有限公司 Software protection method
CN101853357A (en) * 2010-04-28 2010-10-06 北京飞天诚信科技有限公司 Software protection method
US20120265998A1 (en) * 2006-12-29 2012-10-18 Kumar Mohan J Methods And Apparatus For Authenticating Components Of Processing Systems
CN103488916A (en) * 2013-08-12 2014-01-01 中国航天科工集团第三研究院第八三五七研究所 On-missile software encipherment protection method
CN104361267A (en) * 2014-11-19 2015-02-18 厦门海迈科技股份有限公司 Software authorization and protection device and method based on asymmetric cryptographic algorithm

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120265998A1 (en) * 2006-12-29 2012-10-18 Kumar Mohan J Methods And Apparatus For Authenticating Components Of Processing Systems
CN101751346A (en) * 2008-11-28 2010-06-23 英业达股份有限公司 Software protection method
CN101853357A (en) * 2010-04-28 2010-10-06 北京飞天诚信科技有限公司 Software protection method
CN103488916A (en) * 2013-08-12 2014-01-01 中国航天科工集团第三研究院第八三五七研究所 On-missile software encipherment protection method
CN104361267A (en) * 2014-11-19 2015-02-18 厦门海迈科技股份有限公司 Software authorization and protection device and method based on asymmetric cryptographic algorithm

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110213283A (en) * 2019-06-11 2019-09-06 山东管理学院 A kind of trade economy information interconnected network transmission method
CN110737898A (en) * 2019-09-06 2020-01-31 浙江无极互联科技有限公司 computer software protection system
CN111444107A (en) * 2020-04-10 2020-07-24 山东理工职业学院 Software evaluation method and device

Similar Documents

Publication Publication Date Title
US10454916B2 (en) Systems and methods for implementing security
US9805206B2 (en) Systems and methods for containerized data security
US10153906B2 (en) Systems and methods for implementing computer security
Hsiao et al. The static analysis of WannaCry ransomware
CN104662551B (en) In a network environment to the inspection of the data of encryption
CN102291387B (en) The network traffic interception of encryption and inspection
US10616344B2 (en) System-on-chip data security appliance encryption device and methods of operating the same
US7743260B2 (en) Firewall+storage apparatus, method and system
CN103563278B (en) Securing encrypted virtual hard disks
US20150026767A1 (en) Systems and methods for implementing computer security
US20070157311A1 (en) Security modeling and the application life cycle
CN110637301B (en) Reducing disclosure of sensitive data in virtual machines
CN108595982B (en) Secure computing architecture method and device based on multi-container separation processing
CN108881223A (en) A method of protecting computer software is realized based on network communication
CN113014539A (en) Internet of things equipment safety protection system and method
MX2007013310A (en) Method, system, and program product for connecting a client to a network.
US11227032B1 (en) Dynamic posture assessment to mitigate reverse engineering
Vernotte et al. In-depth modeling of the UNIX operating system for architectural cyber security analysis
Simpson et al. Cloud forensics issues
Falk et al. Enhancing integrity protection for industrial cyber physical systems
Nejad Cyber Security
Askan Securing an operational fintech web platform
Najat et al. Comparative study of the Security Analysis of IoT systems using attack trees algorithm
CN117667301A (en) Protection container ecosystem
CN115442090A (en) Sensitive information acquisition method and device applied to script

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181123

RJ01 Rejection of invention patent application after publication