CN102208003A - Software program protection system and method - Google Patents

Software program protection system and method Download PDF

Info

Publication number
CN102208003A
CN102208003A CN2010101370421A CN201010137042A CN102208003A CN 102208003 A CN102208003 A CN 102208003A CN 2010101370421 A CN2010101370421 A CN 2010101370421A CN 201010137042 A CN201010137042 A CN 201010137042A CN 102208003 A CN102208003 A CN 102208003A
Authority
CN
China
Prior art keywords
software program
time
computing machine
use information
information record
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010101370421A
Other languages
Chinese (zh)
Inventor
梁献全
李昇军
许寿国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hongfujin Precision Industry Shenzhen Co Ltd
Hon Hai Precision Industry Co Ltd
Original Assignee
Hongfujin Precision Industry Shenzhen Co Ltd
Hon Hai Precision Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hongfujin Precision Industry Shenzhen Co Ltd, Hon Hai Precision Industry Co Ltd filed Critical Hongfujin Precision Industry Shenzhen Co Ltd
Priority to CN2010101370421A priority Critical patent/CN102208003A/en
Publication of CN102208003A publication Critical patent/CN102208003A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a software program protection method. The method comprises the following steps of: comparing the media access control (MAC) address of a computer with a preset MAC address when a software program is started, and comparing a hard disk serial number for storing the software program with a preset serial number; if the two comparison results both indicate sameness, judging whether the last running time of the software program is earlier than the current system time, whether the current system time is in allowed time and whether the using times of the software program is within the limited times according to the using information records of the software program; and under the condition that the judgment results are positive, allowing the software program to run in the computer, or when any one of the judgment results is negative, prohibiting the software program to run in the computer and displaying warning information. The invention also provides a software program protection system. The method and the system can protect the software according to multiple factors such as hardware equipment of a user, using times, using time and the like.

Description

Software program protection system and method
Technical field
The present invention relates to a kind of Software Protection Technique, relate in particular to a kind of system and method for protecting the unauthorized use of software program.
Background technology
The software developer after developing a kind of software, for this software can be applied better, this software gratis can be offered usually potential customers' a period of time on probation or on probation several times.In addition, even this software is sold with compensation, also may stipulate the service time of this software.This causes obstacle with regard to the copyright protection of giving software, and is unfavorable for the management of software developer to software.
Summary of the invention
In view of above content, be necessary to propose a kind of software program protection system, it can be protected software according to many-sided factors such as hardware device, access times and service time of user.
In addition, also be necessary to propose a kind of software program guard method, it can be protected software according to many-sided factors such as hardware device, access times and service time of user.
A kind of software program protection system is used to protect some software programs.This system comprises: search module, be used to search MAC (MediaAccess Control) address of the computing machine of current this software program of installation, search the hard disk sequence number of current this software program of storage; Comparison module is used for above-mentioned MAC Address is compared with a default MAC Address, and the sequence number of above-mentioned hard disk is compared with a default sequence number; The record acquisition module is used for result in above-mentioned two comparisons and all is obtaining the use information record of this software program the file in this computing machine under the identical situation; Module set up in record, is used for setting up the use information record of this software program, and should storing in the above-mentioned file behind the use information recording of encrypted when above-mentioned record acquisition module can not obtain the use information record of this software program; Judge module is used for judging according to above-mentioned use information record whether this software program was in the time of licensing; And management and control module, when being used in this software program is in the time of licensing, allow this software program in this computing machine, to move, when perhaps this software program is not in the time of licensing, forbid that this software program moves in this computing machine, and warning.
A kind of software program guard method comprises: open a software program in a computing machine; Search MAC (the Media Access Control) address of this computing machine; Above-mentioned MAC Address is compared with a default MAC Address; When two MAC Address are identical, further search the hard disk sequence number of current this software program of storage; Above-mentioned hard disk sequence number is compared with a default sequence number; When two hard disk sequence numbers are identical, from a file of this computing machine, obtain the use information record of this software program; In the time can not obtaining the use information record of this software program, set up the use information record of this software program, and should store in the above-mentioned file behind the use information recording of encrypted; Judge according to above-mentioned use information record whether this software program was in the time of licensing; When reaching in this software program is in the time of licensing, allow this software program in this computing machine, to move, in the time of perhaps in this software program is not in the time of licensing, forbid that this software program moves and warning in this computing machine.
Compared to prior art; software program protection system provided by the present invention and method are protected software according to many-sided factors such as hardware device, access times and service time of user; and during each software program for execution; this system and method can upgrade the service time of this software program automatically; like this; the spendable time will constantly be updated, thereby prevent that the user from distorting system time arbitrarily.
Description of drawings
Fig. 1 is the system architecture diagram of software program protection system of the present invention preferred embodiment.
Fig. 2 is the functional block diagram of software program protection system of the present invention preferred embodiment.
Fig. 3 is the method flow diagram of software program guard method preferred embodiment of the present invention.
The main element symbol description
Computing machine 1
Software program 10
The software program protection system 11
Hard disk 12
File 120
Central processing unit 13
Search module 110
Comparison module 111
The record acquisition module 112
Module set up in record 113
Judge module 114
Update module 115
The management and control module 116
Embodiment
Consulting shown in Figure 1ly, is the system architecture diagram of software program protection system 11 preferred embodiments of the present invention.This software program protection system 11 is installed in the computing machine 1.This software program protection system 11 comprises a plurality of functional modules (describing among following Fig. 2), is used for the operation of institute's installed software program 10 in the management and control computing machine.In other embodiments of the invention, this software program protection system 11 can bind together by software program 10 claimed with it.
In addition; computing machine 1 also comprises the processing unit that is used for software program for execution protection system 11 each functional module; as central processing unit (central processing unit) 13, and the memory device that is used for storing software programmed protection system 11 each functional module, as hard disk 12.In addition, software program 10 also is stored in the hard disk 12, and the store path when promptly this software program 10 is installed is this hard disk 12.Have a file 120 in the hard disk 12, be used for some use information of logging software program 10, for example, the system time during software program 10 operations, data such as the time limit that software program 10 is authorized to use, number of times.This document folder 120 is hidden in the hard disk 12.
Consulting shown in Figure 2ly, is the functional block diagram of software program protection system 11 preferred embodiments of the present invention.This software program protection system 11 comprises searches module 110, comparison module 111, and record acquisition module 112, module 113 set up in record, judge module 114, update module 115, and management and control module 116.
Above-mentioned each functional module 110-116 is each program segment of finishing specific function, be more suitable in the implementation of description software in computing machine 1 than software program itself, so the present invention describes with module the description of software program.
Describedly search MAC (the Media Access Control) address that module 110 is used to search the computing machine 1 of current install software program 10, search the sequence number of the hard disk 12 of current storing software program 10.
Described comparison module 111 is used for the MAC Address of computing machine 1 is compared with a default MAC Address, and the sequence number of hard disk 12 is compared with a default sequence number.The MAC Address that provides when software program 10 is authorized to use is provided described default MAC Address, and described default sequence number is meant the hard disk sequence number that software program 10 is provided when being authorized to use.In the present embodiment, when being authorized to use software program 10 as if a certain user applies, this user may be required to provide the MAC Address of the computing machine that this software program 10 is installed, and reaches the sequence number of store path place hard disk when software program 10 is installed.Therefore, the MAC Address that is provided when the MAC Address of computing machine 1 is authorized to use with software program 10 is identical, and the sequence number that the sequence number of hard disk 12 is provided when being authorized to use with software program 10 is also identical, can determine that then the operation of this software program 10 in this computing machine 1 is legal.Otherwise, if above-mentioned two relatively in, it is inequality that any one comparative result is arranged, and can determine that then the operation of this software program 10 in this computing machine 1 is illegal.
It all is under the identical situation that described record acquisition module 112 is used for result in above-mentioned two comparisons, obtains the use information record of software program 10 from the file 120 of hard disk 12.In the present embodiment, at software program 10 when for the first time being installed in the computing machine 1, data such as the time limit that this software program 10 is authorized to use, number of times will be recorded in the file 120, in addition, when software program 10 moves in computing machine 1 each time, the system time of the computing machine 1 in the time of all it can being moved as operating time log in file 120.Wherein, if described record acquisition module 112 can not obtain the use information record of software program 10 from file 120, not installation and operation mistake in computing machine 1 of this software program 10 is described then.
Use information when record that module 113 is used for can not obtaining from file 120 at record acquisition module 112 software program 10 set up in described record, set up the use information record of this software program 10, and will store into behind this recording of encrypted in the file 120 of hard disk 12 in the computing machine 1.As mentioned above, comprise software program working time of 10 last time, the time limit that software program 10 is authorized to use, data such as number of times in this use information record.
Described judge module 114 is used for judging that according to above-mentioned use information record whether the working time of 10 last time of this software program is early than computing machine 1 current system time, whether current system time is allowing in the time of using, and whether the access times of this software program are within the number of times of restriction.If the result of above-mentioned judgement, illustrates then that software program 10 in this computing machine 1 is still in the time of licensing for being.Otherwise then wherein any one the result of above-mentioned judgement is not for, illustrates that then software program 10 in this computing machine 1 is not in the time of licensing.Whether can prevent the user's modification system time early than computing machine 1 current system time the working time of judging 10 last time of software program, thereby prolong the term of life of software program 10.Here need to prove, according to actual conditions, in other embodiment, current system time whether allow in the time of using and the access times of this software program whether within the number of times of restriction these two judgements can only select wherein one, only judge that promptly whether current system time is allowing in the time of using, whether the access times of perhaps only judging this software program are within the number of times of restriction.
The result that described update module 115 is used for when above-mentioned judgement is under the situation that is, upgrade service time and access times in the use information record, working time in promptly writing down with computing machine 1 current system time replacement use information, and the number of times that will be authorized to use subtracts 1.
Described management and control module 116 is used for allowing software program 10 in computing machine 1 operation under the situation that is as the result of above-mentioned judgement, perhaps when have in the above-mentioned judged result any one for not the time, forbid that software program 10 move also warning in computing machine 1.
Fig. 3 is the process flow diagram of software program guard method preferred embodiment of the present invention.
Step S10, the software program 10 in the computing machine 1 is unlocked.
Step S11 searches MAC (Media AccessControl) address that module 110 is searched computing machine 1.
Step S12, whether comparison module 111 is compared the MAC Address of computing machine 1 with a default MAC Address, identical to judge both.If both are identical, then flow process enters step S13.Otherwise if both are inequality, then flow process enters the step S18 of subsequent descriptions.Wherein, described default MAC Address is meant the MAC Address that software program 10 is provided when being authorized to use.
In step S13, search the sequence number of the hard disk 12 that module 110 searches current storing software program 10.
Step S14, comparison module 111 is compared the sequence number of hard disk 12 with a default sequence number.If both are identical, then flow process enters step S15.Otherwise, if both are inequality, the step S18 of flow process progress subsequent descriptions then.Wherein, described default sequence number is meant the hard disk sequence number that software program 10 is provided when being authorized to use.
Step S15 writes down acquisition module 112 and judges the use information record that whether can obtain software program 10 in the file 120 of hard disk 12 from computing machine 1.Comprise software program working time of 10 last time, the time limit that software program 10 is authorized to use, data such as number of times in this use information record.If can not get access to use information record, then flow process enters step S16.Otherwise if can get access to use information record, then flow process directly enters step S17.
In step S16, the use information record that module 113 is set up this software program 10 set up in record, and will store into behind this recording of encrypted in the file 120 of hard disk 12.
In step S17, judge module 114 judges that according to above-mentioned use information record whether the working time of 10 last time of this software program is early than computing machine 1 current system time, whether current system time is allowing in the time of using, and whether the access times of this software program are within the number of times of restriction.If the result of above-mentioned judgement, illustrates software program 10 in this computing machine 1 for being still in the time of licensing, then flow process enters step S19.Otherwise then wherein any one the result of above-mentioned judgement is not for, software program 10 in this computing machine 1 is described not in the time of licensing, and then flow process enters step S18.Whether can prevent the user's modification system time early than computing machine 1 current system time the working time of judging 10 last time of software program, thereby prolong the term of life of software program 10.Here need to prove, according to actual conditions, in other embodiment, current system time whether allow in the time of using and the access times of this software program whether within the number of times of restriction these two judgements can only select wherein one, only judge that promptly whether current system time is allowing in the time of using, whether the access times of perhaps only judging this software program are within the number of times of restriction.
In step S18, management and control module 116 forbids that software program 10 moves and warning in computing machine 1.
In step S19, update module 115 is upgraded service time and the access times in the use information record, and promptly with the working time in the computing machine 1 current system time replacement use information record, and the number of times that will be authorized to use subtracts 1.
Step S20, management and control module 116 allows software program 10 in computing machine 1 operation.

Claims (10)

1. a software program protection system is used for the operation of management and control software program at computing machine, it is characterized in that this system comprises:
Search module, be used to search the MAC Address of the computing machine of current this software program of installation, and search the hard disk sequence number of current this software program of storage;
Comparison module is used for above-mentioned MAC Address is compared with a default MAC Address, and the sequence number of above-mentioned hard disk is compared with a default sequence number;
The record acquisition module is used for result in above-mentioned two comparisons and all is obtaining the use information record of this software program the file in this computing machine under the identical situation;
Module set up in record, is used for setting up the use information record of this software program, and should storing in the above-mentioned file behind the use information recording of encrypted when above-mentioned record acquisition module can not obtain the use information record of this software program;
Judge module is used for judging according to above-mentioned use information record whether this software program was in the time of licensing; And
The management and control module, when being used in this software program is in the time of licensing, allow this software program in this computing machine, to move, when perhaps this software program is not in the time of licensing, forbid that this software program moves in this computing machine, and warning.
2. software program protection system as claimed in claim 1 is characterized in that described file is hidden in the aforementioned calculation machine.
3. software program protection system as claimed in claim 1 is characterized in that, described use information record comprises this software program working time of last time, time limit that software program is authorized to use and/or number of times.
4. software program protection system as claimed in claim 3; it is characterized in that; described software program be in be meant this software program last time in the time of licensing working time early than the computing machine current system time; current system time allowed in the time of using, and the access times of this software program are within the number of times of restriction.
5. software program protection system as claimed in claim 3 is characterized in that, this system also comprises:
Update module when being used in this software program is in the time of licensing, is upgraded working time and access times in the use information record, the computing machine current system time is replaced working time of last time, and the number of times that will be authorized to use subtracts 1.
6. a software program guard method is characterized in that, this method comprises:
In computing machine, open a software program;
Search the MAC Address of this computing machine;
Above-mentioned MAC Address is compared with a default MAC Address;
When two MAC Address are identical, further search the hard disk sequence number of current this software program of storage;
Above-mentioned hard disk sequence number is compared with a default sequence number;
When two hard disk sequence numbers are identical, from a file of this computing machine, obtain the use information record of this software program;
In the time can not obtaining the use information record of this software program, set up the use information record of this software program, and should store in the above-mentioned file behind the use information recording of encrypted;
Judge according to above-mentioned use information record whether this software program was in the time of licensing; And
In the time of in this software program is in the time of licensing, allow this software program in this computing machine, to move, in the time of perhaps in this software program is not in the time of licensing, forbid that this software program moves and warning in this computing machine.
7. software program guard method as claimed in claim 6 is characterized in that described file is hidden in the aforementioned calculation machine.
8. software program guard method as claimed in claim 6 is characterized in that, described use information record comprises this software program working time of last time, time limit that software program is authorized to use and/or number of times.
9. software program guard method as claimed in claim 8; it is characterized in that; software program be in be meant this software program last time in the time of licensing working time early than the computing machine current system time; current system time allowed in the time of using, and the access times of this software program are within the number of times of restriction.
10. software program guard method as claimed in claim 8 is characterized in that, this method also comprises:
In the time of in this software program is in the time of licensing, upgrade working time and access times in the use information record, with the working time in the computing machine current system time replacement use information record, and the number of times that will be authorized to use subtracts 1.
CN2010101370421A 2010-03-31 2010-03-31 Software program protection system and method Pending CN102208003A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010101370421A CN102208003A (en) 2010-03-31 2010-03-31 Software program protection system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010101370421A CN102208003A (en) 2010-03-31 2010-03-31 Software program protection system and method

Publications (1)

Publication Number Publication Date
CN102208003A true CN102208003A (en) 2011-10-05

Family

ID=44696831

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010101370421A Pending CN102208003A (en) 2010-03-31 2010-03-31 Software program protection system and method

Country Status (1)

Country Link
CN (1) CN102208003A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103577727A (en) * 2013-11-13 2014-02-12 深圳市创维群欣安防科技有限公司 Software deadline verifying method and device
CN103606086A (en) * 2013-11-05 2014-02-26 上海优思通信科技有限公司 Anti-counterfeit method of mobile intelligent terminal
CN104143053A (en) * 2013-05-08 2014-11-12 北大方正集团有限公司 Digital content protection device and digital content protection method both based on mobile storage device
CN104166809A (en) * 2013-05-17 2014-11-26 广州杰赛科技股份有限公司 Control method and system for operating information system
CN104408333A (en) * 2012-09-24 2015-03-11 江苏理工学院 Software protection device based on system-on-chip multi-core fusion
WO2015131324A1 (en) * 2014-03-04 2015-09-11 华为技术有限公司 Software security detection method, apparatus and device
CN105118018A (en) * 2015-08-17 2015-12-02 安徽大学 An image hiding method based on a video carrier and under an off-line controllable mechanism
CN105138900A (en) * 2015-07-30 2015-12-09 珠海格力电器股份有限公司 Control method and system for validity period of single-machine software
CN105653932A (en) * 2015-12-30 2016-06-08 北京金山安全管理系统技术有限公司 Software upgrading validation method and device
CN105808980A (en) * 2016-03-07 2016-07-27 深圳市新产业生物医学工程股份有限公司 Detection method and device of illegal use of software
CN106250722A (en) * 2016-08-03 2016-12-21 苏州美房云客软件科技股份有限公司 Extension method based on java remote authorization APP
CN110784606A (en) * 2018-07-26 2020-02-11 东芝泰格有限公司 Image processing apparatus, image processing system, and application start control method
CN110837627A (en) * 2019-09-27 2020-02-25 苏州浪潮智能科技有限公司 Software copyright authentication method, system and equipment based on hard disk serial number
CN111190614A (en) * 2019-12-26 2020-05-22 北京威努特技术有限公司 Software installation method and computer equipment
CN112507397A (en) * 2020-11-23 2021-03-16 中国人民解放军战略支援部队信息工程大学 Microprocessor firmware information protection method based on information encryption
CN113778559A (en) * 2021-09-15 2021-12-10 东莞新能安科技有限公司 Software security application method and device and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1346110A (en) * 2000-09-30 2002-04-24 刘耀民 Network platform based software protection and sales system
US20040059938A1 (en) * 1998-04-29 2004-03-25 Microsoft Corporation Hardware ID to prevent software piracy
CN101393586A (en) * 2007-09-18 2009-03-25 武永军 Only method for verifying computer

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040059938A1 (en) * 1998-04-29 2004-03-25 Microsoft Corporation Hardware ID to prevent software piracy
CN1346110A (en) * 2000-09-30 2002-04-24 刘耀民 Network platform based software protection and sales system
CN101393586A (en) * 2007-09-18 2009-03-25 武永军 Only method for verifying computer

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈向荣: "软件保护的软硬件方案研究与实现", 《万方学位论文数据库》 *

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104408333A (en) * 2012-09-24 2015-03-11 江苏理工学院 Software protection device based on system-on-chip multi-core fusion
CN104408333B (en) * 2012-09-24 2017-06-13 江苏理工学院 Software protection device based on system-on-chip multi-core fusion
CN104143053A (en) * 2013-05-08 2014-11-12 北大方正集团有限公司 Digital content protection device and digital content protection method both based on mobile storage device
CN104143053B (en) * 2013-05-08 2017-11-07 北大方正集团有限公司 Digital content protection apparatus and method based on movable storage device
CN104166809A (en) * 2013-05-17 2014-11-26 广州杰赛科技股份有限公司 Control method and system for operating information system
CN104166809B (en) * 2013-05-17 2017-06-16 广州杰赛科技股份有限公司 The control method and system of operation information system
CN103606086A (en) * 2013-11-05 2014-02-26 上海优思通信科技有限公司 Anti-counterfeit method of mobile intelligent terminal
CN103577727B (en) * 2013-11-13 2016-10-19 深圳市创维群欣安防科技股份有限公司 A kind of method and device of software deadline checking
CN103577727A (en) * 2013-11-13 2014-02-12 深圳市创维群欣安防科技有限公司 Software deadline verifying method and device
WO2015131324A1 (en) * 2014-03-04 2015-09-11 华为技术有限公司 Software security detection method, apparatus and device
CN105138900A (en) * 2015-07-30 2015-12-09 珠海格力电器股份有限公司 Control method and system for validity period of single-machine software
CN105138900B (en) * 2015-07-30 2018-09-25 珠海格力电器股份有限公司 Control method and system for validity period of single-machine software
CN105118018A (en) * 2015-08-17 2015-12-02 安徽大学 An image hiding method based on a video carrier and under an off-line controllable mechanism
CN105118018B (en) * 2015-08-17 2018-01-23 安徽大学 Method of Steganography based on video carrier under a kind of offline controling machine
CN105653932A (en) * 2015-12-30 2016-06-08 北京金山安全管理系统技术有限公司 Software upgrading validation method and device
CN105653932B (en) * 2015-12-30 2018-11-06 北京金山安全管理系统技术有限公司 The method and apparatus of software upgrading verification
CN105808980A (en) * 2016-03-07 2016-07-27 深圳市新产业生物医学工程股份有限公司 Detection method and device of illegal use of software
CN105808980B (en) * 2016-03-07 2019-06-11 深圳市新产业生物医学工程股份有限公司 The detection method and device of unauthorized use of software
CN106250722A (en) * 2016-08-03 2016-12-21 苏州美房云客软件科技股份有限公司 Extension method based on java remote authorization APP
CN110784606A (en) * 2018-07-26 2020-02-11 东芝泰格有限公司 Image processing apparatus, image processing system, and application start control method
CN110784606B (en) * 2018-07-26 2023-02-03 东芝泰格有限公司 Image processing apparatus, image processing system, and application start control method
CN110837627A (en) * 2019-09-27 2020-02-25 苏州浪潮智能科技有限公司 Software copyright authentication method, system and equipment based on hard disk serial number
CN111190614A (en) * 2019-12-26 2020-05-22 北京威努特技术有限公司 Software installation method and computer equipment
CN111190614B (en) * 2019-12-26 2023-12-19 北京威努特技术有限公司 Software installation method and computer equipment
CN112507397A (en) * 2020-11-23 2021-03-16 中国人民解放军战略支援部队信息工程大学 Microprocessor firmware information protection method based on information encryption
CN112507397B (en) * 2020-11-23 2023-03-14 中国人民解放军战略支援部队信息工程大学 Microprocessor firmware information protection method based on information encryption
CN113778559A (en) * 2021-09-15 2021-12-10 东莞新能安科技有限公司 Software security application method and device and electronic equipment
CN113778559B (en) * 2021-09-15 2024-06-18 东莞新能安科技有限公司 Software security application method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN102208003A (en) Software program protection system and method
KR100881025B1 (en) Apparatus and method for managing data security
CN101334825B (en) Application program management and operation system and method
US8943547B2 (en) System and method for automatically configuring application control rules
GB2465240A (en) Detecting malware by monitoring executed processes
EP3682332B1 (en) Method and apparatus for erasing or writing flash data
CN104361282A (en) Mobile terminal security protecting method and device
US5838793A (en) Controlling movement of owned parts
CN102263773A (en) Real-time protection method and apparatus thereof
CN105637521A (en) Data processing method and intelligent terminal
CN102103666A (en) Hot swap protection system and method for hard disk
CN106650464A (en) Security detection method and terminal
JP5293151B2 (en) Content protection apparatus and content protection program
JP6918269B2 (en) Attack estimator, attack control method, and attack estimator program
US20110247085A1 (en) Electronic device and method of protecting software
CN109583206B (en) Method, device, equipment and storage medium for monitoring access process of application program
CN103699681A (en) Data rollback processing method and data rollback processing device
CN112825098A (en) Data protection method and device, computing equipment and storage medium
CN109522711A (en) A kind of detection defence method, device, equipment and readable storage medium storing program for executing
KR101290852B1 (en) Apparatus and Method for Preventing Data Loss Using Virtual Machine
KR101857575B1 (en) Malicious code detection system and malicious code detecting method
CN112784261A (en) Method for program execution and corresponding system, computer device and medium
CN103366115A (en) Safety detecting method and device
CN101071396A (en) Method for setting system reset reason monitoring information and monitoring method
CN103034806B (en) Process method and the terminal of operation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20111005