CN100504896C - Software protecting method and system based on safety chip - Google Patents

Software protecting method and system based on safety chip Download PDF

Info

Publication number
CN100504896C
CN100504896C CNB2005101340798A CN200510134079A CN100504896C CN 100504896 C CN100504896 C CN 100504896C CN B2005101340798 A CNB2005101340798 A CN B2005101340798A CN 200510134079 A CN200510134079 A CN 200510134079A CN 100504896 C CN100504896 C CN 100504896C
Authority
CN
China
Prior art keywords
software
unit
file destination
safety chip
protect
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2005101340798A
Other languages
Chinese (zh)
Other versions
CN1987882A (en
Inventor
郭轶尊
尹萍
宁晓魁
林洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CNB2005101340798A priority Critical patent/CN100504896C/en
Publication of CN1987882A publication Critical patent/CN1987882A/en
Application granted granted Critical
Publication of CN100504896C publication Critical patent/CN100504896C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

This invention has publicized a method basing on the safe CMOS chip to protect software. The following steps are included: firstly, the cell needing to be protected will be confirmed from software at least, each of which contains several cells. Secondly, the cell above will be translated and edited into the aim files executable by the safe CMOS chip. Thirdly, the aim file will be encrypted by the symmetrical key corresponding to the every software to produce the cryptograph cell. And then a function to transfer the safe CMOS chip will be set aim at the above files, and the cryptograph cell will be taken as the parameter of the function. The cells needing to be protected in software will be displaced by the function, and the cryptograph cell will be added to corresponding software. We can used this installation to avoid the software be deciphered and used illegally, and it is effective to the deciphered technology for the counter-translation and memory copy.

Description

Method for protecting software and system based on safety chip
Technical field
The present invention relates to information security and reliable computing technology field, particularly, the present invention relates to a kind of method for protecting software and corresponding protection system of cracking of preventing.
Background technology
Software Protection Technique is a focus of information security field research always.In current cybertimes, in a single day software be cracked in some way or brought tremendous loss will for the copyright owner of software by illegal copies.Therefore, developed various guard methods, wherein more common method for protecting software has following several:
(1) in software installation process, enters password or the method for key, wherein,, then stop installation process and maybe can only use limited function if the password of input is incorrect.But, in case password is stolen or by the owner openly, just this software can be installed arbitrarily.
(2) hardware (hard disk or network interface card) of binding computing machine or the method for operating system configuration information, the problem of its existence is, when hardware or operating system change, need bind software again, and be the position that replaceable software is installed by changing hardware mode.
(3) method by the online protection of hardware, promptly whether can the online software that decides move by certain hardware switch of detection (as the USB card etc.).The problem of this method is that the hardware switch type is incompatible each other, so a plurality of software needs a plurality of hardware protections, causes and uses inconvenience and imitated easily.Another problem of this method is the online code of detection hardware that comprises in the software, can skip by the method for decompiling, causes inefficacy, as shown in Figure 1.
(4) by the method for encrypted card protection, promptly software has only by the deciphering of encrypted card and could carry out.The problem of this method is that the software after the deciphering intactly leaves in the internal memory, and the cracker can duplicate away software with the method for copy internal memory, thereby cracks.
In sum, all there are some defectives in existing method, and especially in the face of decompiling and memory copying technology the time, theoretically, the software of protecting by said method all can be cracked.
Summary of the invention
In view of above-mentioned variety of issue, finished the present invention.The objective of the invention is to propose a kind of Software Protection Technique, used this resist technology and can prevent that software is cracked and illegal the use based on safety chip, and good effective to the technology that cracks of decompiling and memory copying technology and so on.
In one aspect of the invention, proposed a kind of method for protecting software, comprised step: all comprised from each and determine the unit that to protect at least one software of a plurality of unit based on safety chip; The unit that will protect is compiled into the file destination that safety chip can be carried out; With file destination being encrypted, produce the ciphertext unit with the corresponding symmetric key of each software; Set up the function call safety chip at file destination, wherein the ciphertext unit as function parameters; Replace the unit that to protect in each software with function; And the ciphertext unit is attached on the corresponding software.
According to one embodiment of present invention, this method also comprises step: the digital certificate that obtains the software user of each software from certification authority; From digital certificate, obtain PKI; Generation comprises the occupancy permit of symmetric key, software sequence number and version number; With PKI each occupancy permit is encrypted.
According to one embodiment of present invention, this method further comprises step: by carrying out and the corresponding file destination in unit that will protect in the next safety chip on being installed in main frame of function call.
According to one embodiment of present invention, by the other parts of main frame carry out with each software in the corresponding file destination in other unit except that the unit that will protect.
According to one embodiment of present invention, carry out with the corresponding file destination in unit that will protect before, also comprise step: produce at random with the corresponding RSA unsymmetrical key of each software to and with the right PKI of unsymmetrical key to certification authority's application corresponding digital certificate; Obtaining to utilize the right private key of unsymmetrical key that the occupancy permit of the encryption of each software is decrypted under the situation of digital certificate, with the symmetric key of the software manufacturing side that obtains each software; With the ciphertext unit of symmetric key deciphering, to obtain file destination as function parameters; And in safety chip, carry out file destination, and execution result is returned to main frame.
According to one embodiment of present invention, the unit that protect comprise in functional unit and the data cell one of at least.
According to one embodiment of present invention, symmetric key produces at random.
In another aspect of this invention, proposed a kind of security system for software based on safety chip, having comprised: determining section is used for comprising all that from each at least one software of a plurality of unit determines the unit that will protect; The compiling part, the unit that is used for protecting is compiled into the file destination that safety chip can be carried out; Crypto engine; with file destination being encrypted to produce the ciphertext unit with the corresponding symmetric key of each software; set up the function that calls safety chip at file destination; wherein the ciphertext unit as function parameters; and replace the unit that to protect in the software, and the ciphertext unit is attached on the corresponding software with function.
According to one embodiment of present invention, this security system for software also comprises: symmetric key produces part, is used for producing at random and the corresponding symmetric key of each software; The asymmetric encryption engine, be used for obtaining the software user's of each software digital certificate from certification authority, from digital certificate, to obtain PKI, generation comprises the occupancy permit of each software of symmetric key, software sequence number and version number, and with PKI the occupancy permit of each software is encrypted.
According to one embodiment of present invention, safety chip comprises: key produces part, be used for producing at random with the corresponding RSA unsymmetrical key of each software to and with the right PKI of unsymmetrical key to certification authority's application corresponding digital certificate; The RSA Algorithm engine is used for separately winning to such an extent that utilize the right private key of unsymmetrical key that the occupancy permit of the encryption of each software is decrypted under the situation of digital certificate in the key generating unit, to obtain the symmetric key of software manufacturing side; The symmetry algorithm engine is used for symmetric key the ciphertext unit that obtains by function call being decrypted, to obtain file destination; Carry out engine, be used to carry out file destination and execution result is turned back to main frame.
According to one embodiment of present invention, safety chip also comprises storage area, is used to store ciphertext unit and file destination at least.
According to one embodiment of present invention, by the corresponding file destination in other unit except that the unit that will protect in the execution of the other parts except that safety chip and each software on the main frame.
According to one embodiment of present invention, the unit that protect comprise in functional unit and the data cell one of at least.
Utilize above-mentioned configuration of the present invention, can thoroughly realize the binding relationship between the destination host of software and appointment.Because safety chip is bundled on the main frame, and key is bundled on the safety chip, thus even software is illegally copied on other the main frame, also can be owing to the part that the private key that does not have coupling causes encrypting can't be deciphered, promptly software can't be carried out.
In addition, utilize above-mentioned configuration of the present invention, can prevent to crack by the method for decompiling.Because the critical function of software and data all are through encrypting, and the preservation of decrypted private key and use carry out in safety chip inside, and the cracker can't obtain, thereby the cracker can't obtain the repertoire of software by decompiling.
In addition, utilize above-mentioned configuration of the present invention, can prevent to crack by the method for copy internal memory.Because the important function of software and data are all carried out in that safety chip is inner, can't the access security chip internal so do not store complete software and cracker in the internal memory, so the cracker can't obtain the repertoire of software by the method for copy internal memory.
In addition, the present invention can use the protection of a safety chip to various software.Because safety chip can have many to unsymmetrical key, so every pair of unsymmetrical key can be protected one and a plurality of softwares.
Description of drawings
Fig. 1 shows the existing synoptic diagram that cracks by decompiling;
Fig. 2 shows the synoptic diagram that is used for illustrating according to the security system for software of the embodiment of the invention;
Fig. 3 shows the block diagram according to the software cryptography device that uses in software manufacturing side of the embodiment of the invention;
Fig. 4 shows at the structured flowchart according to the safety chip of installing on software user's main frame of the embodiment of the invention;
Fig. 5 is used for illustrating the process flow diagram of software being encrypted in software manufacturing side;
Fig. 6 is used for illustrating the process flow diagram of carrying out the software of having encrypted the software user.
Embodiment
The contrast accompanying drawing is described specific embodiments of the invention in detail below, wherein for the purpose that clearly demonstrates, has omitted the description of the known content of those of ordinary skill in the art.
[formation of software cryptography side]
Fig. 2 shows the synoptic diagram that is used for illustrating according to the security system for software of the embodiment of the invention, wherein shows the part-structure of the part-structure of software cryptography device of software manufacturing side and software user's destination host 400.In addition, Fig. 3 shows the structured flowchart of the software cryptography device 100 of software manufacturing side.
Software cryptography device 100 as shown in Figure 3 comprises: determining section 130, compiling part 140, symmetric cryptography engine 150, symmetric key produce part 110 and asymmetric encryption engine 120.
As shown in Figure 2, software is made square tube and is crossed and download or alternate manner obtains software user's digital certificate C from the certificate agency 300 of for example third party certification authority, wherein can obtain software user's PKI pubAKey from digital certificate C.
Then; determining section 130 is read in the priginal soft that will protect that comprises functional unit FU1, FU2, FU3, FU4 and data cell DU1, DU2 from the storer (not shown), and definite functional unit FU2 that wherein needs protection and FU3 and the data cell DU1 and the DU2 that need protection.
File destination FU2*, FU3*, DU1* and DU2* that compiling part 140 becomes the safety chip on the software user main frame to carry out the functional unit FU2, the FU3 that determine and data cell DU1, DU2 cross compile.
Symmetric key produces part 110 and for example uses the algorithm of 3DES symmetry algorithm and so on to produce symmetric key SKey, and sends it to symmetric cryptography engine 150 by asymmetric encryption part 120.This key SK of symmetric cryptography engine 150 usefulness ey encrypts file destination FU2*, FU3*, DU1* and DU2* then, produces ciphertext unit F U2**, FU3**, DU1** and DU2**.
In addition, symmetric cryptography engine 150 is set up the function T ransmit that calls safety chip on the software user main frame, ciphertext unit F U2**, FU3**, DU1** and DU2** parameter, replace FU2, FU3, DU1 and the DU2 unit of priginal soft then, as shown in Figure 2 as function T ransmit.Then, ciphertext unit F U2**, FU3**, DU1** and DU2** are attached to the back of priginal soft, as the part of software.
In asymmetric encryption engine 120, produce the software licensing card L that comprises symmetric key SKey, software sequence number and version number, and utilize user's PKI pubAKey that software licensing card L is encrypted.
[software user's formation]
Fig. 4 shows at the structured flowchart according to the safety chip of installing on software user's main frame of the embodiment of the invention.Below in conjunction with Fig. 4 and Fig. 2 software how to carry out this protection on the main frame of software execution side is described.
Shown in Fig. 2 and 4, safety chip 200 is arranged on software user's the destination host 400, and comprises that key produces part 210, carries out engine 220, storage area 230, interface section 240, RSA Algorithm engine 250 and symmetry algorithm engine 260, or the like.
The key of safety chip 200 inside produces part 210 and produces a RSA unsymmetrical key at random to AKey, then by interface section 240 usefulness unsymmetrical key to the PKI pubAKey of AKey to third party certification authority application digital certificate.Third party certification authority produces the digital certificate C of pubAKey.
Software manufacturing side gives the software user with the software dispatch of encrypting, and the software user is install software on its main frame, and the software licensing that obtains to encrypt is demonstrate,proved L.
Then, the software licensing card L that encrypts is sent in the safety chip 200, and and unsymmetrical key the private key priAKey of Akey sent into RSA Algorithm engine 250 together be decrypted, obtain the symmetric key SKey of software manufacturing side.
As shown in Figure 2, operation unit F U1 and FU4 on software user's main frame 400.
When running to shielded unit,, successively ciphertext unit F U2**, FU3**, DU1** and DU2** are sent in the safety chip 200 as parameter, and be stored in the storage area 230 by function call (CALL Transmit).
Then, symmetric key SKey and ciphertext unit F U2**, FU3**, DU1** and DU2** are sent into the symmetry algorithm engine 260 that for example uses the 3DES algorithm successively, be decrypted, obtain file destination FU2*, FU3*, DU1* and the DU2* that can move, and file destination FU2*, FU3*, DU1* and DU2* are kept in the storage area 230 of safety chip 200.
Next, carry out engine 220 and call in and carry out file destination FU2*, FU3*, DU1* and DU2* from storage area 230 successively.After carrying out above-mentioned file destination FU2*, FU3*, DU1* and DU2*, carry out engine 220 and successively execution result is turned back to destination host by interface section 240, continue the other parts of executive software by destination host.
[software cryptography process]
Fig. 5 shows and is used for illustrating the process flow diagram of software being encrypted in software manufacturing side.
As shown in Figure 5, at step S501, software manufacturing square tube crosses download or alternate manner obtains software user's digital certificate C from the certificate agency 300 of for example third party certification authority, and judges whether download is successful.If download successfully, from digital certificate C, obtain software user's PKI pubAKey at step S502.If do not have successful downloading digital certificate C, then carry out fault processing at step S510.
Then; at step S503; read in the priginal soft that will protect that comprises functional unit FU1, FU2, FU3, FU4 and data cell DU1, DU2 from the storer (not shown), and definite functional unit FU2 that wherein needs protection and FU3 and the data cell DU1 and the DU2 that need protection.
Next, file destination FU2*, FU3*, DU1* and the DU2* that becomes the safety chip on the software user main frame to carry out the functional unit FU2, the FU3 that determine and data cell DU1, DU2 cross compile at step S504.
At step S505, for example use the algorithm of 3DES symmetry algorithm and so on to produce symmetric key SKey, and file destination FU2*, FU3*, DU1* and DU2* are encrypted with this symmetric key SKey, produce ciphertext unit F U2**, FU3**, DU1** and DU2**.
Then, at step S506, whether judgement obtains ciphertext unit F U2**, FU3**, DU1** and DU2** with symmetric key SKey encryption successful.If not success, flow process changes step S510 over to, carries out fault processing.
Encrypting under the case of successful, at step S507, the function T ransmit of safety chip on the software user main frame is called in foundation, ciphertext unit F U2**, FU3**, DU1** and the DU2** parameter as function T ransmit, replaces FU2, FU3, DU1 and the DU2 unit of priginal soft then.Then, ciphertext unit F U2**, FU3**, DU1** and DU2** are attached to the back of priginal soft, as the part of software.
At step S508, produce the software licensing card L that comprises symmetric key SKey, software sequence number and version number.Then, utilize user's PKI pubAKey that software licensing card L is encrypted at step S509, and judge whether encryption is successful, if unsuccessful, then carries out step S510, carries out fault processing, if success then finishes software is carried out encrypted process.
[software execute process]
Fig. 6 is used for illustrating the process flow diagram of carrying out the software of having encrypted the software user.
As shown in Figure 6, at step S601, key produces part 210 and produces a RSA unsymmetrical key at random to AKey, then at the PKI pubAKey of step S602 by interface section 240 usefulness unsymmetrical key AKey to third party certification authority application digital certificate, and judge whether application successful.If unsuccessful, then change fault processing at step S613.If third party certification authority produces digital certificate C and the software manufacturing side of pubAKey and gives the software user with the software dispatch of encrypting, then in step S603 install software on software user's main frame, and the software licensing card L of acquisition encryption.
At step S604, the software licensing card L that encrypts is sent in the safety chip 200, and and unsymmetrical key the private key priAKey of Akey sent into RSA Algorithm engine 250 together be decrypted, and judge whether success of deciphering.If successful decryption then obtains the symmetric key SKey of software manufacturing side at step S605.
Then, shown in Fig. 2 and 6, at step S606, operation unit F U1 and FU4 on software user's main frame 400.
When running to shielded unit, for example ciphertext unit F U2** passes through function call (CALL Transmit) at step S607, and U2** sends in the safety chip 200 as parameter with the ciphertext unit F, and is stored in the storage area 230.
Then, at step S608, symmetric key SKey and ciphertext unit F U2** are sent into the symmetry algorithm engine 260 that for example uses the 3DES algorithm, be decrypted, obtain the file destination FU2* that can move, and file destination FU2* is kept in the storage area 230 of safety chip 200 at step S609.
Next, at step S610, carry out engine 220 and call in and carry out file destination FU2* from storage area 230 successively.After carrying out above-mentioned file destination FU2*, carry out engine 220 at step S611 and successively execution result is turned back to destination host by interface section 240.
At step S612, if next unit still is shielded unit, FU3* for example, then flow process forwards step S607 to, and U3* carries out identical as mentioned above processing at the ciphertext unit F.After end is carried out in above-mentioned ciphertext unit, execution result is returned destination host, continue the other parts of executive software by destination host.
Though more than be that example has illustrated embodiments of the invention with single software; but; the present invention can be applied to a plurality of softwares equally; for example the software manufacturing can manyly respectively a plurality of softwares carry out above-mentioned ciphering process to symmetric key to produce; and the software user, can be with the protection of a plurality of unsymmetrical key realizations on a safety chip to a plurality of softwares.
It should be noted last that: above embodiment only is illustrative rather than definitive thereof technical scheme of the present invention, although the present invention is had been described in detail with reference to the foregoing description, those of ordinary skill in the art is to be understood that: still can make amendment or be equal to replacement the present invention, and not breaking away from any modification or partial replacement of the spirit and scope of the present invention, it all should be encompassed in the middle of the claim scope of the present invention.

Claims (13)

1, a kind of method for protecting software based on safety chip comprises step:
All comprise from each and to determine the unit that to protect at least one software of a plurality of unit;
The described unit that will protect is compiled into the file destination that described safety chip can be carried out;
With described file destination being encrypted, produce the ciphertext unit with the corresponding symmetric key of each software;
Set up the function that calls described safety chip at described file destination, wherein described ciphertext unit as described function parameters;
Replace the unit that to protect described in each software with described function; And
Described ciphertext unit is attached on the corresponding software;
Wherein, when carrying out the described unit that will protect, by the described safety chip of described function call, described safety chip is decrypted described ciphertext unit, and carry out that deciphering obtains with the corresponding file destination in the described unit that will protect.
2, method for protecting software as claimed in claim 1 also comprises step:
Obtain the software user's of each software digital certificate from certification authority;
From described digital certificate, obtain PKI;
Generation comprises the occupancy permit of described symmetric key, software sequence number and version number;
With described PKI each occupancy permit is encrypted.
3, method for protecting software as claimed in claim 2, wherein,
By carrying out and the corresponding file destination in the described unit that will protect in the next safety chip on being installed in main frame of function call.
4, as method for protecting software as described in the claim 3, it is characterized in that, by the other parts of main frame carry out with each software in the corresponding file destination in other unit except that the described unit that will protect.
5, as claim 3 or 4 described method for protecting software, it is characterized in that, before execution and the corresponding file destination in the described unit that will protect, also comprise step:
Produce at random with the corresponding RSA unsymmetrical key of each software to and apply for corresponding software user's digital certificate to certification authority with the right PKI of unsymmetrical key;
Under the situation of the digital certificate that obtains the software user, utilize the right private key of unsymmetrical key that the occupancy permit of the encryption of each software is decrypted, with the symmetric key of the software manufacturing side that obtains each software;
With the ciphertext unit of described symmetric key deciphering, to obtain described file destination as function parameters; And
In described safety chip, carry out described file destination, and execution result is returned to main frame.
6, method for protecting software as claimed in claim 5 is characterized in that, the described unit that will protect comprise in functional unit and the data cell one of at least.
7, method for protecting software as claimed in claim 1 is characterized in that, described symmetric key produces at random.
8, a kind of security system for software based on safety chip comprises:
Determining section is used for comprising all that from each at least one software of a plurality of unit determines the unit that will protect;
The compiling part is used for the described unit that will protect is compiled into the file destination that described safety chip can be carried out;
Crypto engine, with described file destination being encrypted to produce the ciphertext unit with the corresponding symmetric key of each software, set up the function that calls described safety chip at described file destination, wherein described ciphertext unit as described function parameters, and replace the unit that to protect described in the software, and described ciphertext unit is attached on the corresponding software with described function;
Wherein, when carrying out the described unit that will protect, by the described safety chip of described function call, described safety chip is decrypted described ciphertext unit, and carry out that deciphering obtains with the corresponding file destination in the described unit that will protect.
9, security system for software as claimed in claim 8 also comprises:
Symmetric key produces part, is used for producing at random described and the corresponding symmetric key of each software;
The asymmetric encryption engine, be used for obtaining the software user's of each software digital certificate from certification authority, from described digital certificate, to obtain PKI, generation comprises the occupancy permit of each software of described symmetric key, software sequence number and version number, and with described PKI the occupancy permit of each software is encrypted.
10, security system for software as claimed in claim 9 is characterized in that, described safety chip comprises:
Key produces part, be used for producing at random with the corresponding RSA unsymmetrical key of described each software to and apply for corresponding software user's digital certificate to certification authority with the right PKI of unsymmetrical key;
The RSA Algorithm engine is used for utilizing the right private key of unsymmetrical key that the occupancy permit of the encryption of each software is decrypted under the key generating unit divide to obtain software user's the situation of digital certificate, to obtain the symmetric key of software manufacturing side;
The symmetry algorithm engine is used for described symmetric key the ciphertext unit that obtains by function call being decrypted, to obtain file destination;
Carry out engine, be used to carry out described file destination and execution result is turned back to main frame.
11, security system for software as claimed in claim 10 is characterized in that, described safety chip also comprises storage area, is used for storage described at least ciphertext unit and file destination.
12, security system for software as claimed in claim 11 is characterized in that, by the corresponding file destination in other unit except that the described unit that will protect in the execution of the other parts except that safety chip and each software on the main frame.
13, as claim 11 or 12 described security system for software, it is characterized in that, the described unit that will protect comprise in functional unit and the data cell one of at least.
CNB2005101340798A 2005-12-23 2005-12-23 Software protecting method and system based on safety chip Expired - Fee Related CN100504896C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005101340798A CN100504896C (en) 2005-12-23 2005-12-23 Software protecting method and system based on safety chip

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005101340798A CN100504896C (en) 2005-12-23 2005-12-23 Software protecting method and system based on safety chip

Publications (2)

Publication Number Publication Date
CN1987882A CN1987882A (en) 2007-06-27
CN100504896C true CN100504896C (en) 2009-06-24

Family

ID=38184676

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005101340798A Expired - Fee Related CN100504896C (en) 2005-12-23 2005-12-23 Software protecting method and system based on safety chip

Country Status (1)

Country Link
CN (1) CN100504896C (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103106373B (en) * 2011-11-10 2016-11-09 国民技术股份有限公司 A kind of trusted computing chip and credible accounting system
CN105224829B (en) * 2014-06-11 2017-12-08 威纶科技股份有限公司 Embedded system and content protecting method
CN106161028A (en) * 2015-04-17 2016-11-23 国民技术股份有限公司 Safety chip, communication terminal and the method improving communication security
CN107688729B (en) * 2017-07-27 2020-11-27 大唐高鸿信安(浙江)信息科技有限公司 Application program protection system and method based on trusted host
CN107832589B (en) * 2017-11-29 2020-05-12 苏州科达科技股份有限公司 Software copyright protection method and system

Also Published As

Publication number Publication date
CN1987882A (en) 2007-06-27

Similar Documents

Publication Publication Date Title
JP4916512B2 (en) Copy digital content between content protection systems
US7987368B2 (en) Peer-to-peer networks with protections
JP4764639B2 (en) File encryption / decryption program, program storage medium
KR100912276B1 (en) Electronic Software Distribution Method and System Using a Digital Rights Management Method Based on Hardware Identification
CN101490687B (en) Control system and method using identity objects
CN101872404B (en) Method for protecting Java software program
US20060149683A1 (en) User terminal for receiving license
US20080168568A1 (en) Token passing technique for media playback devices
EP2065828B1 (en) Media storage structures for storing content, devices for using such structures, systems for distributing such structures
CA2714196A1 (en) Information distribution system and program for the same
WO2012056656A1 (en) Tamper monitoring system, protection control module and detection module
US8392723B2 (en) Information processing apparatus and computer readable medium for preventing unauthorized operation of a program
CN100504896C (en) Software protecting method and system based on safety chip
CN110348181A (en) A kind of method of verification software right to use legitimacy
JPH0383132A (en) Software protection control system
CN101923616A (en) Service provision device in copyright protection, user terminal and copyright protection method
CN101174941B (en) Off-line digital copyright protection method and device for mobile terminal document
CN100583174C (en) Data safety processing method using online banking system safety terminal
CN1559026A (en) Method and apparatus for protecting information from unauthorised use
US8799682B2 (en) Content data reproduction system and recording device
CN107317823A (en) Encryption method and system in a kind of cloud storage system
JP4192738B2 (en) Electronic document editing device, electronic document editing program
JP2014524614A (en) Digital copyright management method, system and server
Grimen et al. Software-based copy protection for temporal media during dissemination and playback
CN114357385A (en) Software protection and authorization method, system and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090624

Termination date: 20201223