CN103902856B - Software protecting system and method in virtual environment - Google Patents

Software protecting system and method in virtual environment Download PDF

Info

Publication number
CN103902856B
CN103902856B CN201210576639.5A CN201210576639A CN103902856B CN 103902856 B CN103902856 B CN 103902856B CN 201210576639 A CN201210576639 A CN 201210576639A CN 103902856 B CN103902856 B CN 103902856B
Authority
CN
China
Prior art keywords
numbering
key
software
key numbering
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210576639.5A
Other languages
Chinese (zh)
Other versions
CN103902856A (en
Inventor
许旭正
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Digiwin Software Co Ltd
Original Assignee
Digiwin Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Digiwin Software Co Ltd filed Critical Digiwin Software Co Ltd
Priority to CN201210576639.5A priority Critical patent/CN103902856B/en
Priority to TW102146385A priority patent/TWI503749B/en
Publication of CN103902856A publication Critical patent/CN103902856A/en
Application granted granted Critical
Publication of CN103902856B publication Critical patent/CN103902856B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a software protecting system in a virtual environment. The software protecting system in the virtual environment is used for protecting software in the virtual environment. The software protecting system comprises a capturing module, a processing module, a key number library, a receiving module, a comparison module and an operating module, wherein the capturing module is used for obtaining a corresponding virtual IP and a router IP when the software is in the virtual environment, the processing module is used for combining the virtual IP obtained through the capturing module with the router IP obtained through the capturing module so that a lock head number can be obtained, a plurality of groups of key numbers are stored in the key number library, the receiving module is used for receiving the lock head number generated by the processing module and loading the groups of key numbers in the key number library, the comparison module is used for comparing the received lock head number with the groups of loaded key numbers and obtaining the corresponding key number in the groups of key numbers according to the lock head number, and the operating module is used for comparing the key number obtained by the comparison module with a preset key, so that whether the software needs to be run or not is determined.

Description

Security system for software in virtual environment and method for protecting software
Technical field
The present disclosure generally relates to virtual environment field of software protection, more particularly, to a kind of software protection system in virtual environment Method for protecting software in system and virtual environment.
Background technology
With scientific and technological progress, user carries out data storage or the technology of execution application program through virtual environments such as high in the clouds Increasingly mature, high in the clouds technology has become scientific and technological product indispensable now.
The use of past software generally all uses in the computer installation of user side, because the intelligence that software is developer is tied Crystalline substance, therefore developer all can add protection device for the software of oneself exploitation, it is to avoid the software of arduous exploitation suffers that piracy uses.
Existing main flow resist technology has binding hardware information and combines third party's hardware etc..Binding hardware information is to work as software During activation, the configuration processor in software can read the computer hardware information belonging to user side in advance, and such as central processing unit is compiled Code, hard disk sequence number etc., if configuration processor reads the computer hardware information belonging to correct user side, will authorize this user Using this software.And be when user buys a certain software with reference to third party's hardware, provide such as Key Pro (soft with product Part protection device), when user enables this software, configuration processor is read the information in Key Pro in advance, if information is correct This user can be authorized to be continuing with this software.By said method, the software that can protect arduous exploitation is not by unwarranted use Family is pirate to be used.
With the arriving in high in the clouds epoch, software developer gradually uploads itself product in the environment of high in the clouds, then foundation The payment state of user provides different degrees of service.But in the environment of high in the clouds, computer hardware information can be imitated easily True and false make or be replicated and shift, and the main frame that high in the clouds environment is used is not fixed, and does not also allow developer's main frame beyond the clouds On insert individual hardware unit such as Key Pro.So will result in the software in the environment of high in the clouds easily suffer unwarranted User is pirate to be used.
Therefore, a kind of technical method improving the problems referred to above, actually problem in the urgent need to address at present how are developed.
Content of the invention
Present invention aim at solving the above problems, provide the security system for software in a kind of virtual environment and software protection Method, it can prevent the software pirate in virtual environment from using, and be copied illegally and flow to outward the ground beyond virtual environment Side uses.
In order to solve the above problems, the present invention provides a kind of security system for software in virtual environment, in order to guard bit Software in virtual environment.Security system for software includes:Acquisition module, processing module, key numbering storehouse, receiver module, ratio To module and operation module.Acquisition module is when described software activation, obtains described software phase in described virtual environment The virtual IP address (Internet Protocol) answered and an accessor.Processing module is in order to obtain described acquisition module Described virtual IP address and accessor be combined as one tapered end numbering.Key numbering stock contains plural groups key numbering.Receive mould Block is used for receiving the described tapered end numbering being produced by described processing module, and loads the described plural groups in described key numbering storehouse Key is numbered.Comparing module is used for the described receiver module described tapered end numbering being received and the described plural groups being loaded Key numbering is compared, and is numbered in described plural groups key numbering according to described tapered end, obtains a corresponding key and compiles Number.Run module to carry out the default key that the described key numbering that described comparing module obtains is built in described software with one Compare, when described key numbering is mated with described default key, make described running software, when described operation module judgement is described Key numbering is mismatched with described default key, then nullify the operation of described software.
In above-mentioned security system for software, described comparing module comprises a key generation module, if described software swashs for the first time It is impossible to obtain the key numbering of correspondence described tapered end numbering, then described key generation module from described key numbering storehouse when living A newly-increased key numbering will be produced.
In above-mentioned security system for software, it is described whether newly-increased key numbering described in described comparison module is present in In key numbering storehouse, if described newly-increased key numbering is not present in described key numbering storehouse, described newly-increased key is numbered It is sent to described operation module with after the numbering pairing of described tapered end, if described newly-increased key numbering is present in described key numbering In storehouse, then will produce another newly-increased key numbering again, and compare whether described another newly-increased key numbering is present in again In described key numbering storehouse.
In above-mentioned security system for software, the fortune of described key numbering storehouse, described receiver module and described comparing module Row environment and described software isolation.
In above-mentioned security system for software, described key numbering storehouse, described receiver module and described comparing module be Run in virtual environment.
In above-mentioned security system for software, described key generation module is through GUID (Globally Unique Identifier) mode carries out the coding of described newly-increased key numbering.
In order to solve the above problems, the present invention provides the method for protecting software in a kind of virtual environment, described guard method Comprise the following steps:When described software activation, obtain described software in described virtual environment a corresponding virtual IP address and One accessor;Described virtual IP address and described accessor are combined as a tapered end numbering;It is loaded with from a key numbering storehouse Plural groups key is numbered;Compare described tapered end numbering and described plural groups key numbering, obtain correspondence described tapered end numbering its In one key numbering;Described key numbering is preset key numbering with being built in described software compare;When described Key numbering is numbered with described default key when mating, and makes described running software, when described key numbering and described default key When numbering mismatches, nullify described running software.
In above-mentioned method for protecting software, when described software activates for the first time, if cannot take in described key numbering storehouse The key numbering of described tapered end numbering must be corresponded to, then produce a newly-increased key numbering.
In above-mentioned method for protecting software, compare whether described newly-increased key numbering is present in described key numbering storehouse In, if described newly-increased key numbering is not present in described key numbering storehouse, described newly-increased key is numbered and described tapered end Numbering is matched, if described newly-increased key numbering is present in described key numbering storehouse, will produce another newly-increased again Key is numbered, and compares whether described another newly-increased key numbering is present in described key numbering storehouse again.
In above-mentioned method for protecting software, it is loaded with a key numbering of plural groups key numbering from a key numbering storehouse Storehouse and comparison described tapered end numbering and described plural groups key numbering, obtain the wherein one key numbering that the described tapered end of correspondence is numbered Execute all in virtual environment etc. step.
In above-mentioned method for protecting software, described newly-increased key numbering is by GUID (Globally Unique Identifier) mode produces.
It is an advantage of the current invention that the security system for software in virtual environment of the present invention and method for protecting software are profit With the virtual IP address of software place environment and the uniqueness of accessor so that the software in virtual environment can only within the same time Run a set of;If in addition, software move on to virtual environment beyond place using, can because of the change of virtual IP address and accessor, And can not find corresponding tapered end numbering and cannot run.Thereby prevent the software pirate in virtual environment from using, by illegally multiple Place beyond making and flowing to outward virtual environment uses.
Brief description
Fig. 1 is the function block illustrating the security system for software in virtual environment according to a first embodiment of the present invention Figure;
Fig. 2 is the function block illustrating the security system for software in virtual environment according to a second embodiment of the present invention Figure;
Fig. 3 is the flow chart of steps illustrating the method for protecting software in virtual environment according to embodiments of the present invention.
Specific embodiment
It is embodied as below in conjunction with the security system for software in the virtual environment to the present invention for the accompanying drawing and method for protecting software Mode elaborates.
Refer to Fig. 1, Fig. 1 is the security system for software in virtual environment illustrating according to a first embodiment of the present invention Functional block diagram.As shown in figure 1, in this embodiment, virtual environment 100 is by server host 110 and computer installation 120 structure Become, in this embodiment, provide and give the software 111 that computer system 200 uses to be in server host 110, computer System 200 directly can execute software 111 by network in virtual environment 100.In this embodiment, computer system 200 can For user personal computer, server, in order to run the web page server of webpage platform, the virtual machine of virtual environment, personal meter The virtual machine of calculation machine, virtual machine of web page server etc., but be not limited.The server being used by virtual environment 100 The operational capability of main frame 110 and speed are superior to computer system 200, therefore to execute software 111 through virtual environment 100, Can will significantly lower the run time of software 111.
It is susceptible to stolen in virtual environment 100 because software 111 is deposited in, be copied illegally and flow to outward high in the clouds Situations such as place beyond environment uses, the intellectual property of serious infringement software developer.Therefore, the software that the present invention provides is protected Protecting system 300 can be certain the above-mentioned facts of avoiding occur.
Referring to the 1st figure, the security system for software 300 of the present invention comprises acquisition module 310, processing module 320, key Spoon numbering storehouse 330, receiver module 340, comparing module 350 and operation module 360.In this embodiment, acquisition module 310, Processing module 320 and operation module 360 are disposed in software 111, and key numbering storehouse 330, receiver module 340 and comparison mould Block 350 is disposed in computer installation 120.In addition, receiver module 340 and comparing module 350 are software locks.
When user enables software 111 in computer system 200 end through network (when software 111 starts), capture mould Block 310 will obtain software 111 corresponding virtual IP address (Internet Protocol, Internet Protocol) in virtual environment 100 And an accessor, and processing module 320 then the virtual IP address obtaining acquisition module 310 and accessor are combined as a lock Head numbering, for example, 61.8.95.1-10.40.70.1.
Described key numbering storehouse 330 be stored with plural groups key numbering, for example 4fae6bbbef674654b9d9701dc014aea5,6e0570fd036f4c069a819d7ff9cf3aca etc., and by processing The tapered end numbering that module 320 produces will be sent to receiver module 340, and the plural groups key that key numbering storehouse 330 is stored Numbering also will be loaded into receiver module 340.The tapered end that comparing module 350 is used for being received receiver module 340 is numbered and institute The plural groups key numbering loading is compared, and foundation tapered end is numbered in plural groups key numbering and obtains a corresponding key Numbering.After comparing module 350 obtains and numbers corresponding key numbering with tapered end, described key numbering will be transferred into operation Module 360.In this embodiment, in software 111, have a default key, now run module 360 and key can be numbered and pre- If key is compared, when key numbering is with presetting key and mating, software 111 is made to run, when operation module 360 judges key Numbering is mismatched with default key, then nullify the operation of software 111.
In this embodiment, key numbering storehouse 330, receiver module 340, the running environment of comparing module 350 and software 111 Isolation.And the present invention is the restriction of the uniqueness through IP address in virtual environment 100 and exclusiveness, and tapered end numbering and key The pairing mechanism of spoon numbering, restricted software 111 must match exclusive tapered end numbering and key numbering, and then reaches software 111 Illegally cannot be used through replication actions.
Referring to Fig. 1, in some embodiments, in comparing module 350, it is further provided with a key generation module 351, if When software 111 activates for the first time, comparing module 350 cannot obtain the key numbering of corresponding tapered end numbering from key numbering storehouse 330, Then key generation module 351 will produce a newly-increased key numbering, and in this embodiment, key generation module 351 is to pass through GUID (Globally Unique Identifier, globally unique identifier) mode carries out the coding of newly-increased key numbering, but not with The method is limited.
Now comparing module 350 will compare whether newly-increased key numbering is present in key numbering storehouse 330, if newly again Increase key numbering to be not present in key numbering storehouse 330, then newly-increased key numbering and tapered end are numbered and be sent to operation after pairing Module 360, and the newly-increased key numbering of new pairing is stored in key numbering storehouse 330 with tapered end numbering simultaneously.
When software developer receives newly-increased key numbering and the tapered end numbering of new pairing, it will to this group, newly-increased key is compiled Number authorized with tapered end numbering, and described newly-increased key is numbered the default key being set as described software 111, activated thereafter During software 111, it is pre- whether the operation module 360 in software 111 will mate according to the key numbering being transmitted by comparing module If key, to decide whether to make software 111 run.
And if comparing module 350 is present in comparing newly-increased key numbering in key numbering storehouse 330, described key Generation module 351 will produce another newly-increased key numbering again, and compare whether another newly-increased key numbering is present in again In described key numbering storehouse, till producing the newly-increased key numbering being not present in key numbering storehouse 330.
Virtual IP address and accessor using software 111 place environment produce tapered end numbering, can be limited in the same time Interior, each tapered end numbering only has a corresponding key numbering pairing, thus the software 111 in virtual environment 100 can be made to exist Can only run a set of in the same time.If in addition, software 111 move on to virtual environment 100 beyond place using, can be because virtual IP and the change of accessor, and can not find corresponding tapered end numbering and cannot run.Thereby prevent in virtual environment 100 Software 111 stolen, place beyond being copied illegally and flowing to outward virtual environment 100 uses.
Refer to Fig. 2, Fig. 2 is the security system for software in virtual environment illustrating according to a second embodiment of the present invention Functional block diagram.As shown in Fig. 2 acquisition module 510 in security system for software 500, processing module 520 and run module 560 In software 410, and key numbering storehouse 530, receiver module 540 and comparing module 550 are then located at the calculating of virtual environment 100 In machine device 120.In this embodiment, the configuration processor part of software 410 can (containing acquisition module 510, be located by user in advance Reason module 520 and operation module 560) it is downloaded in computer system 200, and when user's activation software 410, software protection System 500 will be run, and operational mode as previously described in a prior embodiment, therefore will not be described here.It must be stressed that in this embodiment In, key numbering storehouse 530, receiver module 540, the running environment of comparing module 550 and software 410 completely cut off, and are thereby kept away with reaching Exempt from the place use that software 410 is stolen in virtual environment 100, beyond being copied illegally and flowing to outward virtual environment.
Refer to Fig. 3, Fig. 3 is the step stream illustrating the method for protecting software in virtual environment according to embodiments of the present invention Cheng Tu.As shown in figure 3, the method for protecting software in virtual environment can comprise the steps of:
In step S1, when software activation, obtain software corresponding virtual IP address and accessor in virtual environment. In some embodiments, an acquisition module can be set in software, when software activation, obtain software in void through acquisition module Corresponding virtual IP address and accessor in near-ring border.
In step S2, virtual IP address and accessor are combined as a tapered end numbering.In some embodiments, can be in software Virtual IP address and accessor are combined as tapered end numbering by processing module by middle setting one processing module.In this embodiment, lock Head numbering can be 61.8.95.1-10.40.70.1, but is not limited in this format.
In step S3, it is loaded with plural groups key numbering from a key numbering storehouse.
In step S4, compare tapered end numbering and plural groups key numbering, obtain wherein one key of corresponding tapered end numbering Numbering.In some embodiments, a comparing module can be set in the computer installation in virtual environment, and by comparison mould Block compares tapered end numbering and plural groups key numbering, obtains wherein one key numbering of corresponding tapered end numbering.
In this embodiment, when software activates for the first time, if corresponding tapered end numbering cannot be obtained in key numbering storehouse Key is numbered, then will produce a newly-increased key numbering.And increase key numbering will be compared whether be present in key numbering storehouse newly In, if newly-increased key numbering is not present in key numbering storehouse, newly-increased key numbering is matched with tapered end numbering, and is deposited Enter in key numbering storehouse.If newly-increased key numbering is present in key numbering storehouse, another newly-increased key will be produced again and compile Number, and compare whether another newly-increased key numbering is present in key numbering storehouse again.In this embodiment, described newly-increased key Spoon numbering is to produce by GUID mode.
In step S5, key numbering is preset key numbering with being built in software and compares.
In step S6, when key numbering with preset key numbering mate when, make running software, when key numbering and preset When key numbering mismatches, nullify running software.In some embodiments, step S5 and step S6 can be arranged by software Whether one operation module is run with the allowance carrying out software.
Focusing on of the method for protecting software of the present invention, is loaded with plural groups key numbering from a key numbering storehouse One key numbering storehouse and comparison tapered end numbering and described plural groups key numbering, wherein one key that the corresponding tapered end of acquirement is numbered is compiled Number etc. step execute all in virtual environment.
Virtual IP address and accessor using software place environment produce tapered end numbering, can be limited in the same time, Each tapered end numbering only has a corresponding key numbering pairing, thus can make the software in virtual environment within the same time Can only run a set of.If in addition, software move on to virtual environment beyond place using, can changing because of virtual IP address and accessor Become, and can not find corresponding tapered end numbering and cannot run.Thereby prevent the software pirate in virtual environment from using, illegal Place beyond replicating and flowing to outward virtual environment uses.
In sum, the security system for software in virtual environment of the present invention and method for protecting software are using software institute In the virtual IP address of environment and the uniqueness of accessor so that the software in virtual environment can only run one within the same time Set;If in addition, software move on to virtual environment beyond place using, because of the change of virtual IP address and accessor, and can look for not Cannot run to corresponding tapered end numbering.Thereby prevent the software pirate in virtual environment from using, be copied illegally and Flow to outward the place beyond virtual environment to use.
To being familiar with this field those skilled in the art, though the present invention illustrates as above with preferred embodiments, so it is not limited to the present invention Spirit.Modification and the similar configuration made in without departing from spirit and scope of the invention, should be included in claim Interior, this scope should cover all similar modifications and similar structures, and should do annotation the broadest.

Claims (11)

1. a kind of security system for software in virtual environment, in order to protect the software in virtual environment, described software is protected Protecting system includes:
One acquisition module, when described software activation, obtains described software corresponding virtual IP address in described virtual environment (Internet Protocol) and an accessor;
One processing module, described virtual IP address and described accessor in order to obtain described acquisition module are combined as a tapered end and compile Number;
One key numbering storehouse, the plural groups that are stored with key is numbered;
One receiver module, for receiving the described tapered end numbering being produced by described processing module, and loads described key numbering storehouse In described plural groups key numbering;
One comparing module, for the described tapered end numbering being received described receiver module and the described plural groups key being loaded Spoon numbering is compared, and is numbered in described plural groups key numbering according to described tapered end, obtains a corresponding key numbering; And
One operation module, the described key numbering that described comparing module is obtained is built into the default key in described software with one Compare, when described key numbering is mated with described default key, make described running software, when described operation module judges Described key numbering and described default key mismatch, then nullify the operation of described software.
2. security system for software according to claim 1 produces mould it is characterised in that described comparing module comprises a key Block, if it is impossible to obtain the key numbering of correspondence described tapered end numbering from described key numbering storehouse when described software activates for the first time, Then described key generation module will produce a newly-increased key numbering.
3. security system for software according to claim 2 is it is characterised in that increase key newly described in described comparison module Whether numbering is present in described key numbering storehouse, if described newly-increased key numbering is not present in described key numbering storehouse, Then described newly-increased key is numbered and be sent to described operation module after matching with described tapered end numbering, if described newly-increased key numbering It is present in described key numbering storehouse, then will produce another newly-increased key numbering again, and compare described another newly-increased again Whether key numbering is present in described key numbering storehouse.
4. security system for software according to claim 3 is it is characterised in that described key numbering storehouse, described receiver module And the running environment of described comparing module and described software isolation.
5. security system for software according to claim 4 is it is characterised in that described key numbering storehouse, described receiver module And described comparing module is to run in virtual environment.
6. security system for software according to claim 2 is it is characterised in that described key generation module is to pass through GUID (Globally Unique Identifier) mode carries out the coding of described newly-increased key numbering.
7. the method for protecting software in a kind of virtual environment, described guard method comprises the following steps:
When described software activation, obtain described software a corresponding virtual IP address and router in described virtual environment IP;
Described virtual IP address and described accessor are combined as a tapered end numbering;
It is loaded with plural groups key numbering from a key numbering storehouse;
Compare described tapered end numbering and described plural groups key numbering, wherein one key obtaining correspondence described tapered end numbering is compiled Number;
Described key numbering is preset key numbering with being built in described software compare;And
When described key numbering and described default key are numbered and mated, make described running software, when described key numbering and institute When stating default key numbering mismatch, nullify described running software.
8. guard method according to claim 7 is it is characterised in that when described software activates for the first time, if cannot be in institute State the key numbering obtaining correspondence described tapered end numbering in key numbering storehouse, then produce a newly-increased key numbering.
9. guard method according to claim 8 is it is characterised in that compare whether described newly-increased key numbering is present in In described key numbering storehouse, if described newly-increased key numbering is not present in described key numbering storehouse, by described newly-increased key Numbering is matched with described tapered end numbering, if described newly-increased key numbering is present in described key numbering storehouse, will again Secondary produce another newly-increased key numbering, and compare whether described another newly-increased key numbering is present in described key numbering again In storehouse.
10. guard method according to claim 7 is it is characterised in that be loaded with plural groups key from a key numbering storehouse Spoon numbering and comparison described tapered end numbering and described plural groups key numbering, obtain wherein one key that the described tapered end of correspondence is numbered Numbering step executes all in virtual environment.
11. guard methods according to claim 8 are it is characterised in that described newly-increased key numbering is by GUID (Globally Unique Identifier) mode produces.
CN201210576639.5A 2012-12-26 2012-12-26 Software protecting system and method in virtual environment Active CN103902856B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201210576639.5A CN103902856B (en) 2012-12-26 2012-12-26 Software protecting system and method in virtual environment
TW102146385A TWI503749B (en) 2012-12-26 2013-12-16 Software protection system and method in virtual environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210576639.5A CN103902856B (en) 2012-12-26 2012-12-26 Software protecting system and method in virtual environment

Publications (2)

Publication Number Publication Date
CN103902856A CN103902856A (en) 2014-07-02
CN103902856B true CN103902856B (en) 2017-02-08

Family

ID=50994173

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210576639.5A Active CN103902856B (en) 2012-12-26 2012-12-26 Software protecting system and method in virtual environment

Country Status (2)

Country Link
CN (1) CN103902856B (en)
TW (1) TWI503749B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9954526B2 (en) 2013-09-09 2018-04-24 Atmel Corporation Generic randomized mesh design
CN113420266A (en) * 2021-06-21 2021-09-21 北京中天瑞合科技有限公司 Computer system integrated software protection method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201020818A (en) * 2008-11-21 2010-06-01 Xin-Chang Lin Geographic location identify system with open-type identifier and method for generating the identifier
CN102354358A (en) * 2011-10-17 2012-02-15 无锡诺宝科技发展有限公司 Method for protecting copyright by combining IP (Internet Protocol) address
CN102467634A (en) * 2010-11-10 2012-05-23 财团法人工业技术研究院 Software authorization system and method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100471955B1 (en) * 1995-10-09 2005-03-14 마쯔시다덴기산교 가부시키가이샤 Content reproducing device and content reproducing method
GB2363297B (en) * 2000-06-09 2004-04-07 Hewlett Packard Co Secure network communications
US7835723B2 (en) * 2007-02-04 2010-11-16 Bank Of America Corporation Mobile banking

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201020818A (en) * 2008-11-21 2010-06-01 Xin-Chang Lin Geographic location identify system with open-type identifier and method for generating the identifier
CN102467634A (en) * 2010-11-10 2012-05-23 财团法人工业技术研究院 Software authorization system and method
CN102354358A (en) * 2011-10-17 2012-02-15 无锡诺宝科技发展有限公司 Method for protecting copyright by combining IP (Internet Protocol) address

Also Published As

Publication number Publication date
TWI503749B (en) 2015-10-11
TW201426556A (en) 2014-07-01
CN103902856A (en) 2014-07-02

Similar Documents

Publication Publication Date Title
US10592639B2 (en) Blockchain-based shadow images to facilitate copyright protection of digital content
Biddle et al. The darknet and the future of content protection
US8769296B2 (en) Software signature tracking
KR100568228B1 (en) Method for resisting program tampering using serial number and for upgrading obfuscated program, and apparatus for the same
JP3763393B2 (en) COMMUNICATION SYSTEM, TERMINAL DEVICE, RECORDING MEDIUM RECORDING REPRODUCTION PROGRAM, SERVER DEVICE, AND RECORDING MEDIUM RECORDING SERVER PROGRAM
KR101594230B1 (en) Secure and efficient content screening in a networked environment
KR101159316B1 (en) Method and system for single reactivation of software product licenses
US7237123B2 (en) Systems and methods for preventing unauthorized use of digital content
CN102176224B (en) Methods and apparatus for dealing with malware
US20020099955A1 (en) Method for securing digital content
US8769675B2 (en) Clock roll forward detection
KR20150011802A (en) Method and system for process working set isolation
AU2001292910A1 (en) Systems and methods for preventing unauthorized use of digital content
EP1352307A2 (en) Systems and methods for preventing unauthorized use of digital content
TWI461956B (en) Device and method for digital rights management
CN103902856B (en) Software protecting system and method in virtual environment
Zhang et al. Security and trust in digital rights management: A survey.
US7516495B2 (en) Hardware-based software authenticator
Huang et al. Smart contract watermarking based on code obfuscation
CN102006293B (en) Network software application system encryption scheme based on stand-alone softdog
CN112118290B (en) Program analysis-based data resource management and control method
Bendersky et al. Advanced software protection now
Hoff et al. System and software security via authentication handshake in EPROM
Wu et al. Binary protection using dynamic fine-grained code hiding and obfuscation
Ruiz et al. Security engineering and modelling of set-top boxes

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant