CN105426704B - A kind of method that protecting computer software is realized based on network service - Google Patents

A kind of method that protecting computer software is realized based on network service Download PDF

Info

Publication number
CN105426704B
CN105426704B CN201510736569.9A CN201510736569A CN105426704B CN 105426704 B CN105426704 B CN 105426704B CN 201510736569 A CN201510736569 A CN 201510736569A CN 105426704 B CN105426704 B CN 105426704B
Authority
CN
China
Prior art keywords
software
intelligent key
timing
key apparatus
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510736569.9A
Other languages
Chinese (zh)
Other versions
CN105426704A (en
Inventor
李健成
朱少华
黄东旭
胡晓帆
冼传燊
黄哲岩
潘健豪
邹振东
蔡晓睿
肖伯翰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Foshan electronic government science and Technology Co., Ltd.
Original Assignee
Foshan Electronic Government Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Foshan Electronic Government Science And Technology Co Ltd filed Critical Foshan Electronic Government Science And Technology Co Ltd
Priority to CN201510736569.9A priority Critical patent/CN105426704B/en
Publication of CN105426704A publication Critical patent/CN105426704A/en
Application granted granted Critical
Publication of CN105426704B publication Critical patent/CN105426704B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1015Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to users
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Abstract

The invention discloses a kind of method that protecting computer software is realized based on network service, the first intelligent key apparatus is connected to server computer, and the second intelligent key apparatus is connected to client computer;The client computer starts the software of its internal installation, and then, whether second intelligent key apparatus of software detection is pulled out, if be pulled out, software directly terminates to run;If be not pulled out, the software sends acquisition IP address and asks to the server computer, while the timing program of the software inhouse starts timing;IP address request is obtained described in the server computer analysis, obtains the client computer IP address, passes to first intelligent key apparatus, first intelligent key apparatus encrypts the IP address and is sent to the client computer;Present invention greatly improves the security of client software.

Description

A kind of method that protecting computer software is realized based on network service
Technical field
The present invention relates to a kind of method for protecting computer software, and in particular to one kind realizes that computer is soft based on network service The method of part protection.
Background technology
Key is a kind of parameter, it is to be converted to ciphertext in plain text or converting ciphertext into the algorithm of plaintext the ginseng that inputs Number.Key is divided into symmetric key and unsymmetrical key.Intelligent key apparatus is a kind of small-sized hard with processor and memory Part device, it can be connected by the data communication interface of computer with computer.It, and can be safe with key systematic function Store key, can preset Encryption Algorithm function.Portion is run intelligent key apparatus in the device completely with the relevant computing of key, and Intelligent key apparatus has the characteristic of attack resistance, and security is high.USB Key are a kind of intelligent key apparatus of USB interface, it Built-in microcontroller or intelligent card chip can store the key or digital certificate of user.In today that Information technology is increasingly flourishing, More and more comprising data message and it is related to individual privacy and the software of business secret is run in a computer, and in computer The software or software of operation are easily artificially illegally distorted in itself or the bootlegging because of pirate, to software users or exploitation Business brings huge economic loss, while further work is not continued.
In practical application, the software run in existing computer is bound with being connected to the intelligent key apparatus of computer, The security of the software run with improving in computer, however, some softwares for containing high security information can only allow at present Run in computer in certain computer or particular range, if illegal user by improper means obtain software and The intelligent key apparatus of software binding, then can use security software, to software users and security information on other computers Bring massive losses.
Then Patent No.:It is 200910083315.6 entitled:A kind of method for protecting computer software, authorizes public Announcement number:The patent of invention of CN101539977B proposes a kind of specific solution, realizes client computer software and leads to Cross the binding that its residing LAN services end computer calculates IP address with client so that protect software can only in the IP Run in client computer in the range of location or a certain number of legitimate ip address lists, leave the client computer then It cannot run, improve the security of client software, while the transmission of IP address needs the encryption of intelligent key apparatus, into one Step improves software and cracks difficulty.
But the computer software by being protected can be run in the range of a certain number of legitimate ip address lists, So if illegal user oneself carrying notebook computer, laptop is accessed in the range of legal IP address list, It can thus replicate and run the computer software.For this defect, it is necessary to which further research is safer so as to find Method for protecting computer software.
The content of the invention
It is an object of the invention to provide a kind of method that protecting computer software is realized based on network service, this method master Will be in order to solve disadvantages described above.
In order to realize the above object the technical solution adopted in the present invention is:One kind realizes computer based on network service The method of software protection, the described method comprises the following steps:
Step A:First intelligent key apparatus is connected to server computer, and the second intelligent key apparatus is connected to client Computer;
Step B:The client computer starts the software of its internal installation, then, the intelligence of software detection second Whether key device is pulled out, if be pulled out, software directly terminates to run;If be not pulled out, the software hair Acquisition IP address is sent to ask to the server computer, while the timing program of the software inhouse starts timing;
Step C:IP address request is obtained described in the server computer analysis, with obtaining the client computer IP Location, passes to first intelligent key apparatus, and first intelligent key apparatus is encrypted the IP address and is sent to described Client computer;
Step D:The client computer receives the encrypted IP address, passes to the second intelligent key dress Put, after second intelligent key apparatus decrypts the encrypted IP address, the IP address is filled with the second intelligent key Put preset legitimate ip address list, if the IP address in the range of the legitimate ip address list, the IP address Legal, second intelligent key apparatus can use;Otherwise the IP address is illegal, and second intelligent key apparatus can not With software terminates to run;
Step E:When the timing program timing of the software inhouse was by X seconds, second intelligent key apparatus of software detection Whether it is pulled out, if be pulled out, EP (end of program) operation, otherwise, program continues to run with and the software detects the always Whether two intelligent key apparatus are pulled out;
Step F:Once detect be pulled out when, record the timing program timing of extraction moment time be m seconds;Program after Timing program resets and restarts timing reforwarding row at the same time;If the timing program timing of the software inhouse was by Y seconds, If the second intelligent key apparatus is not pulled out yet, EP (end of program) operation;
Step G:When the timing program timing of the software inhouse was by X seconds, second intelligent key apparatus of software detection Whether client computer has been connected, if connection, EP (end of program) operation, otherwise, program continues to run with and described soft Part detects whether the second intelligent key apparatus accesses always;
Step H:Once detect accessed when, record the timing program timing of access moment time be n seconds;Program after Timing program resets and stops timing reforwarding row at the same time;If the timing program timing of the software inhouse was by Z seconds, second Intelligent key apparatus does not access yet, then EP (end of program) is run;
Wherein, 3≤X≤5,20 >=Y >=15,20 >=Z >=15;
Step I:The software is using the second key encryption m, n numerical value in the second intelligent key apparatus, then to service Holding computer to send numerical value, whether correct verification is asked, and the server computer receives numerical value, and whether correct verification is asked, warp After the first intelligent key apparatus first key decryption, by m, n compared with the number range being previously stored, if 6≤m ≤ 12 and 6≤n≤15;Then server computer can be no with the order of normal operation to the client computer transmission software Then, the software terminates the order of operation.
Further, communication key is further included in the acquisition IP address request, then analyzes institute in the server computer Before stating IP address request, further include:The client computer generate the communication key at random and be stored in second intelligence it is close Key device, the second key encryption acquisition IP address request hair including communication key in second intelligent key apparatus Send server computer;The server computer receives the encrypted acquisition IP address request including communication key, warp After the first intelligent key apparatus first key decryption, the communication key is stored in the first intelligent key apparatus.
Compared with prior art, the advantage of the invention is that:Even if illegal user copies to the software of the present invention certainly The laptop of band, the laptop carried, which is accessed in the range of legal IP address list, still can not use the present invention's Software, reason are that the software of the present invention realizes encryption by the access and extraction time that detect the second intelligent key apparatus and protects Shield, that is to say, that a period of time (such as 4s) must extract after the second intelligent key apparatus access client computer, extract one Section the time (such as 6s) must access again, only operator be aware of this time password just can be so that software be normally transported OK, otherwise software can terminate to run automatically.
Brief description of the drawings
Fig. 1 is the block diagram of one embodiment of the invention.
Embodiment
Invention is described in further detail below in conjunction with the accompanying drawings.
The content that step A, step B, step C, the step D of the present invention is not described in detail refers to background section and is carried The patent document arrived.
Embodiment:The method that protecting computer software is realized based on network service, the described method comprises the following steps:
Step A:First intelligent key apparatus is connected to server computer, and the second intelligent key apparatus is connected to client Computer;
Step B:The client computer starts the software of its internal installation, then, the intelligence of software detection second Whether key device is pulled out, if be pulled out, software directly terminates to run;If be not pulled out, the software hair Acquisition IP address is sent to ask to the server computer, while the timing program of the software inhouse starts timing;
Step C:IP address request is obtained described in the server computer analysis, with obtaining the client computer IP Location, passes to first intelligent key apparatus, and first intelligent key apparatus is encrypted the IP address and is sent to described Client computer;
Step D:The client computer receives the encrypted IP address, passes to the second intelligent key dress Put, after second intelligent key apparatus decrypts the encrypted IP address, the IP address is filled with the second intelligent key Put preset legitimate ip address list, if the IP address in the range of the legitimate ip address list, the IP address Legal, second intelligent key apparatus can use;Otherwise the IP address is illegal, and second intelligent key apparatus can not With software terminates to run;
Step E:When the timing program timing of the software inhouse was by 3 seconds, second intelligent key apparatus of software detection Whether it is pulled out, if be pulled out, EP (end of program) operation, otherwise, program continues to run with and the software detects the always Whether two intelligent key apparatus are pulled out;
Step F:Once detect be pulled out when, record the timing program timing of extraction moment time be m seconds;Program after Timing program resets and restarts timing reforwarding row at the same time;If the timing program timing of the software inhouse was by 15 seconds When, if the second intelligent key apparatus is not pulled out yet, EP (end of program) operation;
Step G:When the timing program timing of the software inhouse was by 3 seconds, second intelligent key apparatus of software detection Whether client computer has been connected, if connection, EP (end of program) operation, otherwise, program continues to run with and described soft Part detects whether the second intelligent key apparatus accesses always;
Step H:Once detect accessed when, record the timing program timing of access moment time be n seconds;Program after Timing program resets and stops timing reforwarding row at the same time;If the timing program timing of the software inhouse was by 15 seconds, the Two intelligent key apparatus do not access yet, then EP (end of program) is run;
Step I:Server computer judges the size of m, n, if 6≤m≤9 and 6≤n≤8, program continue to run with, Otherwise program directly terminates to run.
The operation principle of the method for the present invention is illustrated with reference to embodiment:Step E, step F corresponding softwares algorithm It is that, if between 6s≤m≤9s, the second intelligent key apparatus is pulled out, then software normal operation, otherwise software terminates to run; Step G, the corresponding software algorithms of step H are, if the second intelligent key apparatus is pulled out, then if 6s≤n after extraction It must be accessed again in≤8s, otherwise program can terminate to run.
Then, client computer sends verification m, n numerical value whether in the range of permissible level to server computer Request, server computer transmit verification result to client computer.
Step E, F, G, H actually correspond to a kind of password, and only operator extracts and accesses in correct time range Second intelligent key apparatus, software just can be with normal operations, and otherwise software directly terminates to run.

Claims (2)

  1. A kind of 1. method that protecting computer software is realized based on network service, it is characterised in that the described method includes following step Suddenly:
    Step A:First intelligent key apparatus is connected to server computer, and the second intelligent key apparatus is connected to client calculating Machine;
    Step B:The client computer starts the software of its internal installation, then, second intelligent key of software detection Whether device is pulled out, if be pulled out, software directly terminates to run;If be not pulled out,
    The software sends acquisition communication key and asks to the server computer;Generation is logical at random for the server computer Key storage is believed in the first intelligent key apparatus, and sends client meter after the first key encryption of the first intelligent key apparatus Calculation machine;The client computer receives the encrypted communication key, and second through second intelligent key apparatus is close The second intelligent key apparatus is stored in after key decryption;Then, the software sends acquisition IP address and asks to the server-side meter Calculation machine, while the timing program of the software inhouse starts timing;
    Step C:The server computer analysis acquisition IP address request, obtains the client computer IP address, First intelligent key apparatus is passed to, first intelligent key apparatus encrypts the IP address and is sent to the client Hold computer;
    Step D:The client computer receives the encrypted IP address, passes to second intelligent key apparatus, institute After stating the second intelligent key apparatus decryption encrypted IP address, the IP address and the second intelligent key apparatus are preset Legitimate ip address list, if the IP address, in the range of the legitimate ip address list, the IP address is legal, institute The second intelligent key apparatus is stated to can use;Otherwise the IP address is illegal, and second intelligent key apparatus is unavailable, software knot Shu Yunhang;
    Step E:When the timing program timing of the software inhouse was by X seconds, whether second intelligent key apparatus of software detection It is pulled out, if be pulled out, EP (end of program) operation, otherwise, program continues to run with and the software detects the second intelligence always Whether energy key device is pulled out;
    Step F:Once detect be pulled out when, record the timing program timing of extraction moment time be m seconds;Program is after reforwarding Timing program resets and restarts timing row at the same time;If the timing program timing of the software inhouse was by Y seconds, second Intelligent key apparatus is not pulled out yet, then EP (end of program) is run;
    Step G:When the timing program timing of the software inhouse was by X seconds, whether second intelligent key apparatus of software detection Client computer is connected, if connection, EP (end of program) operation, otherwise, program continues to run with and the software one Whether the second intelligent key apparatus of straight detection accesses;
    Step H:Once detect accessed when, record the timing program timing of access moment time be n seconds;Program is after reforwarding Timing program resets and stops timing row at the same time;If the timing program timing of the software inhouse was by Z seconds, the second intelligence Key device does not access yet, then EP (end of program) is run;
    Wherein, 3≤X≤5,20 >=Y >=15,20 >=Z >=15;
    Step I:The software is using the second key encryption m, n numerical value in the second intelligent key apparatus, then to server-side meter Calculation machine sends numerical value, and whether correct verification is asked, and the server computer receives numerical value, and whether correct verification is asked, through described After the decryption of first intelligent key apparatus first key, by m, n compared with the number range being previously stored, if 6≤m≤12 And 6≤n≤15;Then server computer can be with the order of normal operation, otherwise, institute to the client computer transmission software State the order that software terminates operation.
  2. A kind of 2. method that protecting computer software is realized based on network service according to claim 1, it is characterised in that Further include communication key in the acquisition IP address request, then before the server computer analyzes the IP address request, Further include:The client computer generates the communication key and is stored in the second intelligent key apparatus at random, and described second The second key encryption acquisition IP address request including communication key in intelligent key apparatus sends server computer; The server computer receives the encrypted acquisition IP address request including communication key, through first intelligent key After the decryption of device first key, the communication key is stored in the first intelligent key apparatus.
CN201510736569.9A 2015-11-01 2015-11-01 A kind of method that protecting computer software is realized based on network service Active CN105426704B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510736569.9A CN105426704B (en) 2015-11-01 2015-11-01 A kind of method that protecting computer software is realized based on network service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510736569.9A CN105426704B (en) 2015-11-01 2015-11-01 A kind of method that protecting computer software is realized based on network service

Publications (2)

Publication Number Publication Date
CN105426704A CN105426704A (en) 2016-03-23
CN105426704B true CN105426704B (en) 2018-05-01

Family

ID=55504912

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510736569.9A Active CN105426704B (en) 2015-11-01 2015-11-01 A kind of method that protecting computer software is realized based on network service

Country Status (1)

Country Link
CN (1) CN105426704B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115348113B (en) * 2022-10-18 2022-12-23 安徽华云安科技有限公司 Man-in-the-middle attack resisting method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101539978A (en) * 2009-04-29 2009-09-23 北京飞天诚信科技有限公司 Software protection method based on space
CN101539977A (en) * 2009-04-29 2009-09-23 北京飞天诚信科技有限公司 Method for protecting computer software
CN101894223A (en) * 2009-05-20 2010-11-24 鸿富锦精密工业(深圳)有限公司 Password protection method and system
CN102170348A (en) * 2010-11-08 2011-08-31 无敌科技(西安)有限公司 Method for achieving encryption and decryption of data through recording user input speed
CN102592088A (en) * 2011-12-28 2012-07-18 广东欧珀移动通信有限公司 Password setting and verifying method
CN102663311A (en) * 2012-03-31 2012-09-12 惠州Tcl移动通信有限公司 Method for releasing screen locking and device thereof
CN102830905A (en) * 2012-07-02 2012-12-19 人民搜索网络股份公司 Device and method for unlocking touch screen equipment based on clicking force

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101539978A (en) * 2009-04-29 2009-09-23 北京飞天诚信科技有限公司 Software protection method based on space
CN101539977A (en) * 2009-04-29 2009-09-23 北京飞天诚信科技有限公司 Method for protecting computer software
CN101894223A (en) * 2009-05-20 2010-11-24 鸿富锦精密工业(深圳)有限公司 Password protection method and system
CN102170348A (en) * 2010-11-08 2011-08-31 无敌科技(西安)有限公司 Method for achieving encryption and decryption of data through recording user input speed
CN102592088A (en) * 2011-12-28 2012-07-18 广东欧珀移动通信有限公司 Password setting and verifying method
CN102663311A (en) * 2012-03-31 2012-09-12 惠州Tcl移动通信有限公司 Method for releasing screen locking and device thereof
CN102830905A (en) * 2012-07-02 2012-12-19 人民搜索网络股份公司 Device and method for unlocking touch screen equipment based on clicking force

Also Published As

Publication number Publication date
CN105426704A (en) 2016-03-23

Similar Documents

Publication Publication Date Title
CN109150835B (en) Cloud data access method, device, equipment and computer readable storage medium
CN101005361B (en) Server and software protection method and system
US7100048B1 (en) Encrypted internet and intranet communication device
CN105740725B (en) A kind of document protection method and system
CN108323230B (en) Method for transmitting key, receiving terminal and distributing terminal
CN209803788U (en) PCIE credible password card
CN109040079A (en) The establishment of live streaming chained address and verification method and related device
CN112597523B (en) File processing method, file conversion encryption machine, terminal, server and medium
CN101894232B (en) Safe input method applied to identity authentication
CN104283686A (en) Digital right management method and system
CN105099705A (en) Safety communication method and system based on USB protocol
CN111600948B (en) Cloud platform application and data security processing method, system, storage medium and program based on identification password
CN110891065A (en) Token-based user identity auxiliary encryption method
CN114244522A (en) Information protection method and device, electronic equipment and computer readable storage medium
CN110225014B (en) Internet of things equipment identity authentication method based on fingerprint centralized issuing mode
CN102523201B (en) User privacy protection method under cloud security environment
CN105022962A (en) Encryption protection method of network hard disk data content
CN110519238A (en) A kind of Internet of Things security system and communication means based on cryptographic technique
CN114244508A (en) Data encryption method, device, equipment and storage medium
CN104901967A (en) Registration method for trusted device
CN105426704B (en) A kind of method that protecting computer software is realized based on network service
Hu Study of file encryption and decryption system using security key
CN109936448A (en) A kind of data transmission method and device
CN110868375A (en) Message receiving method, message sending method, device and electronic equipment
CN111343421B (en) Video sharing method and system based on white-box encryption

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Li Jiancheng

Inventor after: Xiao Bohan

Inventor after: Zhu Shaohua

Inventor after: Huang Dongxu

Inventor after: Hu Xiaofan

Inventor after: Sheng Chuanshen

Inventor after: Huang Zheyan

Inventor after: Pan Jianhao

Inventor after: Zou Zhendong

Inventor after: Cai Xiaorui

Inventor before: Wang Xiangwei

CB03 Change of inventor or designer information
TA01 Transfer of patent application right

Effective date of registration: 20180408

Address after: Chancheng District of Guangdong city in Foshan province 528000 Jihua five road No. 22 building 15 layer Ji Hua

Applicant after: Foshan electronic government science and Technology Co., Ltd.

Address before: 232038 Anhui Province, Huainan city tianjia'an district Mountain West Education College of Huainan Normal University

Applicant before: Wang Xiangwei

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant