CN105426704B - A kind of method that protecting computer software is realized based on network service - Google Patents
A kind of method that protecting computer software is realized based on network service Download PDFInfo
- Publication number
- CN105426704B CN105426704B CN201510736569.9A CN201510736569A CN105426704B CN 105426704 B CN105426704 B CN 105426704B CN 201510736569 A CN201510736569 A CN 201510736569A CN 105426704 B CN105426704 B CN 105426704B
- Authority
- CN
- China
- Prior art keywords
- software
- intelligent key
- timing
- key apparatus
- address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 16
- 238000009434 installation Methods 0.000 claims abstract description 4
- 238000004891 communication Methods 0.000 claims description 13
- 238000012795 verification Methods 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 claims description 3
- 238000000605 extraction Methods 0.000 claims description 2
- 238000001514 detection method Methods 0.000 claims 1
- 238000005516 engineering process Methods 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
- G06F21/1015—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to users
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
Abstract
Description
Claims (2)
- A kind of 1. method that protecting computer software is realized based on network service, it is characterised in that the described method includes following step Suddenly:Step A:First intelligent key apparatus is connected to server computer, and the second intelligent key apparatus is connected to client calculating Machine;Step B:The client computer starts the software of its internal installation, then, second intelligent key of software detection Whether device is pulled out, if be pulled out, software directly terminates to run;If be not pulled out,The software sends acquisition communication key and asks to the server computer;Generation is logical at random for the server computer Key storage is believed in the first intelligent key apparatus, and sends client meter after the first key encryption of the first intelligent key apparatus Calculation machine;The client computer receives the encrypted communication key, and second through second intelligent key apparatus is close The second intelligent key apparatus is stored in after key decryption;Then, the software sends acquisition IP address and asks to the server-side meter Calculation machine, while the timing program of the software inhouse starts timing;Step C:The server computer analysis acquisition IP address request, obtains the client computer IP address, First intelligent key apparatus is passed to, first intelligent key apparatus encrypts the IP address and is sent to the client Hold computer;Step D:The client computer receives the encrypted IP address, passes to second intelligent key apparatus, institute After stating the second intelligent key apparatus decryption encrypted IP address, the IP address and the second intelligent key apparatus are preset Legitimate ip address list, if the IP address, in the range of the legitimate ip address list, the IP address is legal, institute The second intelligent key apparatus is stated to can use;Otherwise the IP address is illegal, and second intelligent key apparatus is unavailable, software knot Shu Yunhang;Step E:When the timing program timing of the software inhouse was by X seconds, whether second intelligent key apparatus of software detection It is pulled out, if be pulled out, EP (end of program) operation, otherwise, program continues to run with and the software detects the second intelligence always Whether energy key device is pulled out;Step F:Once detect be pulled out when, record the timing program timing of extraction moment time be m seconds;Program is after reforwarding Timing program resets and restarts timing row at the same time;If the timing program timing of the software inhouse was by Y seconds, second Intelligent key apparatus is not pulled out yet, then EP (end of program) is run;Step G:When the timing program timing of the software inhouse was by X seconds, whether second intelligent key apparatus of software detection Client computer is connected, if connection, EP (end of program) operation, otherwise, program continues to run with and the software one Whether the second intelligent key apparatus of straight detection accesses;Step H:Once detect accessed when, record the timing program timing of access moment time be n seconds;Program is after reforwarding Timing program resets and stops timing row at the same time;If the timing program timing of the software inhouse was by Z seconds, the second intelligence Key device does not access yet, then EP (end of program) is run;Wherein, 3≤X≤5,20 >=Y >=15,20 >=Z >=15;Step I:The software is using the second key encryption m, n numerical value in the second intelligent key apparatus, then to server-side meter Calculation machine sends numerical value, and whether correct verification is asked, and the server computer receives numerical value, and whether correct verification is asked, through described After the decryption of first intelligent key apparatus first key, by m, n compared with the number range being previously stored, if 6≤m≤12 And 6≤n≤15;Then server computer can be with the order of normal operation, otherwise, institute to the client computer transmission software State the order that software terminates operation.
- A kind of 2. method that protecting computer software is realized based on network service according to claim 1, it is characterised in that Further include communication key in the acquisition IP address request, then before the server computer analyzes the IP address request, Further include:The client computer generates the communication key and is stored in the second intelligent key apparatus at random, and described second The second key encryption acquisition IP address request including communication key in intelligent key apparatus sends server computer; The server computer receives the encrypted acquisition IP address request including communication key, through first intelligent key After the decryption of device first key, the communication key is stored in the first intelligent key apparatus.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510736569.9A CN105426704B (en) | 2015-11-01 | 2015-11-01 | A kind of method that protecting computer software is realized based on network service |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510736569.9A CN105426704B (en) | 2015-11-01 | 2015-11-01 | A kind of method that protecting computer software is realized based on network service |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105426704A CN105426704A (en) | 2016-03-23 |
CN105426704B true CN105426704B (en) | 2018-05-01 |
Family
ID=55504912
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510736569.9A Active CN105426704B (en) | 2015-11-01 | 2015-11-01 | A kind of method that protecting computer software is realized based on network service |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105426704B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115348113B (en) * | 2022-10-18 | 2022-12-23 | 安徽华云安科技有限公司 | Man-in-the-middle attack resisting method |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101539978A (en) * | 2009-04-29 | 2009-09-23 | 北京飞天诚信科技有限公司 | Software protection method based on space |
CN101539977A (en) * | 2009-04-29 | 2009-09-23 | 北京飞天诚信科技有限公司 | Method for protecting computer software |
CN101894223A (en) * | 2009-05-20 | 2010-11-24 | 鸿富锦精密工业(深圳)有限公司 | Password protection method and system |
CN102170348A (en) * | 2010-11-08 | 2011-08-31 | 无敌科技(西安)有限公司 | Method for achieving encryption and decryption of data through recording user input speed |
CN102592088A (en) * | 2011-12-28 | 2012-07-18 | 广东欧珀移动通信有限公司 | Password setting and verifying method |
CN102663311A (en) * | 2012-03-31 | 2012-09-12 | 惠州Tcl移动通信有限公司 | Method for releasing screen locking and device thereof |
CN102830905A (en) * | 2012-07-02 | 2012-12-19 | 人民搜索网络股份公司 | Device and method for unlocking touch screen equipment based on clicking force |
-
2015
- 2015-11-01 CN CN201510736569.9A patent/CN105426704B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101539978A (en) * | 2009-04-29 | 2009-09-23 | 北京飞天诚信科技有限公司 | Software protection method based on space |
CN101539977A (en) * | 2009-04-29 | 2009-09-23 | 北京飞天诚信科技有限公司 | Method for protecting computer software |
CN101894223A (en) * | 2009-05-20 | 2010-11-24 | 鸿富锦精密工业(深圳)有限公司 | Password protection method and system |
CN102170348A (en) * | 2010-11-08 | 2011-08-31 | 无敌科技(西安)有限公司 | Method for achieving encryption and decryption of data through recording user input speed |
CN102592088A (en) * | 2011-12-28 | 2012-07-18 | 广东欧珀移动通信有限公司 | Password setting and verifying method |
CN102663311A (en) * | 2012-03-31 | 2012-09-12 | 惠州Tcl移动通信有限公司 | Method for releasing screen locking and device thereof |
CN102830905A (en) * | 2012-07-02 | 2012-12-19 | 人民搜索网络股份公司 | Device and method for unlocking touch screen equipment based on clicking force |
Also Published As
Publication number | Publication date |
---|---|
CN105426704A (en) | 2016-03-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109150835B (en) | Cloud data access method, device, equipment and computer readable storage medium | |
CN101005361B (en) | Server and software protection method and system | |
US7100048B1 (en) | Encrypted internet and intranet communication device | |
CN105740725B (en) | A kind of document protection method and system | |
CN108323230B (en) | Method for transmitting key, receiving terminal and distributing terminal | |
CN209803788U (en) | PCIE credible password card | |
CN109040079A (en) | The establishment of live streaming chained address and verification method and related device | |
CN112597523B (en) | File processing method, file conversion encryption machine, terminal, server and medium | |
CN101894232B (en) | Safe input method applied to identity authentication | |
CN104283686A (en) | Digital right management method and system | |
CN105099705A (en) | Safety communication method and system based on USB protocol | |
CN111600948B (en) | Cloud platform application and data security processing method, system, storage medium and program based on identification password | |
CN110891065A (en) | Token-based user identity auxiliary encryption method | |
CN114244522A (en) | Information protection method and device, electronic equipment and computer readable storage medium | |
CN110225014B (en) | Internet of things equipment identity authentication method based on fingerprint centralized issuing mode | |
CN102523201B (en) | User privacy protection method under cloud security environment | |
CN105022962A (en) | Encryption protection method of network hard disk data content | |
CN110519238A (en) | A kind of Internet of Things security system and communication means based on cryptographic technique | |
CN114244508A (en) | Data encryption method, device, equipment and storage medium | |
CN104901967A (en) | Registration method for trusted device | |
CN105426704B (en) | A kind of method that protecting computer software is realized based on network service | |
Hu | Study of file encryption and decryption system using security key | |
CN109936448A (en) | A kind of data transmission method and device | |
CN110868375A (en) | Message receiving method, message sending method, device and electronic equipment | |
CN111343421B (en) | Video sharing method and system based on white-box encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Li Jiancheng Inventor after: Xiao Bohan Inventor after: Zhu Shaohua Inventor after: Huang Dongxu Inventor after: Hu Xiaofan Inventor after: Sheng Chuanshen Inventor after: Huang Zheyan Inventor after: Pan Jianhao Inventor after: Zou Zhendong Inventor after: Cai Xiaorui Inventor before: Wang Xiangwei |
|
CB03 | Change of inventor or designer information | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20180408 Address after: Chancheng District of Guangdong city in Foshan province 528000 Jihua five road No. 22 building 15 layer Ji Hua Applicant after: Foshan electronic government science and Technology Co., Ltd. Address before: 232038 Anhui Province, Huainan city tianjia'an district Mountain West Education College of Huainan Normal University Applicant before: Wang Xiangwei |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |