CN103902856B - Software protecting system and method in virtual environment - Google Patents
Software protecting system and method in virtual environment Download PDFInfo
- Publication number
- CN103902856B CN103902856B CN201210576639.5A CN201210576639A CN103902856B CN 103902856 B CN103902856 B CN 103902856B CN 201210576639 A CN201210576639 A CN 201210576639A CN 103902856 B CN103902856 B CN 103902856B
- Authority
- CN
- China
- Prior art keywords
- numbering
- key
- software
- key numbering
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims description 26
- 230000004913 activation Effects 0.000 claims description 8
- 238000009434 installation Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 230000013011 mating Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000010076 replication Effects 0.000 description 1
- 230000003362 replicative effect Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 239000011800 void material Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a software protecting system in a virtual environment. The software protecting system in the virtual environment is used for protecting software in the virtual environment. The software protecting system comprises a capturing module, a processing module, a key number library, a receiving module, a comparison module and an operating module, wherein the capturing module is used for obtaining a corresponding virtual IP and a router IP when the software is in the virtual environment, the processing module is used for combining the virtual IP obtained through the capturing module with the router IP obtained through the capturing module so that a lock head number can be obtained, a plurality of groups of key numbers are stored in the key number library, the receiving module is used for receiving the lock head number generated by the processing module and loading the groups of key numbers in the key number library, the comparison module is used for comparing the received lock head number with the groups of loaded key numbers and obtaining the corresponding key number in the groups of key numbers according to the lock head number, and the operating module is used for comparing the key number obtained by the comparison module with a preset key, so that whether the software needs to be run or not is determined.
Description
Technical field
The present disclosure generally relates to virtual environment field of software protection, more particularly, to a kind of software protection system in virtual environment
Method for protecting software in system and virtual environment.
Background technology
With scientific and technological progress, user carries out data storage or the technology of execution application program through virtual environments such as high in the clouds
Increasingly mature, high in the clouds technology has become scientific and technological product indispensable now.
The use of past software generally all uses in the computer installation of user side, because the intelligence that software is developer is tied
Crystalline substance, therefore developer all can add protection device for the software of oneself exploitation, it is to avoid the software of arduous exploitation suffers that piracy uses.
Existing main flow resist technology has binding hardware information and combines third party's hardware etc..Binding hardware information is to work as software
During activation, the configuration processor in software can read the computer hardware information belonging to user side in advance, and such as central processing unit is compiled
Code, hard disk sequence number etc., if configuration processor reads the computer hardware information belonging to correct user side, will authorize this user
Using this software.And be when user buys a certain software with reference to third party's hardware, provide such as Key Pro (soft with product
Part protection device), when user enables this software, configuration processor is read the information in Key Pro in advance, if information is correct
This user can be authorized to be continuing with this software.By said method, the software that can protect arduous exploitation is not by unwarranted use
Family is pirate to be used.
With the arriving in high in the clouds epoch, software developer gradually uploads itself product in the environment of high in the clouds, then foundation
The payment state of user provides different degrees of service.But in the environment of high in the clouds, computer hardware information can be imitated easily
True and false make or be replicated and shift, and the main frame that high in the clouds environment is used is not fixed, and does not also allow developer's main frame beyond the clouds
On insert individual hardware unit such as Key Pro.So will result in the software in the environment of high in the clouds easily suffer unwarranted
User is pirate to be used.
Therefore, a kind of technical method improving the problems referred to above, actually problem in the urgent need to address at present how are developed.
Content of the invention
Present invention aim at solving the above problems, provide the security system for software in a kind of virtual environment and software protection
Method, it can prevent the software pirate in virtual environment from using, and be copied illegally and flow to outward the ground beyond virtual environment
Side uses.
In order to solve the above problems, the present invention provides a kind of security system for software in virtual environment, in order to guard bit
Software in virtual environment.Security system for software includes:Acquisition module, processing module, key numbering storehouse, receiver module, ratio
To module and operation module.Acquisition module is when described software activation, obtains described software phase in described virtual environment
The virtual IP address (Internet Protocol) answered and an accessor.Processing module is in order to obtain described acquisition module
Described virtual IP address and accessor be combined as one tapered end numbering.Key numbering stock contains plural groups key numbering.Receive mould
Block is used for receiving the described tapered end numbering being produced by described processing module, and loads the described plural groups in described key numbering storehouse
Key is numbered.Comparing module is used for the described receiver module described tapered end numbering being received and the described plural groups being loaded
Key numbering is compared, and is numbered in described plural groups key numbering according to described tapered end, obtains a corresponding key and compiles
Number.Run module to carry out the default key that the described key numbering that described comparing module obtains is built in described software with one
Compare, when described key numbering is mated with described default key, make described running software, when described operation module judgement is described
Key numbering is mismatched with described default key, then nullify the operation of described software.
In above-mentioned security system for software, described comparing module comprises a key generation module, if described software swashs for the first time
It is impossible to obtain the key numbering of correspondence described tapered end numbering, then described key generation module from described key numbering storehouse when living
A newly-increased key numbering will be produced.
In above-mentioned security system for software, it is described whether newly-increased key numbering described in described comparison module is present in
In key numbering storehouse, if described newly-increased key numbering is not present in described key numbering storehouse, described newly-increased key is numbered
It is sent to described operation module with after the numbering pairing of described tapered end, if described newly-increased key numbering is present in described key numbering
In storehouse, then will produce another newly-increased key numbering again, and compare whether described another newly-increased key numbering is present in again
In described key numbering storehouse.
In above-mentioned security system for software, the fortune of described key numbering storehouse, described receiver module and described comparing module
Row environment and described software isolation.
In above-mentioned security system for software, described key numbering storehouse, described receiver module and described comparing module be
Run in virtual environment.
In above-mentioned security system for software, described key generation module is through GUID (Globally Unique
Identifier) mode carries out the coding of described newly-increased key numbering.
In order to solve the above problems, the present invention provides the method for protecting software in a kind of virtual environment, described guard method
Comprise the following steps:When described software activation, obtain described software in described virtual environment a corresponding virtual IP address and
One accessor;Described virtual IP address and described accessor are combined as a tapered end numbering;It is loaded with from a key numbering storehouse
Plural groups key is numbered;Compare described tapered end numbering and described plural groups key numbering, obtain correspondence described tapered end numbering its
In one key numbering;Described key numbering is preset key numbering with being built in described software compare;When described
Key numbering is numbered with described default key when mating, and makes described running software, when described key numbering and described default key
When numbering mismatches, nullify described running software.
In above-mentioned method for protecting software, when described software activates for the first time, if cannot take in described key numbering storehouse
The key numbering of described tapered end numbering must be corresponded to, then produce a newly-increased key numbering.
In above-mentioned method for protecting software, compare whether described newly-increased key numbering is present in described key numbering storehouse
In, if described newly-increased key numbering is not present in described key numbering storehouse, described newly-increased key is numbered and described tapered end
Numbering is matched, if described newly-increased key numbering is present in described key numbering storehouse, will produce another newly-increased again
Key is numbered, and compares whether described another newly-increased key numbering is present in described key numbering storehouse again.
In above-mentioned method for protecting software, it is loaded with a key numbering of plural groups key numbering from a key numbering storehouse
Storehouse and comparison described tapered end numbering and described plural groups key numbering, obtain the wherein one key numbering that the described tapered end of correspondence is numbered
Execute all in virtual environment etc. step.
In above-mentioned method for protecting software, described newly-increased key numbering is by GUID (Globally Unique
Identifier) mode produces.
It is an advantage of the current invention that the security system for software in virtual environment of the present invention and method for protecting software are profit
With the virtual IP address of software place environment and the uniqueness of accessor so that the software in virtual environment can only within the same time
Run a set of;If in addition, software move on to virtual environment beyond place using, can because of the change of virtual IP address and accessor,
And can not find corresponding tapered end numbering and cannot run.Thereby prevent the software pirate in virtual environment from using, by illegally multiple
Place beyond making and flowing to outward virtual environment uses.
Brief description
Fig. 1 is the function block illustrating the security system for software in virtual environment according to a first embodiment of the present invention
Figure;
Fig. 2 is the function block illustrating the security system for software in virtual environment according to a second embodiment of the present invention
Figure;
Fig. 3 is the flow chart of steps illustrating the method for protecting software in virtual environment according to embodiments of the present invention.
Specific embodiment
It is embodied as below in conjunction with the security system for software in the virtual environment to the present invention for the accompanying drawing and method for protecting software
Mode elaborates.
Refer to Fig. 1, Fig. 1 is the security system for software in virtual environment illustrating according to a first embodiment of the present invention
Functional block diagram.As shown in figure 1, in this embodiment, virtual environment 100 is by server host 110 and computer installation 120 structure
Become, in this embodiment, provide and give the software 111 that computer system 200 uses to be in server host 110, computer
System 200 directly can execute software 111 by network in virtual environment 100.In this embodiment, computer system 200 can
For user personal computer, server, in order to run the web page server of webpage platform, the virtual machine of virtual environment, personal meter
The virtual machine of calculation machine, virtual machine of web page server etc., but be not limited.The server being used by virtual environment 100
The operational capability of main frame 110 and speed are superior to computer system 200, therefore to execute software 111 through virtual environment 100,
Can will significantly lower the run time of software 111.
It is susceptible to stolen in virtual environment 100 because software 111 is deposited in, be copied illegally and flow to outward high in the clouds
Situations such as place beyond environment uses, the intellectual property of serious infringement software developer.Therefore, the software that the present invention provides is protected
Protecting system 300 can be certain the above-mentioned facts of avoiding occur.
Referring to the 1st figure, the security system for software 300 of the present invention comprises acquisition module 310, processing module 320, key
Spoon numbering storehouse 330, receiver module 340, comparing module 350 and operation module 360.In this embodiment, acquisition module 310,
Processing module 320 and operation module 360 are disposed in software 111, and key numbering storehouse 330, receiver module 340 and comparison mould
Block 350 is disposed in computer installation 120.In addition, receiver module 340 and comparing module 350 are software locks.
When user enables software 111 in computer system 200 end through network (when software 111 starts), capture mould
Block 310 will obtain software 111 corresponding virtual IP address (Internet Protocol, Internet Protocol) in virtual environment 100
And an accessor, and processing module 320 then the virtual IP address obtaining acquisition module 310 and accessor are combined as a lock
Head numbering, for example, 61.8.95.1-10.40.70.1.
Described key numbering storehouse 330 be stored with plural groups key numbering, for example
4fae6bbbef674654b9d9701dc014aea5,6e0570fd036f4c069a819d7ff9cf3aca etc., and by processing
The tapered end numbering that module 320 produces will be sent to receiver module 340, and the plural groups key that key numbering storehouse 330 is stored
Numbering also will be loaded into receiver module 340.The tapered end that comparing module 350 is used for being received receiver module 340 is numbered and institute
The plural groups key numbering loading is compared, and foundation tapered end is numbered in plural groups key numbering and obtains a corresponding key
Numbering.After comparing module 350 obtains and numbers corresponding key numbering with tapered end, described key numbering will be transferred into operation
Module 360.In this embodiment, in software 111, have a default key, now run module 360 and key can be numbered and pre-
If key is compared, when key numbering is with presetting key and mating, software 111 is made to run, when operation module 360 judges key
Numbering is mismatched with default key, then nullify the operation of software 111.
In this embodiment, key numbering storehouse 330, receiver module 340, the running environment of comparing module 350 and software 111
Isolation.And the present invention is the restriction of the uniqueness through IP address in virtual environment 100 and exclusiveness, and tapered end numbering and key
The pairing mechanism of spoon numbering, restricted software 111 must match exclusive tapered end numbering and key numbering, and then reaches software 111
Illegally cannot be used through replication actions.
Referring to Fig. 1, in some embodiments, in comparing module 350, it is further provided with a key generation module 351, if
When software 111 activates for the first time, comparing module 350 cannot obtain the key numbering of corresponding tapered end numbering from key numbering storehouse 330,
Then key generation module 351 will produce a newly-increased key numbering, and in this embodiment, key generation module 351 is to pass through GUID
(Globally Unique Identifier, globally unique identifier) mode carries out the coding of newly-increased key numbering, but not with
The method is limited.
Now comparing module 350 will compare whether newly-increased key numbering is present in key numbering storehouse 330, if newly again
Increase key numbering to be not present in key numbering storehouse 330, then newly-increased key numbering and tapered end are numbered and be sent to operation after pairing
Module 360, and the newly-increased key numbering of new pairing is stored in key numbering storehouse 330 with tapered end numbering simultaneously.
When software developer receives newly-increased key numbering and the tapered end numbering of new pairing, it will to this group, newly-increased key is compiled
Number authorized with tapered end numbering, and described newly-increased key is numbered the default key being set as described software 111, activated thereafter
During software 111, it is pre- whether the operation module 360 in software 111 will mate according to the key numbering being transmitted by comparing module
If key, to decide whether to make software 111 run.
And if comparing module 350 is present in comparing newly-increased key numbering in key numbering storehouse 330, described key
Generation module 351 will produce another newly-increased key numbering again, and compare whether another newly-increased key numbering is present in again
In described key numbering storehouse, till producing the newly-increased key numbering being not present in key numbering storehouse 330.
Virtual IP address and accessor using software 111 place environment produce tapered end numbering, can be limited in the same time
Interior, each tapered end numbering only has a corresponding key numbering pairing, thus the software 111 in virtual environment 100 can be made to exist
Can only run a set of in the same time.If in addition, software 111 move on to virtual environment 100 beyond place using, can be because virtual
IP and the change of accessor, and can not find corresponding tapered end numbering and cannot run.Thereby prevent in virtual environment 100
Software 111 stolen, place beyond being copied illegally and flowing to outward virtual environment 100 uses.
Refer to Fig. 2, Fig. 2 is the security system for software in virtual environment illustrating according to a second embodiment of the present invention
Functional block diagram.As shown in Fig. 2 acquisition module 510 in security system for software 500, processing module 520 and run module 560
In software 410, and key numbering storehouse 530, receiver module 540 and comparing module 550 are then located at the calculating of virtual environment 100
In machine device 120.In this embodiment, the configuration processor part of software 410 can (containing acquisition module 510, be located by user in advance
Reason module 520 and operation module 560) it is downloaded in computer system 200, and when user's activation software 410, software protection
System 500 will be run, and operational mode as previously described in a prior embodiment, therefore will not be described here.It must be stressed that in this embodiment
In, key numbering storehouse 530, receiver module 540, the running environment of comparing module 550 and software 410 completely cut off, and are thereby kept away with reaching
Exempt from the place use that software 410 is stolen in virtual environment 100, beyond being copied illegally and flowing to outward virtual environment.
Refer to Fig. 3, Fig. 3 is the step stream illustrating the method for protecting software in virtual environment according to embodiments of the present invention
Cheng Tu.As shown in figure 3, the method for protecting software in virtual environment can comprise the steps of:
In step S1, when software activation, obtain software corresponding virtual IP address and accessor in virtual environment.
In some embodiments, an acquisition module can be set in software, when software activation, obtain software in void through acquisition module
Corresponding virtual IP address and accessor in near-ring border.
In step S2, virtual IP address and accessor are combined as a tapered end numbering.In some embodiments, can be in software
Virtual IP address and accessor are combined as tapered end numbering by processing module by middle setting one processing module.In this embodiment, lock
Head numbering can be 61.8.95.1-10.40.70.1, but is not limited in this format.
In step S3, it is loaded with plural groups key numbering from a key numbering storehouse.
In step S4, compare tapered end numbering and plural groups key numbering, obtain wherein one key of corresponding tapered end numbering
Numbering.In some embodiments, a comparing module can be set in the computer installation in virtual environment, and by comparison mould
Block compares tapered end numbering and plural groups key numbering, obtains wherein one key numbering of corresponding tapered end numbering.
In this embodiment, when software activates for the first time, if corresponding tapered end numbering cannot be obtained in key numbering storehouse
Key is numbered, then will produce a newly-increased key numbering.And increase key numbering will be compared whether be present in key numbering storehouse newly
In, if newly-increased key numbering is not present in key numbering storehouse, newly-increased key numbering is matched with tapered end numbering, and is deposited
Enter in key numbering storehouse.If newly-increased key numbering is present in key numbering storehouse, another newly-increased key will be produced again and compile
Number, and compare whether another newly-increased key numbering is present in key numbering storehouse again.In this embodiment, described newly-increased key
Spoon numbering is to produce by GUID mode.
In step S5, key numbering is preset key numbering with being built in software and compares.
In step S6, when key numbering with preset key numbering mate when, make running software, when key numbering and preset
When key numbering mismatches, nullify running software.In some embodiments, step S5 and step S6 can be arranged by software
Whether one operation module is run with the allowance carrying out software.
Focusing on of the method for protecting software of the present invention, is loaded with plural groups key numbering from a key numbering storehouse
One key numbering storehouse and comparison tapered end numbering and described plural groups key numbering, wherein one key that the corresponding tapered end of acquirement is numbered is compiled
Number etc. step execute all in virtual environment.
Virtual IP address and accessor using software place environment produce tapered end numbering, can be limited in the same time,
Each tapered end numbering only has a corresponding key numbering pairing, thus can make the software in virtual environment within the same time
Can only run a set of.If in addition, software move on to virtual environment beyond place using, can changing because of virtual IP address and accessor
Become, and can not find corresponding tapered end numbering and cannot run.Thereby prevent the software pirate in virtual environment from using, illegal
Place beyond replicating and flowing to outward virtual environment uses.
In sum, the security system for software in virtual environment of the present invention and method for protecting software are using software institute
In the virtual IP address of environment and the uniqueness of accessor so that the software in virtual environment can only run one within the same time
Set;If in addition, software move on to virtual environment beyond place using, because of the change of virtual IP address and accessor, and can look for not
Cannot run to corresponding tapered end numbering.Thereby prevent the software pirate in virtual environment from using, be copied illegally and
Flow to outward the place beyond virtual environment to use.
To being familiar with this field those skilled in the art, though the present invention illustrates as above with preferred embodiments, so it is not limited to the present invention
Spirit.Modification and the similar configuration made in without departing from spirit and scope of the invention, should be included in claim
Interior, this scope should cover all similar modifications and similar structures, and should do annotation the broadest.
Claims (11)
1. a kind of security system for software in virtual environment, in order to protect the software in virtual environment, described software is protected
Protecting system includes:
One acquisition module, when described software activation, obtains described software corresponding virtual IP address in described virtual environment
(Internet Protocol) and an accessor;
One processing module, described virtual IP address and described accessor in order to obtain described acquisition module are combined as a tapered end and compile
Number;
One key numbering storehouse, the plural groups that are stored with key is numbered;
One receiver module, for receiving the described tapered end numbering being produced by described processing module, and loads described key numbering storehouse
In described plural groups key numbering;
One comparing module, for the described tapered end numbering being received described receiver module and the described plural groups key being loaded
Spoon numbering is compared, and is numbered in described plural groups key numbering according to described tapered end, obtains a corresponding key numbering;
And
One operation module, the described key numbering that described comparing module is obtained is built into the default key in described software with one
Compare, when described key numbering is mated with described default key, make described running software, when described operation module judges
Described key numbering and described default key mismatch, then nullify the operation of described software.
2. security system for software according to claim 1 produces mould it is characterised in that described comparing module comprises a key
Block, if it is impossible to obtain the key numbering of correspondence described tapered end numbering from described key numbering storehouse when described software activates for the first time,
Then described key generation module will produce a newly-increased key numbering.
3. security system for software according to claim 2 is it is characterised in that increase key newly described in described comparison module
Whether numbering is present in described key numbering storehouse, if described newly-increased key numbering is not present in described key numbering storehouse,
Then described newly-increased key is numbered and be sent to described operation module after matching with described tapered end numbering, if described newly-increased key numbering
It is present in described key numbering storehouse, then will produce another newly-increased key numbering again, and compare described another newly-increased again
Whether key numbering is present in described key numbering storehouse.
4. security system for software according to claim 3 is it is characterised in that described key numbering storehouse, described receiver module
And the running environment of described comparing module and described software isolation.
5. security system for software according to claim 4 is it is characterised in that described key numbering storehouse, described receiver module
And described comparing module is to run in virtual environment.
6. security system for software according to claim 2 is it is characterised in that described key generation module is to pass through GUID
(Globally Unique Identifier) mode carries out the coding of described newly-increased key numbering.
7. the method for protecting software in a kind of virtual environment, described guard method comprises the following steps:
When described software activation, obtain described software a corresponding virtual IP address and router in described virtual environment
IP;
Described virtual IP address and described accessor are combined as a tapered end numbering;
It is loaded with plural groups key numbering from a key numbering storehouse;
Compare described tapered end numbering and described plural groups key numbering, wherein one key obtaining correspondence described tapered end numbering is compiled
Number;
Described key numbering is preset key numbering with being built in described software compare;And
When described key numbering and described default key are numbered and mated, make described running software, when described key numbering and institute
When stating default key numbering mismatch, nullify described running software.
8. guard method according to claim 7 is it is characterised in that when described software activates for the first time, if cannot be in institute
State the key numbering obtaining correspondence described tapered end numbering in key numbering storehouse, then produce a newly-increased key numbering.
9. guard method according to claim 8 is it is characterised in that compare whether described newly-increased key numbering is present in
In described key numbering storehouse, if described newly-increased key numbering is not present in described key numbering storehouse, by described newly-increased key
Numbering is matched with described tapered end numbering, if described newly-increased key numbering is present in described key numbering storehouse, will again
Secondary produce another newly-increased key numbering, and compare whether described another newly-increased key numbering is present in described key numbering again
In storehouse.
10. guard method according to claim 7 is it is characterised in that be loaded with plural groups key from a key numbering storehouse
Spoon numbering and comparison described tapered end numbering and described plural groups key numbering, obtain wherein one key that the described tapered end of correspondence is numbered
Numbering step executes all in virtual environment.
11. guard methods according to claim 8 are it is characterised in that described newly-increased key numbering is by GUID
(Globally Unique Identifier) mode produces.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210576639.5A CN103902856B (en) | 2012-12-26 | 2012-12-26 | Software protecting system and method in virtual environment |
TW102146385A TWI503749B (en) | 2012-12-26 | 2013-12-16 | Software protection system and method in virtual environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210576639.5A CN103902856B (en) | 2012-12-26 | 2012-12-26 | Software protecting system and method in virtual environment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103902856A CN103902856A (en) | 2014-07-02 |
CN103902856B true CN103902856B (en) | 2017-02-08 |
Family
ID=50994173
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210576639.5A Active CN103902856B (en) | 2012-12-26 | 2012-12-26 | Software protecting system and method in virtual environment |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN103902856B (en) |
TW (1) | TWI503749B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9954526B2 (en) | 2013-09-09 | 2018-04-24 | Atmel Corporation | Generic randomized mesh design |
CN113420266A (en) * | 2021-06-21 | 2021-09-21 | 北京中天瑞合科技有限公司 | Computer system integrated software protection method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW201020818A (en) * | 2008-11-21 | 2010-06-01 | Xin-Chang Lin | Geographic location identify system with open-type identifier and method for generating the identifier |
CN102354358A (en) * | 2011-10-17 | 2012-02-15 | 无锡诺宝科技发展有限公司 | Method for protecting copyright by combining IP (Internet Protocol) address |
CN102467634A (en) * | 2010-11-10 | 2012-05-23 | 财团法人工业技术研究院 | Software authorization system and method |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100471955B1 (en) * | 1995-10-09 | 2005-03-14 | 마쯔시다덴기산교 가부시키가이샤 | Content reproducing device and content reproducing method |
GB2363297B (en) * | 2000-06-09 | 2004-04-07 | Hewlett Packard Co | Secure network communications |
US7835723B2 (en) * | 2007-02-04 | 2010-11-16 | Bank Of America Corporation | Mobile banking |
-
2012
- 2012-12-26 CN CN201210576639.5A patent/CN103902856B/en active Active
-
2013
- 2013-12-16 TW TW102146385A patent/TWI503749B/en active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW201020818A (en) * | 2008-11-21 | 2010-06-01 | Xin-Chang Lin | Geographic location identify system with open-type identifier and method for generating the identifier |
CN102467634A (en) * | 2010-11-10 | 2012-05-23 | 财团法人工业技术研究院 | Software authorization system and method |
CN102354358A (en) * | 2011-10-17 | 2012-02-15 | 无锡诺宝科技发展有限公司 | Method for protecting copyright by combining IP (Internet Protocol) address |
Also Published As
Publication number | Publication date |
---|---|
TWI503749B (en) | 2015-10-11 |
TW201426556A (en) | 2014-07-01 |
CN103902856A (en) | 2014-07-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10592639B2 (en) | Blockchain-based shadow images to facilitate copyright protection of digital content | |
Biddle et al. | The darknet and the future of content protection | |
US8769296B2 (en) | Software signature tracking | |
KR100568228B1 (en) | Method for resisting program tampering using serial number and for upgrading obfuscated program, and apparatus for the same | |
JP3763393B2 (en) | COMMUNICATION SYSTEM, TERMINAL DEVICE, RECORDING MEDIUM RECORDING REPRODUCTION PROGRAM, SERVER DEVICE, AND RECORDING MEDIUM RECORDING SERVER PROGRAM | |
KR101594230B1 (en) | Secure and efficient content screening in a networked environment | |
KR101159316B1 (en) | Method and system for single reactivation of software product licenses | |
US7237123B2 (en) | Systems and methods for preventing unauthorized use of digital content | |
CN102176224B (en) | Methods and apparatus for dealing with malware | |
US20020099955A1 (en) | Method for securing digital content | |
US8769675B2 (en) | Clock roll forward detection | |
KR20150011802A (en) | Method and system for process working set isolation | |
AU2001292910A1 (en) | Systems and methods for preventing unauthorized use of digital content | |
EP1352307A2 (en) | Systems and methods for preventing unauthorized use of digital content | |
TWI461956B (en) | Device and method for digital rights management | |
CN103902856B (en) | Software protecting system and method in virtual environment | |
Zhang et al. | Security and trust in digital rights management: A survey. | |
US7516495B2 (en) | Hardware-based software authenticator | |
Huang et al. | Smart contract watermarking based on code obfuscation | |
CN102006293B (en) | Network software application system encryption scheme based on stand-alone softdog | |
CN112118290B (en) | Program analysis-based data resource management and control method | |
Bendersky et al. | Advanced software protection now | |
Hoff et al. | System and software security via authentication handshake in EPROM | |
Wu et al. | Binary protection using dynamic fine-grained code hiding and obfuscation | |
Ruiz et al. | Security engineering and modelling of set-top boxes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |