CN102708310A - Registration code anti-piracy encryption method for computer software in batch production - Google Patents

Registration code anti-piracy encryption method for computer software in batch production Download PDF

Info

Publication number
CN102708310A
CN102708310A CN201210008238XA CN201210008238A CN102708310A CN 102708310 A CN102708310 A CN 102708310A CN 201210008238X A CN201210008238X A CN 201210008238XA CN 201210008238 A CN201210008238 A CN 201210008238A CN 102708310 A CN102708310 A CN 102708310A
Authority
CN
China
Prior art keywords
code
software
program
user
installation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210008238XA
Other languages
Chinese (zh)
Inventor
陈华明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SUZHOU BAIZHENG INFORMATION TECHNOLOGY CO LTD
Original Assignee
SUZHOU BAIZHENG INFORMATION TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SUZHOU BAIZHENG INFORMATION TECHNOLOGY CO LTD filed Critical SUZHOU BAIZHENG INFORMATION TECHNOLOGY CO LTD
Priority to CN201210008238XA priority Critical patent/CN102708310A/en
Publication of CN102708310A publication Critical patent/CN102708310A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to a registration code anti-piracy encryption method for feedback type copyright confirmation of computer software, and aims to solve the problem of contradiction between the fact that a registration code mechanism is bound to be used for batch production or online spreading (downloading) of software and the fact that batch piracy can be realized by purchasing a registration code. The registration code anti-piracy encryption method is characterized in that each registration code is in a multilayer group code structure and formed by combining an identity code with a plurality of check codes and check code numbers. Users can define legal identities through a public communication system, and program installation can be completed only when key passwords for program installation are acquired after checking is qualified. By the registration code anti-piracy encryption method, batch piracy can be prevented while users are allowed to install for multiple times.

Description

The anti-piracy encryption method of a kind of registration code of computer software of batch process
Technical field
The present invention relates to the encryption method of the soft appearance of computing machine, particularly relate to a kind of anti-piracy encryption method of registration code of reaction type copyright affirmation of computer software.
Background technology
Computer software is carried out encryption, to prevent illegal copies and use, is the effective way of protection software copyright; At present; The basic skills of software cryptography has following several kinds: floppy disk encryption method, plug-in card enciphered method, dongle enciphered method; Password encryption method and hidden code method etc., but encrypted antitheft version effect is not ideal.June 14 nineteen ninety-five open day of Chinese invention patent " computer software encryption protecting method and device "; Publication number CN 1103728A, application number 941043991 just disclose a kind of software encryption and protection method, adopt following steps: initial value AO and cryptography key data B, D, E deposit in the computer software of computer-side respectively and among the ROM of special calculator; At first obtain a random number X1 by computer-side X1 is sent into special calculator; Obtain Y1 by encryption algorithm F l, again Y1 is sent into computing machine, obtain X2 by decipherment algorithm F2; Computer software comparison X1 can move protected computer software when consistent with X2, otherwise shuts down.A special calculator cooperates a cover protected computer encryption software to use.Because the normal function of software is finally all accomplished by main frame, software code finally all will get into mainframe memory, thereby might be intercepted and captured the possibility of deciphering; Therefore do not reach the purpose of software protection; And the employing special calculator, make the software cryptography cost up to be not easy to operation.
And for example, Chinese invention patent " the soft auspicious anti-piracy encryption method of computing machine " is day on May 5th, 1999 openly, and publication number CN1215867A, application number 98124924.8 also disclose a kind of software encryption and protection method, adopts following steps;
After software is installed beginning, program written-out program numbering a0, supplemental characteristic b0, random data c0,
The user is with program number a0, and supplemental characteristic b0l random data c0 sends software company to;
The program of the affirmation user software copyright of the computer system of software company is used program number a0, and uses the copyright identification computing method A of software company's definition to calculate another group supplemental characteristic bi; The supplemental characteristic b0 that sends with the user more then does consistent, and whether scrutiny program number a0 and in the numbering database of software company, registered, consistent with bi like b0; And a0 did not register; Then the process of copyright affirmation is proceeded, and as not so, then exports to the corresponding information of user and interrupts copyright and confirm process;
The random data c0 that the copyright affirmation program of software company sends with program number a0 and user program uses the decipherment algorithm B of software company's definition to calculate close spoon data dl, and exports to the user;
User program is with program number a0 random data c0; Use the decipherment algorithm of software company's definition to calculate the close spoon of another group data d0; And whether the close spoon data d0 that calculates of inspection is identical with the close spoon of data dl that program from software company sends, and as identical, then copyright is confirmed successfully; As inequality, then interrupt operation.
Though the anti-piracy encryption method before foregoing invention has been reformed has produced many positive effects.But, be that parameter is carried out superencipher and generated restorative mounting disc with the computer-internal hardware environment thereafter because the installation and operation first time of software is usufructuary unique process of confirming computer software.If validated user is because the destruction that computer virus causes software environment; Need reinstall all softwares; Then can only use the restorative encryption mounting disc that generates when installing for the first time; Brought serious limit to the user: promptly, if validated user because the HardwareUpgring of computing machine, the parameter of computer-internal hardware environment changes; Then software can't continue to use or reinstall, and causes the validated user own computer hardware of can not upgrading. and this point is unpractical in 18 months today with regard to update of computer hardware.If said method use to improve fragrant case, that is, the restorative mounting disc that superencipher generates allows the user to change the hardware environment parameter, the restorative mounting disc of superencipher that then generates behind the installation and operation first time of software, the piracy sources that needs of bootlegger just.The bootlegger can the restorative mounting disc of unconfined pirate superencipher, and said software is installed on the different computing machines.Therefore do not reach the purpose of software protection.A new contradiction that Here it is.
In addition, present computer software both domestic and external by piracy more serious be: to the piracy of the registration code that begins to install or need import when bringing into operation of software.This mainly is because there is a large amount of shareware on the net in being widely used of internet.Everybody goes downloaded software to a website, uses different registration codes, and one of them registration code just is disclosed will produce a large amount of pirate phenomenons.In addition, a large amount of software products as Microsoft produces owing to can not realize that each software copy all recompilates, therefore, can only use the mode of existing registration code to prevent piracy.This registration code mechanism comes down to have in the software check registration code whether to meet the program of former setting rule, no matter produces what software copies, produces what registration codes, and software copy all is the same, and different is registration code.But as long as the version of software is identical, all software copies of unlatching that any one legal registration code can be successful.The bootlegger only need buy once cover copyrighted software or buy a registration code and can realize pirate in batches.
How solving the contradiction of " the online download of the batch process of software or (shareware) is propagated and must be used above-mentioned registration code mechanism and just can realize piracy in batches through buying a registration code ", is the key issue of software anti-pirate.
Aforesaid publication number is the Antipirate computer software encryption method of CN1215867A; Basically can solve above-mentioned contradiction; But disposable feedback registration mode; Brought the new problem of the recovery disk of necessary use superencipher, if the recovery disk that prevents superencipher is by piracy, must be with encryption parameter and concrete computer hardware parameter correlation.Brought the contradiction of the recovery disk of above-mentioned HardwareUpgring and superencipher thus.
Now, the WINDOWS XP operating system in market, the activation technique of use is exactly after installation, carries out superencipher, and encryption parameter is hardware-related, has produced bad effect.
Summary of the invention
The purpose of this invention is to provide a kind of anti-piracy encryption method of being convenient to operate of computer software registration code that can repeatedly install that can realize limited number of times that does not rely on concrete computing machine type.
Scheme of the present invention realizes according to the following steps;
The basic structure of registration code: each registration code all is that 1, one multilayer group code of multilayer group code structure structure 1 is printed on made of paper wait on the flat carrier or the form through electronic document provides (transmissions) to the user.
Each multilayer group code structure 1 all stores in the computer inquery system database as a message unit, transfers this information for the consumer and verifies that guest's puppet obtains the encrypted message of feedback.
Described multilayer group code structure 1 roughly has two kinds of multi-form structures: normal structure and simplified structure.
Normal structure is that an identity code 9 and a plurality of check codes 10 and check code thereof are numbered 12 combination.
Simplified structure is to omit the combination that the in certain sequence a plurality of or method of many groups of identity code 9 or a group is arranged identity coding 11 and check code numbering 12.
Identity code 9: be meant software producer before software dispatches from the factory in certain sequence or number or pattern or letter or the literal or the above-mentioned mixed form of the unique identity of this software of embodiment that generates for each software of method, as long as can be masses' understanding and can be with the clear statement of language.It will be labeled in made of paper the grade on the flat carrier surface as " plain code ".Represented the Different Individual of software." head " as registration code.It is the important component part of registration code.
Check code 10: be meant that software producer can obtain at random before software dispatches from the factory also can be to use fixed arithmetic to generate one group in certain sequence a plurality of or method is arranged is used for the user or businessman feeds back to number or pattern or letter or literal or the above-mentioned mixed form that software producer is used for the verification registration code true and false, as long as can be masses' understanding and can be with the clear accurately statement of language.It will be labeled in made of paper the grade on the flat carrier surface with identity code 9 as " private mark ".The making of " private mark " is on check code, to coat with opaque coverture covering or with opaque coating; Coverture can be materials such as the scraps of paper, plastic foil, sheet metal; Also can be with the verification code printing at the coverture back side, to award and cover a being covered thing then on above-mentioned surface, its requirement is that means such as the coverture or the thing of coating can be torn by hand, scrape off are opened; It is irreclaimable generally opening the back coverture, opens the back check code and knows and can know.Check code 10 also can be " plain code ".If whether " plain code " was then in use checked by this check code of user oneself mark.Because each check code 10 can only be checked use once as requested, the numbering of the check code 10 that oneself warp was checked (or numbering combination) also will be an information that dynamically forms, and need when checking, submit to next time.Check code 10 is that the situation of " plain code " is generally said, whole registration code is the form transmission through electronic documents such as Emails.
Check code numbering 12: in certain sequence or mode obtain with check code 10 or identity coding 11 one to one; Be used to mark the Different Individual of distinguishing check code 10 and identity coding 11; Head-stamp is at the check code of its required mark other number or letter or literal or pattern, and this is one group " plain code ".
Identity coding 11: be meant that manufacturer can obtain at random before software dispatches from the factory one group in certain sequence a plurality of or method is arranged is used for the user or businessman feeds back to number or pattern or letter or literal or the above-mentioned mixed form that software producer is used for the verification registration code true and false, as long as can be masses' understanding and can be with the clear accurately statement of language.It will be labeled in made of paper as " private mark " and wait on the flat carrier surface.With check code 10 identical identity codings 11 also can be " plain code ".Different with check code 10 is: the coding of identity coding 11 is longer, and a coding promptly can be represented this software identity.Coded system is equal to the digital phone anti-counterfeiting technology.
Coverture can locally cover.And check code 10 is matching used with identity code 9, generally very short 5 flies digital getting final product.Identity coding 11 can be regarded as identity code 9 and has been combined into one with check code 10, arranges according to the mode of check code 10.
Obviously, the needed digital quantity of the mode of identity coding 11 is more, and the hard drive space of the required computing machine that takies is bigger, not as check code 10 and identity code 9 matching used modes.
Can either prevent that the fake producer is pirate in batches, allow the user repeatedly to install again.Multilayer group code structure 1 is the technological means of a key.It also is the core texture of the anti-piracy encryption method of this software registration sign indicating number.
Utilize the reaction type copyright to confirm to realize the anti-piracy encipherment protection to software, the process that described copyright is confirmed may further comprise the steps:
User report identity code 9, whether the Help Center opens database, check identity code 9 and exist, and the number of times whether this part software has been inquired about surpasses limits the quantity of, if identity code 9 is correctly then allow user inquiring.At first put question to the user by service centre; Which is opened for its check code 10, as answer correct then please free any check code do not opened as yet 10 of user, open it; And with check code numbering 12 and check code 10 report service centres thereof; If correct, put on record in the center, and inform that user software continues the key cipher of installing.
By oneself open which check code 10 and the check code newly opened 10 whether correct and accomplish the two-stage check and correction and judge.Inquiry times judges whether that the accuracy of validated user is high more more.This verification method is the two-stage trap to the bootlegger in fact; Two or more false article (identical registration code) have been made if there is the bootlegger to be directed against same identity code 9 softwares; These two softwares are in different sale, if two places all the someone use and for the key cipher of the installation that obtains software searches because which check code of examination and checked which check code and have randomness earlier; Identical fully probability is minimum; Find that like the Help Center 9 of same identity code open the check code numbering that searches and put on record not simultaneously, please its number of verification again, if this check code also is genuine; Then can judge this ID by piracy, commercially available all is pirate fake products.If false, can only explain that then the product of inquiry is illegal user for the second time, it searches not each case of content.(no matter whether check code 10 is " plain codes ")
Yet only such scheme can not prevent pirate.Because the bootlegger can disclose the key cipher of the registration code of going up the fan and feedback and sell together, form complete piracy.
Therefore; During the feedback key cipher; Should also have a relevant parameter of state during with concrete the installation, this parameter can be to install or time of inquiry, computer hardware information etc., but the bootlegger can be with set-up time, computer hardware information also the purchase bootlegger of announcement together.The random data C that generates in the time of can only being installation procedure through this parameter of research.
Therefore; Complete scheme is: the random data C that the identity code 9 in the multilayer group code structure 1 and check code 10 generate when also having check code numbering 12 and the installation procedure of check code 10; Add up at least 4 parameters to carry out defining of user's legal identity through the feedback query service system that producer provides through public's communication system such as phone, website etc. the user; And when examination is qualified, feed back to the key cipher that inquiry's continuation program is installed by inquiry service.The user imports the installation of the program of could accomplishing behind the key cipher.
In inquiry service, system defines through the information of user input is carried out copyright, legitimacy that can judges.If the user is legal, what then system will be with in above-mentioned 4 parameters is all or part of as parameter, through an algorithm AA, calculates key cipher D.In user's computer, also import all or part of in above-mentioned 4 parameters and key cipher D by the user.Program will be with in above-mentioned 4 parameters all or part of as parameter, through an algorithm AB, calculate key cipher with.Whether the comparison key cipher is with identical with key cipher D or meet a definite relation.As the foundation that judges whether to continue to install.
Described public's communication can be; Modes such as phone, mobile phone (containing mobile communication equipment online, short message), internet (containing the information household appliances online), fax.With present information Antiforge inquiry network class seemingly.
In order to reduce pirate possibility, the affirmation process of the registration code of software and key cipher should be placed on the beginning of program installation, just rather than program check registration code and key cipher after installing fully.If just check registration code and key cipher after program is installed fully, the bootlegger can adopt normal mounting and the distinctive points of the installation of failing, the process completion piracy that the mode that adopts file to replace was had mercy on and checked registration code and key cipher.This point WINDOWS XP is exactly an example by piracy.
For the user in that to use public's communication device to carry out authentication query more convenient, 4 above-mentioned parameters should all be arabic numeral, because English, Chinese character, figure, symbol are inconvenient when Help by Phone.
In order to increase bootlegger's the difficulty that cracks; Main in order not allow the bootlegger that the computing formula of algorithm AA or algorithm AB is found; The key cipher D of feedback is the part of a link digitals; And key cipher D only need to calculate head, afterbody or the middle several figure places of key cipher DA identical or meet the related law of agreement with user program, can verify success.(this method is effectively software track to be used and the method for analyzing data to be cracked above-mentioned encrypting and decrypting algorithm.)。For example: key cipher D is " 234567 ", and 4 above-mentioned parameters are taken to as parameter in the computing formula of algorithm AB, calculates, and the result who obtains is " 88234567 ".Key cipher D and key cipher DA back 6 identical, even if check successfully.Owing to be part comparison verification, even the bootlegger collects many true key ciphers and parameter also can't the regretional analysis computing formula.Computation process is followed the tracks of,, therefore also be difficult to know algorithm AB owing to relate to the intercepting of big data.
Aforementioned algorithm AA or algorithm AB can be identical, also one-to-one relationship can be arranged.
In order to increase bootlegger's the difficulty that cracks; In the code of the installation function in installation procedure of the key in the above-mentioned software package (as: SETUP. EXE and worker NSTALL. EXE) or the computer program, increase to the code of program own especially in the program to the registration code analysis and judgement, generate the check code of the function code of part such as random data C.Concrete grammar is: in installation procedure (as: SETUP. EXE and INSTALL. EXE) program composition, increase the machine code in the key procedure section that is generated as the machine code (ASCII character) that can move (ASCI I sign indicating number) is backed up or encrypted backup.In installation procedure, increase a place or many places with encrypted backup (or backup) decipher then with program in the actuating code that compares of the code of corresponding operating part.
If (machine code (ASCI worker's sign indicating number) is incomplete the same for the code of corresponding key component in code and the program of the key component after the deciphering; It is different before the partial code that shows program has dispatched from the factory with software; The possibility that exists partial code to lose efficacy, then installation procedure stops installment work.The encrypted backup of the code of key component can leave installation procedure inside in, also can leave in other computer programs in the routine package.With encrypted backup (or backup) decipher then with program in the code of corresponding operating part compare; Should compare with the code of operating part in the internal memory, and the backup source of encrypted backup also can be the existence form in internal memory behind the running software.
Increase the encrypted backup and deciphering contrast program segment of the code of the key function part in the installation procedure (as: SETUP. EXE and INSTALL EXE), can effectively stop the mode of destroying the registration code check or increasing jump instruction by force to destroy the pirate method of registration code check.Realize that installation procedure changes once being destroyed or increasing, and can not accomplish the purpose of installation behavior.
In sum, if the bootlegger can not be with modification of program, or the random data C that control generates is one or more fixed numbers, and then the bootlegger can't accomplish pirate work.
The pirate method of computer software has multiple means.Said method can prevent effectively that the mode that the bootlegger usurps registration code from carrying out piracy.Remaining pirate method mainly is that legal installed software is directly copied.
As improvement of the present invention, the method that the present invention adopts can also adopt following method to prevent to adopt the mode installation and operation software with direct copy after software is installed successfully.
If not operation system software; When starting operation, the numbering to operating system demand operating system, and with oneself compares through the numbering of the operating system of record in installation process; Or whether the inspection machine condition code is consistent with the machine characteristic sign indicating number that in installation process, is recorded in the software; Like unanimity, then normal the startup moves, like inconsistent then interrupt operation.
If operating system software, when starting operation, operating system inspection machine condition code whether with installation process in the machine characteristic sign indicating number that is recorded in the operating system software whether consistent, like unanimity, then normal the startup moves, as inconsistent, then interrupt operation.
In order to increase bootlegger's the difficulty that cracks; Above-mentioned software is in installation process; Should on hard disc of computer, increase some parameter tags (as increase software features, version information etc. in the BOOT district); Or on system file, especially increase the special character mark of several bytes on the fixed position of the glue file of the system file of operating system.The otiose space that yes in these system files.As: relate to the text data part that marks copyright information.And do not have described special marking, program can not move or can not normally move.Like this, program is non-through installing, and is out of use.
For the ease of consumer inquiry, should print on the carrier of registration code be provided with can with the means of communication of telephone number and the computing machine network address or the mobile phone (WEB or short message mode) of computer recognition system database communication.
Handle because improper use has caused the part of software to damage for the ease of the consumer; Installation procedure can generate the program backup of restorative installation in installation process; Promptly; Generate the routine package that a restorative covering of software systems is installed, be used for programming system spreadabilities all or that part is important, especially executable program are upgraded.Whether described restorative installation procedure needs all important " secret marks " of inspection before installation, legal with the recovery of confirming program.This restorative program does not generate the copyright information of " secret mark " property.General is that program and the preliminary examination parameter used are backed up.This method can reduce the number of times that the user uses registration code.Under the king-sized situation in present hard disc of computer space.Said method can recover impaired system fast, easily.When the legal upgrading of user, software company also can use said method, for the upgrading user provides the AKU that does not need registration code.
The present invention has reformed the anti-piracy encryption method of computer software.Can know that by above-mentioned characteristic multilayer group code structure 1 can realize the limited repeatedly inquiry of a copyright affirmation sign, can effectively stop the pirate in batches possibility of bootlegger.Simultaneously the copyright on open internet is confirmed inquiry mode, also because the registration code that copyright is confirmed is a sandwich construction and do not worry that the enumerative technique of network hacker attacks.This is because the existence of identity code 9 is arranged, and we can limit on the internet the number of times of the illegal inquiry that same identity code 9 is carried out.(because modern hacker can hide the IP address of oneself easily.Whether the query requests in the internet legal, whether be that program can't be judged in inquiry.Therefore do not have the existence of identity code 9, we can't limit inquiry illegal, malice.) in addition, the auxiliary anti-piracy means of above-mentioned other.Can realize the mode of batch process or network download (sharing) is carried out effective encryption of the computer software of sale in batches.Stoped the pirate in batches possibility of bootlegger.Be that low being convenient to again of cost operated.
The increase that said method also can combine to use at present often is to the method for registration code checkout procedure protection and the method and the means such as encrypting registration method of program in system that prevent directly software copy; Common application realizes more effective copyright protection on a kind of software.All be the programmer of computer encipher (copyright protection), can easily expect and accomplish.Also belong to technical scheme disclosed by the invention.
Description of drawings
To combine accompanying drawing and embodiment that the present invention is done further explain below;
Fig. 1 for of the present invention be the registration code of characteristic with multilayer group code structure.
Fig. 2 is that copyright of the present invention is confirmed process flow diagram.
Embodiment
As shown in Figure 1, each registration code (promptly being a multilayer group code structure 1.) is made up of three parts.Identity code 9 and check code 10 and check code numbering 12. thereof also comprise explanatory note 3, operation instruction 20
As shown in Figure 2, the user is with identity code 9 and check code 10 and check code numbering 12 thereof, the random data C of generation when move together with installation procedure.Deliver in the computer system of software company with the mode of automatic or manual through communication line; Automated manner is to the computing system of software company and client's computernetworking; At this moment the server of user program auto logging software company; Pass by corresponding data transmission then; Manual mode is to the user of non-networking and computer software company, can data transfer be gone over (as: cell phone, mobile phone short message, fax etc.) through mode mutual data transmissions such as phones or with the mode of other public's communication.
The program of the affirmation user software copyright of the computer system of software company or server uses identity code 9 and check code numbering 12 to be parameter; And the copyright recognition method AS that uses software company's definition calculates check code 10 (or go out corresponding check sign indicating number 10 through the corresponding database retrieval and inquisition); And the check code 10 that the supplemental characteristic that calculates and user program pass over made comparisons, judge whether unanimity, as inconsistent; Then export corresponding error message, finish copyright and confirm process; Like unanimity, then the copyright of software company is confirmed identity code 9 that the program checkout user program sends whether oneself is installed the number of times restriction through surpassing.If surpass the number of times restriction is not installed; The copyright affirmation program of software company uses random data C that the user sends and identity code 9, check code numbering 12, check code 10 be parameter, uses the deciphering computing method AA of software company's definition to calculate close spoon of data D.Computing method comprise the computing formula and the computing method of mathematics or non-mathematics and mathematics and non-mathematical combination, also comprise the corresponding form of database of software company's definition, then the program number of this cover software are registered and record.Close spoon data D and the corresponding descriptive information of replying are exported to the user's computer system as feedback information, or the user of alternate manner announcement (writing down the number of times of installing simultaneously).The user is with identity code 9, check code numbering 12, check code 10 and the close spoon of feedback information data D loading routine.This cover self-defining computing method AB of software company in software calculates the close spoon of another group data DA, and whether program will be checked these two groups close spoon data D and DA the same or meet predefined mutual relationship between the two.If confirmation continues to accomplish and installs.In the installation process, remove application program is installed, in hard disk or specific system file, increase copyright information simultaneously.When using under each use of this program or the predetermined condition above-mentioned copyright information is checked, do not quit work, point out relevant copyright information when meeting.
If it is wrong that copyright is confirmed to check, program will think that copyright confirms success, and program will be made and re-enter close spoon data or make copyright again and confirm or withdraw from and install or out of service etc. handle accordingly, demonstrate corresponding prompt information.
In addition, after software copyright is confirmed successfully, program will be overlapped the label information of doing the own success of software copyright affirmation and can normally moving in one or several file of software at this, can write down the numbering of the operating system of this computer system simultaneously.Label information can be recorded in the newly-built file.When other software programs of not operation system start operation; Need be to the numbering of operating system demand operating system; And with software document in the numbering of the operating system of storing make comparisons, whether oneself is copied in another computer system with inspection software, if the numbering of operating system is correct; And in the software document software stored copyright confirm oneself success and the label information that can normally move etc. also all complete and correct, software will be accomplished the process that starts and move normally.If program finds that the numbering of operating system is incorrect, perhaps software copyright confirm oneself success and the label information that can normally move etc. imperfect or incorrect, software program will stop to start and be out of service.
If institute's installed software is an operating system, also need be recorded in the machine characteristic sign indicating number of this computer system in the software of operating system.
In order to prevent software, and, can use the mode of machine characteristic sign indicating number that the software of operating system is encrypted in order to prevent that the mode with direct copy from changing the numbering of operating system with the mode installation and operation operating system of direct copy.This machine characteristic sign indicating number can use a computer write time of hard disk partition table of the distinctive characteristic of every computing machine and hard disk in the hard disk partition table of hard disk of system, or uses these data are carried out the data that obtain after some computings.
This machine characteristic sign indicating number also can use to the mode of making numbering among the ROM of the dress BIOS on the mainboard of the hardware system of each computer system such as CPU or computer system etc., can increase instruction and the different numberings of the numbering of an inquiry CPU or ROM in the CPU of each computer system or in the program among the ROM of dress BIOS.Can in the chip of CPU, increase a small-sized programmable read only memory PROM; Be used for storing the numbering of this cpu chip; And a security bit that prevents the numbering of the content among this PROM and this CPU is rewritten is set, cpu chip make last, can the numbering of CPU be write among this PROM; And security bit programmed, change the numbering of CPU to prevent the unauthorized person.
So just can make the hardware system of each CPU or each computer motherboard and each computer system that the unique numbering of oneself is all arranged.Confirm that in installing operating system and the copyright of making the operation system successfully the back program will be overlapped the label information of doing the own success of software copyright affirmation and can normally moving in one or several file of software at this; And write down the machine characteristic sign indicating number of this computer system, also can these information be recorded in the newly-built file.When each startup and operation system, whether operating system inspection machine condition code is correct, whether changed a computer system with inspection; If the machine characteristic sign indicating number is correct; And other label information is also all complete and correct, and operating system will be accomplished process and the normal operation that starts, and the user can use normally; If the machine characteristic sign indicating number is incorrect; Perhaps other label informations are imperfect or incorrect, and the program of operating system will think to have changed a computer system, and operating system will stop to start and is out of service.
Other softwares of not operation system also can use the mode of machine characteristic sign indicating number that its software is encrypted, and it is similar that its method of encrypting and the numbering of using operating system are carried out method of encrypting to its software.
When the software systems of user's computer system are suffered accidental destruction; And when operating system software also is damaged, or the user changed the hardware of computer system, or the user is when having changed computer system; In the time of perhaps need reinstalling operating system owing to the other reasons user; The copyright that the user can use still untapped check code 10 in the registration code to carry out above-mentioned software is confirmed process, and after copyright was confirmed successfully, close one by one spoon of data D was used for reinstalling of software with the feedback information of acquisition.
The registration code of one cover software can be done repeatedly copyright and confirm that each check code 10 can only use once.

Claims (7)

1. the anti-piracy encryption method of the registration code of the computer software of a batch process is characterized in that:
The registration code of computer software is a multilayer group code structure 1;
When the user installs computer software each time; At least 4 parameters such as random data C that generate in the time of need the identity code in the registration code 9 and check code 10 and check code numbering 12 thereof and program being installed; Feed back to the computer inquery service system of producer through public's communication system, carry out defining of user's legal identity; If user's legal identity define success; Inquiry service will be with in above-mentioned 4 parameters all or part of as parameter; Calculate key cipher D through an algorithm AA, and will be used for the key cipher D that the continuation program installs through public's communication system and feed back to the user;
In user's computer; Also number all or part of in 3 parameters such as 12 by user input and aforementioned identical identity code 9, check code 10 and check code thereof; And key cipher D; At least 4 parameters such as random data C that generate when software will be installed with all or part of and software in above-mentioned 3 parameters through an algorithm AB, calculate key cipher DA as parameter;
Whether installation procedure comparison key cipher with identical with key cipher D or meet a definite relation, as the foundation that judges whether to continue to install, compare successfully after, could accomplish the installation of program.
2. like the described method of claim I, it is characterized in that: multilayer group code structure 1 is that an identity code 9 and a plurality of check codes 10 and check code thereof are numbered 12 combination.
3. like the described method of claim I; It is characterized in that: calculating the key cipher D that obtains through algorithm AA is the part of a link digitals; And key cipher D only need to calculate head, afterbody or the middle several figure places of key cipher DA through algorithm AB identical or meet the related law of agreement with user program, can verify success.
4. the method for claim 1 is characterized in that: in the code of the installation function in installation procedure or computer program, increase the check code to the critical function code of program own;
Just in installation procedure program composition, increase the machine code in the key procedure section that is generated as the machine code that can move is backed up or encrypted backup; In installation procedure, increase a place or many places with encrypted backup (or backup) decipher then with program in the actuating code that compares of the code of corresponding operating part.
5. the method for claim 1; It is characterized in that: installation procedure can generate the program backup of restorative installation in installation process; Backup is kept on the hard disk, can be used for, especially 9 lid property renewals of executable program all or that part is important to programming system.
6. the method for claim 1; It is characterized in that: software is in installation process; On hard disc of computer, increase some parameter tags; Or on system file, especially increase the special character mark on the fixed position of the glue file of the system file of operating system: and do not have described special marking, program can not be moved or can not normally move.
7. the method for claim 1, it is characterized in that: after described software was installed successfully, it adopted following method to prevent to adopt the mode installation and operation software with direct copy:
If the not operation system software, when starting operation, the numbering to operating system demand operating system; And with installation process in oneself compares through the numbering of operating system of record; Or whether the inspection machine condition code is consistent with the machine characteristic sign indicating number that in installation process, is recorded in the software, and like unanimity, then normal the startup moves; As inconsistent, then interrupt operation;
If operating system software, when starting operation, whether whether operating system inspection machine condition code consistent with the machine characteristic sign indicating number that in installation process, is recorded in the operating system software, and like unanimity, then normal the startup moves, as inconsistent, and then interrupt operation.
CN201210008238XA 2012-01-12 2012-01-12 Registration code anti-piracy encryption method for computer software in batch production Pending CN102708310A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210008238XA CN102708310A (en) 2012-01-12 2012-01-12 Registration code anti-piracy encryption method for computer software in batch production

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210008238XA CN102708310A (en) 2012-01-12 2012-01-12 Registration code anti-piracy encryption method for computer software in batch production

Publications (1)

Publication Number Publication Date
CN102708310A true CN102708310A (en) 2012-10-03

Family

ID=46901066

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210008238XA Pending CN102708310A (en) 2012-01-12 2012-01-12 Registration code anti-piracy encryption method for computer software in batch production

Country Status (1)

Country Link
CN (1) CN102708310A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104572850A (en) * 2014-12-17 2015-04-29 北京可思云海科技有限公司 Method for generating registration number
CN105224829A (en) * 2014-06-11 2016-01-06 威纶科技股份有限公司 Embedded system and content protecting method
CN106982210A (en) * 2017-03-28 2017-07-25 联想(北京)有限公司 A kind of data download method and electronic equipment
CN109968359A (en) * 2019-03-28 2019-07-05 台州九牛慧联机器人技术有限公司 A kind of industrial robot control system
CN111164593A (en) * 2019-12-27 2020-05-15 威创集团股份有限公司 Registration authorization method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1369809A (en) * 2002-01-14 2002-09-18 张国柱 Anti-piracy encryption method for register code of computer software
CN1598781A (en) * 2003-09-15 2005-03-23 英业达股份有限公司 Software pretection method and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1369809A (en) * 2002-01-14 2002-09-18 张国柱 Anti-piracy encryption method for register code of computer software
CN1598781A (en) * 2003-09-15 2005-03-23 英业达股份有限公司 Software pretection method and system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105224829A (en) * 2014-06-11 2016-01-06 威纶科技股份有限公司 Embedded system and content protecting method
CN105224829B (en) * 2014-06-11 2017-12-08 威纶科技股份有限公司 Embedded system and content protecting method
CN104572850A (en) * 2014-12-17 2015-04-29 北京可思云海科技有限公司 Method for generating registration number
CN104572850B (en) * 2014-12-17 2017-12-05 鞠秋萍 A kind of generation method of herd number
CN106982210A (en) * 2017-03-28 2017-07-25 联想(北京)有限公司 A kind of data download method and electronic equipment
CN106982210B (en) * 2017-03-28 2021-01-15 联想(北京)有限公司 Data downloading method and electronic equipment
CN109968359A (en) * 2019-03-28 2019-07-05 台州九牛慧联机器人技术有限公司 A kind of industrial robot control system
CN111164593A (en) * 2019-12-27 2020-05-15 威创集团股份有限公司 Registration authorization method and system

Similar Documents

Publication Publication Date Title
CN101689237B (en) Activation system architecture
US7146645B1 (en) Dedicated applications for user stations and methods for downloading dedicated applications to user stations
US8683579B2 (en) Software activation using digital licenses
CN1276319C (en) Method for securing electronic device, security system and electronic device
US5222134A (en) Secure system for activating personal computer software at remote locations
EP1443381B1 (en) System and method for secure software activation with volume licenses
US9898587B2 (en) Software protection using an installation product having an entitlement file
CN100342296C (en) Method for realizing computer software intruder preventing edition based on confidence computation module chip
US20010051928A1 (en) Protection of software by personalization, and an arrangement, method, and system therefor
US7134016B1 (en) Software system with a biometric dongle function
US20060106729A1 (en) Method and apparatus for restricting use of a computer program
CN101589398A (en) Upgrading a memory card that has security mechanisms that prevent copying of secure content and applications
CN100515134C (en) Mobile phone software encryption and verification method
US11163859B2 (en) Content protection via online servers and code execution in a secure operating system
JPH10313309A (en) System for authenticating legitimate execution of prescribed service class by application under framework of international cryptology
US20090287917A1 (en) Secure software distribution
CN107832589B (en) Software copyright protection method and system
CN102708310A (en) Registration code anti-piracy encryption method for computer software in batch production
CN103971034A (en) Method and device for protecting Java software
US6651169B1 (en) Protection of software using a challenge-response protocol embedded in the software
CN1369809A (en) Anti-piracy encryption method for register code of computer software
CN100410831C (en) Random binding software installing method
CN112286553B (en) User lock upgrading method, device, system, electronic equipment and storage medium
CN1584771A (en) Software encrypting method
JP2008022189A (en) Electronic application method using virtual storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20121003