CN102081717A - Method for protecting authorized software by using metadata - Google Patents
Method for protecting authorized software by using metadata Download PDFInfo
- Publication number
- CN102081717A CN102081717A CN201110046861XA CN201110046861A CN102081717A CN 102081717 A CN102081717 A CN 102081717A CN 201110046861X A CN201110046861X A CN 201110046861XA CN 201110046861 A CN201110046861 A CN 201110046861A CN 102081717 A CN102081717 A CN 102081717A
- Authority
- CN
- China
- Prior art keywords
- software
- metadata
- user
- server
- company
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention relates to a method for protecting authorized software by using metadata. In the method, the metadata is separated from the software; when a user purchases the software, a software company only provides an executable program part of the software for the user, and the metadata is remained on a server of the software company; when using the software, the user needs to apply for the metadata from the server of the software company firstly; and because the running of the software depends on the metadata and a part of or all functions of the software cannot be realized without the metadata, the software can normally run only after the metadata is successfully applied. The method has the advantages that: hardware equipment is not required; an encryption scheme is not required to be designed; the cost is low; the trial period and the software module can be controlled; the software can be improved and upgraded by changing the metadata on the server; convenience can be brought to the user; and passive downloading of an upgrading packet is changed into active upgrading of the software.
Description
Technical field
The present invention relates to a kind of method of using metadata protection copyrighted software, belong to areas of information technology.
Background technology
Now, software piracy is a commonplace phenomenon, protects copyrighted software that several method is arranged at present: (1) installation series number, and such as windows operating system, office office software etc. are installed.(2) application activating sign indicating number needs to provide some user profile to the software business man after the installation, obtain active coding then, activating software.(3) adopt softdog, some information are written in the softdog, in needs, read out and verify.(4) customized development, at user's demand, for the user makes to measure, the software of working it out only is fit to this user, and is not suitable for other users, and this is helpless selection certainly.(5) software is placed on the server of software company, the user uses software, just looks like to use the microblogging of Sina the same, needs first Website login, could use then.This need be placed on user's data above the server of software company, and the data of oneself are placed on above others' server but the user also worries.
More than be more common protection copyrighted software method, for example a lot of people are at windows and word with piracy.Active coding can come the computing activation sign indicating number by the calculation device, and perhaps the mode by alternate file cracks.
Softdog, have another name called encryption lock, it is the method for more effectively protecting copyrighted software at present, protect software with softdog, first is exactly to select a good encryption lock, just technology encryption lock manufacturer really up to the mark, one encipherment scheme that packages will be arranged then, be easy to be replicated if encryption lock is bad, be easy to be bypassed if encipherment scheme is bad, this encipherment scheme all need expend great amount of cost and time; In addition, at cracking of softdog many methods are arranged also at present.
More than the common feature of the method for protection copyrighted software is; running software does not rely on active coding, sequence number, softdog; but enforceablely must have corresponding information to move, in case and this information is palmed off or is duplicated, so the protection of copyrighted software is also just performed practically no function.
Summary of the invention
The object of the present invention is to provide a kind of a kind of method of using metadata protection copyrighted software that can prevent the software pirate version effectively that can overcome above-mentioned technical matters.
The present invention is a technique effect of realizing protecting copyrighted software by the method that adopts metadata to separate with software, and step of the present invention is:
(1) on the server of software company, sets up a legal user information database, be used to write down the correct IP address, the information that recording user can use which software and software module and term of life of server of legal user's user ID, logon account, password, request metadata;
(2) software company writes software;
(3) be provided with one and be used to receive user's requested service device, whether checking is effective user, if effectively the user then sends metadata to the user;
(4) user buys copyrighted software, information of registered users, the IP address of filling in the server of application metadata;
(5) user's operating software, the application metadata;
(6) server of software company is accepted user's application, judges whether user's identity meets the requirements, if meet the requirements, sends the metadata of application;
(7) after user's software obtains metadata, realize normal operation according to metadata.
Metadata is a kind of data, is one group of character string from saying in fact, and metadata has the characteristic of crossing over programming language, can express certain implication, and programming language is then realized various functions according to the expressed implication of metadata.Software is not to have judged whether metadata in operation, and the computing that neither encrypt, decipher metadata realizes partial function or repertoire but rely on metadata.Need be (for example: text box etc.), the filtration of query function, user right and judgement, user's personal settings such as software according to the control of the data form in metadata systematic function node (function menu), the original list, list the inside; If there is not metadata, these functions of software all can't realize.
The method that the present invention adopts metadata and software to be separated from each other, when the user buys software, software company only gives the user part of the executable program of software, and metadata is retained in above the server of software company, when the user uses software, the server application metadata that at first needs software company, after applying for successfully, software just can normally move, because the operation of software must rely on metadata, do not have metadata, the partial function of software or even repertoire can't be realized.
The invention has the beneficial effects as follows: (1) need not increase hardware device, need not design encipherment scheme, and cost is low.(2) can control the trial period, apply for metadata on trial, can send; Spent the trial period, do not changed into formal user, just can not send metadata, do not had metadata, software can't move.(3) can the Control Software module, for example a software is divided into A, B, four modules of C, D, can sell separately, certain user has only bought the A module, so just only send the relevant metadata of A module, do not have the metadata of other modules, other modules can't normally be moved.(4) can realize the improvement and the upgrading of software by the metadata on the change server, can bring convenience to the user like this, become passive down loading updating bag and be the active upgrade software.
Description of drawings
Fig. 1 is a kind of block diagram that uses the method for metadata protection copyrighted software of the present invention.
Embodiment
Describe the present invention below in conjunction with the drawings and specific embodiments.As shown in Figure 1, during user's operating software, at user side by user side server and internet server requests metadata to software company, whether software company's checking when obtaining applying for is legal user, if the copyrighted software user side then sends metadata, not that the copyrighted software user then refuses request.The server of software company is checked by the IP address of user ID and request metadata; The IP address of correct request of user ID and metadata is consistent with the IP address that the user fills in, explanation is the copyrighted software user, the server of software company then sends metadata to user side, has so just got rid of by the possibility that other people falsely use, and has fundamentally eliminated the situation of software pirate version.After the user obtained metadata, software then normally moved by the parsing to metadata.
If crack the software of the present invention's protection, at first must steal metadata, secondly must revise software, the domain name of asking during change application metadata is being done a program of accepting applications at last.Details are as follows for concrete principle and process: running software must rely on metadata, wants pirate just must getting to steal metadata item by item.Metadata is not key, and for example installation series number, the so simple information of active coding neither enciphered messages, enciphered message is also relatively more brief, but lot of data, hundreds of bar even several ten thousand s' record, the module of software is many more, the page is many more, and metadata is also just many more.Want complete operating software, just must obtain whole metadata.Metadata is to be kept at above the server of software company, pass on to the user, can disposablely all not send to the user yet, but which metadata the user needs which just sends, be stolen for fear of metadata, can in the request of application metadata, add the secret signal that some are difficult for discovering, being used for distinguishing is that normal request or malice are stolen, and perhaps metadata is encrypted.It still is not enough just stealing metadata in addition, because software is in operation, can be to specified server address (being domain name) application metadata, if want to allow software not to original application for domain names metadata, and turn to the domain name of pirate metadata, and the address that just must revise this request, this will the decompiling software code, find domain name to revise code, recompilate then.This is just cracked with very big difficulty.
Secondly also to make a program that accepts request; Even because revised the address of software asks metadata, must do a program that accepts request so, otherwise still can't allow piracy software obtain metadata, this responder is to be placed on above the server of software company, bootlegger or steal this program, otherwise oneself is write again; In order to prevent this situation, the present invention is provided with secret signal in request metadata with when accepting metadata, if software receives metadata, but secret signal does not meet, operation can be refused to continue, if piracy also must be discerned these secret signals, also software will be changed like this.If software upgrading, improvement are to realize by metadata, piracy is wanted follow-up so, just must obtain new metadata.The pirate metadata of change has so just increased pirate difficulty greatly then, uses pirate user also pretty troublesome simultaneously; The copyrighted software user can in time obtain up-to-date metadata because will apply for metadata every day, therefore uses easily.
The present invention does not need hardware is bound, and the key of the deciphering that only needs protection because can encrypt the metadata that sends, wants the key that correct identification must be known deciphering, has improved the convenience of using and has strengthened the difficulty that cracks; Copyrighted software needs correct decryption element data to move; in order to protect the key that is placed on the copyrighted software the inside; need obscure and add shell software; Here it is two pipe protections; first road is to add shell, and second road is to obtain metadata, and copyrighted software is with regard to many one deck protections like this; as the shell key that then can only obtain to decipher that has been cracked, also must obtain metadata and can realize piracy.And for the protection metadata; the present invention adopts some to do the method for secret signal mark; perhaps a sign all is set at every suit copyrighted software; if copyrighted software is by piracy; identify by this that to discern be which cover copyrighted software is by piracy; thereby find the bootlegger easily; promptly when sending metadata, add the secret signal mark; in next bar metadata of application; must be only normal application to last secret signal mark,, can think that malice steals metadata if to not going up the secret signal mark; and stop to provide metadata, so just improved security greatly.
The present invention is placed on metadata above the server of software company; not only can protect copyrighted software, increase the dirigibility of software; but also can improve by the mode of revising metadata, upgrade software; it is convenient to have brought for software upgrading and use like this, has greatly strengthened the protection of copyrighted software simultaneously.
The above; only be the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, anyly is familiar with those skilled in the art in scope disclosed by the invention; the variation that can expect easily or replacement all should be encompassed in the protection domain of claim of the present invention.
Claims (1)
1. a method of using metadata protection copyrighted software is characterized in that, may further comprise the steps:
(1) on the server of software company, sets up a legal user information database, be used to write down the correct IP address, the information that recording user can use which software and software module and term of life of server of legal user's user ID, logon account, password, request metadata;
(2) software company writes software;
(3) be provided with one and be used to receive user's requested service device, whether checking is effective user, if effectively the user then sends metadata to the user;
(4) user buys copyrighted software, information of registered users, the IP address of filling in the server of application metadata;
(5) user's operating software, the application metadata;
(6) server of software company is accepted user's application, judges whether user's identity meets the requirements, if meet the requirements, sends the metadata of application;
(7) after user's software obtains metadata, realize normal operation according to metadata.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110046861XA CN102081717A (en) | 2011-02-25 | 2011-02-25 | Method for protecting authorized software by using metadata |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110046861XA CN102081717A (en) | 2011-02-25 | 2011-02-25 | Method for protecting authorized software by using metadata |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102081717A true CN102081717A (en) | 2011-06-01 |
Family
ID=44087675
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110046861XA Pending CN102081717A (en) | 2011-02-25 | 2011-02-25 | Method for protecting authorized software by using metadata |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102081717A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102915416A (en) * | 2012-09-18 | 2013-02-06 | 北京深思洛克软件技术股份有限公司 | System for implementing security sharing of virtual articles among application programs |
CN104424402A (en) * | 2013-08-28 | 2015-03-18 | 卓易畅想(北京)科技有限公司 | Method and device for detecting pirated application program |
CN106850220A (en) * | 2017-02-22 | 2017-06-13 | 腾讯科技(深圳)有限公司 | Data ciphering method, data decryption method and device |
CN110619194A (en) * | 2019-09-26 | 2019-12-27 | 北京神州绿盟信息安全科技股份有限公司 | Upgrade package encryption and decryption methods and devices |
-
2011
- 2011-02-25 CN CN201110046861XA patent/CN102081717A/en active Pending
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102915416A (en) * | 2012-09-18 | 2013-02-06 | 北京深思洛克软件技术股份有限公司 | System for implementing security sharing of virtual articles among application programs |
CN102915416B (en) * | 2012-09-18 | 2015-12-09 | 北京深思数盾科技有限公司 | A kind of system realizing virtual objects safe sharing between application program |
CN104424402A (en) * | 2013-08-28 | 2015-03-18 | 卓易畅想(北京)科技有限公司 | Method and device for detecting pirated application program |
CN106850220A (en) * | 2017-02-22 | 2017-06-13 | 腾讯科技(深圳)有限公司 | Data ciphering method, data decryption method and device |
CN110619194A (en) * | 2019-09-26 | 2019-12-27 | 北京神州绿盟信息安全科技股份有限公司 | Upgrade package encryption and decryption methods and devices |
CN110619194B (en) * | 2019-09-26 | 2021-10-01 | 绿盟科技集团股份有限公司 | Upgrade package encryption and decryption methods and devices |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102073826B (en) | Utilize the system and method for the digital copyright management of lightweight digital watermark adding component | |
CN100421102C (en) | Digital rights management structure, portable storage device, and contents management method using the portable storage device | |
EP1443381B1 (en) | System and method for secure software activation with volume licenses | |
CN100395679C (en) | Software authorizing and protecting device and method | |
CN101375309B (en) | Method and apparatus for temporarily using DRM contents | |
EP2254073B1 (en) | License authentication system and authentication method | |
CN101689237A (en) | Activation system architecture | |
CN101854245A (en) | Be used to provide method, system, permit server and the software module of permission | |
KR20200000448A (en) | Systems and methods for software activation and license tracking | |
CN103828293A (en) | System and method for user authentication | |
CN101689989A (en) | creating and validating cryptographically secured documents | |
CN102457522B (en) | For the method and system of transferring content license | |
KR102055625B1 (en) | Authentication server device, program, and authentication method | |
US9514288B2 (en) | Information processing device, information processing method, program and storage medium | |
JP5686697B2 (en) | Embedded equipment maintenance system | |
CN101743714A (en) | updating and validating documents secured cryptographically | |
CN101286994A (en) | Digital literary property management method, server and system for content sharing within multiple devices | |
CN111159661B (en) | Decompilation prevention method and device, electronic equipment and storage medium | |
CN103971034A (en) | Method and device for protecting Java software | |
CN103403729A (en) | Secure management and personalization of unique code signing keys | |
CN102081717A (en) | Method for protecting authorized software by using metadata | |
AU2010325337B2 (en) | Method for protecting application and method for executing application using the same | |
CN115795438B (en) | Method, system and readable storage medium for authorizing application program | |
CN104102859A (en) | JavaScript-based middleware authorization method and device | |
CN100410831C (en) | Random binding software installing method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20110601 |