CN105808980A - Detection method and device of illegal use of software - Google Patents
Detection method and device of illegal use of software Download PDFInfo
- Publication number
- CN105808980A CN105808980A CN201610130104.3A CN201610130104A CN105808980A CN 105808980 A CN105808980 A CN 105808980A CN 201610130104 A CN201610130104 A CN 201610130104A CN 105808980 A CN105808980 A CN 105808980A
- Authority
- CN
- China
- Prior art keywords
- software
- time
- registration information
- system time
- illegally modified
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 68
- 238000000034 method Methods 0.000 claims abstract description 17
- 230000002123 temporal effect Effects 0.000 claims description 22
- 239000000284 extract Substances 0.000 claims description 17
- 238000000605 extraction Methods 0.000 claims description 8
- 239000000654 additive Substances 0.000 claims description 3
- 230000000996 additive effect Effects 0.000 claims description 3
- 230000001186 cumulative effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a detection method and device of the illegal use of software. The method comprises the following steps: obtaining software registration information; according to a software registration type identifier in the software registration information, determining a detection type; if the detection type is the detection of software service time, extracting the information of the software service time in the software registration information; obtaining system time and the last service time of the software in the software service time, wherein the system time and the last service time of the software comprise a date part and a moment part exact to second; and when the date part of the last service time of the software is the same with the date part of the system time, judging whether the moment part of the last service time of the software is greater than or equal to the moment part of the system time, and judging that the system time is illegally revised if the moment part of the last service time of the software is greater than or equal to the moment part of the system time. Therefore, the moment part exact to second is used for detecting that the system time is revised, and accuracy for detecting whether the system time is illegally revised or not is improved.
Description
Technical field
The present invention relates to software detection field, particularly relate to detection method and the device of a kind of unauthorized use of software.
Background technology
Along with the development of software industry, after software supplier develops software, user needs to pay to software supplier to obtain licensing of software supplier.But, there are some users, by software registration information or system time are modified, software can be used indefinite duration, it is not necessary to obtained the mandate of software supplier by the mode paid.If can detect whether software registration information or system time are modified, stop these user's unauthorized use of softwares, it will reducing loss to software development team, therefore whether inspection software log-on message or system time are modified is very important.
Traditional detection method mainly includes software and uses time detecting and software access times to detect two kinds.Wherein, traditional software uses in time detecting, software uses temporal information to be only accurate to date, cause that system time is easily modified, and in detection process, only considered system time finally use the situation of time more than or less than software, do not account for when system time finally uses the time equal to software, the situation that software can be used always.If the system time being accurate to date is revised as when using the time equal with software by user, user just can be continuing with software, and above-mentioned detection method lost efficacy, and caused that detection accuracy is relatively low.
Summary of the invention
Based on this, it is necessary to for how being avoided by amendment software registration information and the system time problem that can illegally be continuing with software, it is provided that the detection method of a kind of unauthorized use of software and device.
A kind of detection method of unauthorized use of software, described method includes:
Obtain software registration information;
Detection type is determined according to the software registration type identification in described software registration information;
If described detection type is software uses time detecting, then extracts the software in described software registration information and use temporal information;
Obtain system time and described software uses the software in temporal information finally to use time, described system time and described software to use the time include day part and be accurate to the moment part of second;When described software finally uses the day part of time identical with the day part of described system time, judge that described software finally uses the moment part of time whether be more than or equal to the moment part of described system time, if so, then judge that described system time is illegally modified.
Wherein in an embodiment, at least one step during described method is further comprising the steps of:
Obtain multiple softwares in described software registration information and finally use the time, by judging that the plurality of software finally uses the time whether identical, to detect whether described software registration information is illegally modified;
Extract the software useful life in described software registration information, software finally uses time and deadline time poor, calculate described software useful life and software finally uses the difference of time, whether identical by judging described difference and described deadline time difference, to detect whether described software registration information is illegally modified;
Obtain the software registration date in the day part of described system time and described software registration information, by judging that the described software registration date is whether less than or equal to the day part of described system time, to detect whether described system time is illegally modified.
Wherein in an embodiment, described by judging that the plurality of software finally uses the time whether identical, to detect whether described software registration information is illegally modified, including:
Judge that the plurality of software finally uses the time whether identical;
If it is identical, then allow to be continuing with software, and/or perform the software useful life in the described software registration information of described extraction, software finally uses the time and the step of deadline time difference, and/or performs the step on software registration date in the day part of the described system time of described acquisition and described software registration information;
If differing, then judge that described software registration information is illegally modified.
Wherein in an embodiment, described whether identical by judging described difference and described deadline time difference, to detect whether described software registration information is illegally modified, including:
Judge that whether described difference and described deadline time difference be identical;
If it is identical, then allow to be continuing with software, and/or perform multiple softwares in the described software registration information of described acquisition and finally use the step of time, and/or perform the software registration date in the day part of the described system time of described acquisition and described software registration information;
If differing, then judge that described software registration information is illegally modified.
Wherein in an embodiment, described by judging that the described software registration date is whether less than or equal to the day part of described system time, to detect whether described system time is illegally modified, including:
Judge that the described software registration date is whether less than or equal to the day part of described system time;
If so, then allow to be continuing with software, and/or perform multiple softwares in the described software registration information of described acquisition and finally use the time;And/or perform the software useful life in the described software registration information of described extraction, software finally uses the time and deadline time difference step;
If it is not, then judge that described software registration information is illegally modified.
Wherein in an embodiment, it is described when described software finally uses the day part of time identical with the day part of described system time, judge that described software finally uses the moment part of time whether be more than or equal to the moment part of described system time, if, then judge in the step that described system time is illegally modified, further comprising the steps of:
When the day part of described system time finally uses the day part of time less than described software, then judge that described system time is illegally modified;
When the day part of described system time finally uses the day part of time more than described software, then obtain the software useful life in described system time and described software registration information, by judging that whether described system time is more than described software useful life, so that whether inspection software has arrived at described software useful life.
Wherein in an embodiment, software useful life in the described system time of described acquisition and described software registration information, by judging that whether described system time is more than described software useful life, so that whether inspection software has arrived at described software useful life, including:
Obtain the software useful life in described system time and described software registration information, by judging that whether described system time is more than described software useful life;
If so, then judge that software useful life arrives, terminates software and uses;
If it is not, then allow to be continuing with software.
Wherein in an embodiment, described according to described software registration type identification determine detection type after, also include:
If described detection type is the detections of software access times, then from described software registration information, obtain software access times information, and whether software registration information according to described software access times infomation detection is illegally modified.
Wherein in an embodiment, from described software registration information, obtain software access times information, and whether software registration information according to described software access times infomation detection is illegally modified, including:
The use total degree of software is obtained, already with number of times and residue access times from described software registration information;
Additive operation is carried out to obtain operation values already with number of times and residue access times to described;
Detect whether described software registration information is illegally modified according to described operation values and described use total degree.
Wherein in an embodiment, described according to whether described operation values and the described use total degree described software registration information of detection are illegally modified, including:
Judge that whether described operation values is equal to described use total degree;
If so, when described residue access times are more than 0, then allow to be continuing with;When described residue access times are less than or equal to 0, then terminate software operation;
If it is not, then judge that software registration information is illegally modified.
The detection method of above-mentioned unauthorized use of software, software registration information detection type is determined according to software registration type identification in software registration information, when detecting type and being software use time detecting, the software then extracted in software registration information uses temporal information, and the software obtained in system time and software use temporal information finally uses the time, first comparison software finally uses the day part of time and the day part of system time, when software finally uses the day part of time identical with the day part of system time, judge that software finally uses the moment part of time and the moment part of system time again.So, it is prevented effectively from and system time is revised as software finally uses the time can be continuing with the situation of software.
A kind of detecting device of unauthorized use of software, described device includes:
Log-on message acquisition module, is used for obtaining software registration information;
Detection determination type module, for determining detection type according to the software registration type identification in described software registration information;
Software information extraction module, if being that software uses time detecting for described detection type, then extracts the software in described software registration information and uses temporal information;
Software information detection module, uses the software in temporal information finally to use time, described system time and described software finally to use the time include day part and be accurate to the moment part of second for obtaining system time and described software;When described software finally uses the day part of time identical with the day part of described system time, finally use the moment part of time to carry out contrast with the moment of described system time part according to described software and detect whether described system time is illegally modified.
Wherein in an embodiment, described software information detection module is also additionally operable to perform at least one step in following steps:
Obtain multiple softwares in described software registration information and finally use the time, by judging that the plurality of software finally uses the time whether identical, to detect whether described software registration information is illegally modified;
Extract the software useful life in described software registration information, software finally uses time and deadline time poor, calculate described software useful life and software finally uses the difference of time, whether identical by judging described difference and described deadline time difference, to detect whether described software registration information is illegally modified;
Obtain the software registration date in the day part of described system time and described software registration information, by judging that the described software registration date is whether less than or equal to the day part of described system time, to detect whether described system time is illegally modified.
The detecting device of above-mentioned unauthorized use of software, software registration information detection type is determined according to software registration type identification in software registration information, when detecting type and being software use time detecting, the software then extracted in software registration information uses temporal information, and the software obtained in system time and software use temporal information finally uses the time, first comparison software finally uses the day part of time and the day part of system time, when software finally uses the day part of time identical with the day part of system time, judge that software finally uses the moment part of time and the moment part of system time again.So, effectively avoid and system time is revised as software finally uses the time can be continuing with the situation of software.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of the detection method of unauthorized use of software in an embodiment;
Fig. 2 is the schematic flow sheet detecting the step that type is the detection of software access times in an embodiment;
Fig. 3 is the structured flowchart of the detecting device of unauthorized use of software in an embodiment.
Detailed description of the invention
In order to make the purpose of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein is only in order to explain the present invention, is not intended to limit the present invention.
As shown in Figure 1, it is provided that the detection method of a kind of unauthorized use of software, the method specifically includes following steps:
Step 102, obtains software registration information.
Specifically, being provided with software on equipment, software registration information can be stored in multiple file by software, it is also possible to the content in software registration information is respectively stored in multiple file.Optimal storage mode be software registration information is respectively stored in the software registration file under the root of software, in the Logical Disk at system file place and registration table.During running software can respectively from the software registration file software root, system file place Logical Disk and registration table extract software registration information.Software registration information updates along with operation or the registration of software.
Wherein, software registration type is software when using the time, and corresponding software registration information includes software registration type identification, software useful life, software registration date, software finally use the time, currently whether be currently in use the mark of time type, deadline time is poor.
Software registration type identification: software developer may utilize character definition software registration type identification, as definition software registration type identification be A or B, wherein software use time type be designated A, then software access times type be designated B;Or definition software registration type identification be 01 or 02, software use time type be designated 01, then software access times type be designated 02.
Software useful life: the expiration time that logging software uses, software often re-registers and once just updates once, is accurate to second, example " 2015120523:59:59 ".
The software registration date: on date during record registration, often register and once just update once, be accurate to day, example " 20151205 ".
Software finally uses the time: the record last time using software or software kernels function, is accurate to the second, often uses and once update once, example " 2015111010:15:23 ".
The current mark whether being currently in use time type: represent whether software is now currently in use this software registration type, 1 expression is currently in use, and just uses the information of time type to detect according to software during inspection software log-on message;0 expression does not use, and does not use software to use the information of time type during inspection software log-on message.
Deadline time is poor: refers to software and finally uses the difference between time and software useful life.
Wherein, when software registration type is software access times, corresponding software registration information includes software registration type identification, use total degree, the software registration date, already with number of times, the mark currently whether being currently in use number of times type and residue access times.
Use total degree: refer to user and can use total number of times of software, generally it is as the criterion with the requirement of user, such as 1000 times or 100 times, total degree is used to operate according to the registration of software access times type and update, from first time registration, as long as register according to software access times type, new software uses total degree will not cover the value of last time, and the use total degree using the cumulative last time registration of total degree of current registration can be used, such as the use total degree of last registration is 100 times, current use total degree is 1000, then register complete after, the use total degree of software is exactly 1100, below during registration by that analogy.
Already with number of times: user uses the Core Feature of a software or software, and this numeral just adds 1, and accumulative user is used for how many times.
The current mark whether being currently in use number of times type: represent whether software is now currently in use number of times registration type, 1 represents and is currently in use, and during inspection software log-on message, just information according to software access times type detects;0 expression does not use, and does not use the information of software access times type during inspection software log-on message.
Residue access times: refer to that user there remains the number of times that can use software, when this value is 0, meaning that unless again bought mandate, otherwise cannot normally use the Core Feature of software or software.
Step 104, determines detection type according to the software registration type identification in software registration information.
Specifically, extracting software registration type identification from software registration information, software registration type identification can be at least one in numeral, character and its combination.Software registration type identification mainly includes software and uses the mark of time type and the mark of software access times type.It is arranged on the software on equipment and determines the detection type of correspondence according to the software registration type identification in software registration information.
Step 106, if detection type is software uses time detecting, then the software extracted in software registration information uses temporal information.
Specifically, it is use software to use time registration when determining software registration according to software registration type identification, it is determined that detection type is that software uses time detecting.Temporal information is used further according to the software extracting storage in corresponding software registration information.Software use temporal information includes software registration date, software and finally uses time and deadline time poor.
Step 108, obtains system time and software uses the software in temporal information finally to use time, system time and software finally to use the time include day part and be accurate to the moment part of second;When software finally uses the day part of time identical with the day part of system time, it is judged that whether software finally uses the moment part of time be more than or equal to the moment part of system time, and if so, then the decision-making system time is illegally modified.
Specifically, obtain the system time of current system, and use extraction software temporal information finally to use the time from software.Wherein system time and software finally use the time by being accurate to the day part of date and being accurate to the moment part composition of second.The day part of first extraction system time and software finally use the day part of time, and both day parts are compared.When the day part that software finally uses the day part of time and system time is equal, then the moment part of extraction system time and software finally use the moment part of time, both moment parts are compared, when software finally uses the moment of time to be partially larger than the moment part equal to system time, then the decision-making system time is illegally modified, and terminates any operation of software simultaneously;When software finally uses the moment part of time less than system time, then allow to be continuing with software or continue software is detected, wherein continuing software is detected and can be through judging whether system time exceedes inspection software useful life so that whether the software useful life of inspection software arrives.
In the present embodiment, software registration information detection type is determined according to software registration type identification in software registration information, when detecting type and being software use time detecting, the software then extracted in software registration information uses temporal information, and obtain system time and the software in the software use time finally uses the time, first comparison software finally uses the day part of time and the day part of system time, when software finally uses the day part of time identical with the day part of system time, judge that software finally uses the moment part of time and the moment part of system time again.The method can apply to can install in the arbitrary equipment of software, effectively avoids and system time is revised as software finally uses the time can be continuing with the situation of software.
In one embodiment, the detection method of unauthorized use of software also includes at least one step in step a), step b) and step c):
Step a), obtains multiple softwares in software registration information and finally uses the time, by judging that multiple software finally uses the time whether identical, so that whether inspection software log-on message is illegally modified.
Specifically, from software registration information, extract multiple software finally use the time, plurality of software finally uses the time to be respectively stored in multiple different file or position, whether finally use time comparison multiple software finally use time consistent, if consistent, allow software be continuing with or continue software is detected if extracting multiple software;If it is inconsistent, judge that software registration information is illegally modified, terminate any operation of software simultaneously.
Step b), extract the software useful life in software registration information, software finally uses time and deadline time poor, software for calculation useful life and software finally use the difference of time, whether identical by judging difference and deadline time difference, so that whether inspection software log-on message is illegally modified.
Specifically, obtaining software useful life, software from software registration information finally uses time and deadline time poor, use software useful life to deduct software final time and obtain difference, judge that whether poor with deadline time difference is identical, if identical, then software is allowed to be continuing with or continue software is detected;If it is not the same, then judge that software registration information is illegally modified, and terminates any operation of software simultaneously.
Step c), obtains the software registration date in the day part of system time and software registration information, by judging that the software registration date is whether less than or equal to the day part of system time, to detect whether system time is illegally modified.
Specifically, obtain the day part being accurate to date in system time, and extract the software registration date from software registration information, the software registration date is accurate to date equally, judge that the software registration date is whether less than or equal to the day part of system time, if the software registration date is less than or equal to the day part of system time, then allow be continuing with software or continue software is detected, if the software registration date is more than the day part of system time, then the decision-making system time is illegally modified, and terminates any operation of software simultaneously.
In one embodiment, step a) including: judges that multiple software finally uses the time whether identical;If identical, then allow to be continuing with software, and/or perform at least one step in step b) and step c);If differing, then judge that software registration information is illegally modified, and terminates any operation of software simultaneously.
Specifically, when judging that multiple softwares finally use the time to differ, then judge that software registration information is illegally modified, and terminates any operation of software simultaneously;If it is determined that when multiple softwares finally use the time identical, then allow be continuing with software or continue executing with the step of software detection.
Continue executing with the step of software detection can be specifically extract software useful life in software registration information, software finally uses time and deadline time poor, software for calculation useful life and software finally use the difference of time, judge when difference and deadline time difference differ, determine that software registration information is illegally modified, terminate the step of any operation of software simultaneously;And/or, obtain the software registration date in the day part of system time and software registration information, it is determined that when the software registration date is more than the day part of system time, it is determined that system time is illegally modified, and terminates the step of any operation of software simultaneously.
In one embodiment, step b) including: judges that whether difference and deadline time difference be identical;If identical, then allow to be continuing with software, and/or perform at least one step in step c) and step a);If differing, then judge that software registration information is illegally modified, terminate software operation.
Specifically, when judging that difference differs with deadline time difference, then judge that software registration information is illegally modified, and terminates any operation of software;If it is determined that difference poor with deadline time identical time, then allow be continuing with software or continue executing with the step of software detection.
Continuing executing with the step of software detection can be specifically obtain the software registration date in the day part of system time and software registration information, judging that the software registration date is whether during less than or equal to the day part of system time, it is determined that system time is illegally modified and terminates the step of any operation of software;And/or, obtain multiple softwares in software registration information and finally use the time, when judging that multiple softwares finally use the time identical, it is determined that system time is illegally modified and terminates the step of any operation of software.
In one embodiment, step c) including: judges that the software registration date is whether less than or equal to the day part of system time;If so, then allow to be continuing with software, and/or perform at least one step in step a) and step b);If it is not, then judge that software registration information is illegally modified, terminate software operation.
Specifically, when judging that the software registration date is more than the day part of system time, then judge that software registration information is illegally modified, then terminate any operation of software;When judging that the software registration date is less than or equal to the day part of system time, then allow be continuing with software or continue executing with the step of software detection.
Continuing executing with the step of software detection can be specifically obtain multiple softwares in software registration information finally to use the time, when judging that multiple softwares finally use the time identical, it is determined that system time is illegally modified and terminates the step of any operation of software;And/or, extract the software useful life in software registration information, software finally uses time and deadline time poor, software for calculation useful life and software finally use the difference of time, when judging that difference and deadline time difference differ, it is determined that software registration information is modified and terminates the step of any operation of software.
In a preferred embodiment, obtaining multiple softwares in software registration information and finally use the time, relatively whether multiple softwares finally use the time identical, if there is the situation that software finally uses the time to differ, then judge that software registration information is illegally modified, and terminates the use of software.
If multiple softwares finally use the time identical, then extract the software useful life in software registration information, software finally uses time and deadline time poor, software useful life and software finally use the time carry out subtracting each other and obtain the two difference, the two difference and deadline time difference are compared, judge that whether difference and deadline time difference be identical, if differing, then judge that software registration information is illegally modified, then terminate the use of software.
If the difference that software useful life finally uses the time with software is poor with deadline time identical, then obtain the software registration date in the day part of system time and software registration information, the day part of system time and software registration date are compared, if the software registration date is more than the day part of system time, then judge that software registration information is illegally modified, and terminates the use of software;If the software registration date is less than or equal to the day part of system time, then perform step 108.
In one embodiment, step 108 is further comprising the steps of:
When the day part of system time finally uses the day part of time less than software, then the decision-making system time is illegally modified, and terminates any operation of software simultaneously.
When the day part of system time finally uses the day part of time more than software, then obtain the software useful life in system time and described software registration information, by judging that whether described system time is more than software useful life, if, then judge that software useful life arrives, terminate software and use;If it is not, then allow to be continuing with software.
In the present embodiment, it is possible to judge whether software registration information or system time are modified by different detecting steps, it is also possible to detect by combining multiple detecting step, improve the accuracy of detection, make detection method more rigorous.
As in figure 2 it is shown, in one embodiment, after step 104, the concrete detection type that also includes is the step that software access times detect, and specifically comprises the following steps that
Step 202, if detection type is the detections of software access times, extracts the use total degree of software, already with number of times and residue access times from software registration information.
Specifically, after determining the detection of software access times, extract the use total degree in software registration information, already with software access times information such as number of times and residue access times.
Step 204, carries out additive operation to already with number of times and residue access times, to obtain the sum already with number of times and residue access times.
Step 206, it is judged that already with number of times with residue access times and whether equal with using total degree;If so, step 210 is then performed;If it is not, then perform step 208.
Concrete, when software registration information is not illegally modified, already with number of times and residue access times and be equal with using total degree, if unequal, then it represents that software registration information is illegally modified.
Step 208, it is determined that software registration information is illegally modified;After step 208, step 212 is performed.
Specifically, judge when software registration information is illegally modified, represent that user uses software in uncommitted situation, there is the suspicion being modified software registration information to be continuing with software, after judging that software registration information is illegally modified, terminate any operation of software.
Step 210, it is judged that whether residue access times are more than 0;If so, step 214 is then performed;If it is not, then perform step 212.
Specifically, judge already with number of times and residue access times and with use total equal time, represent software registration information be not illegally modified, but if residue access times more than 0, represent can also continue to normally use software;Otherwise, representing the use total degree using the number of times of software to reach software, it is impossible to be continuing with this software, terminate software operation, user needs the usage charges again paying software just can be continuing with software.
Step 212, terminates any operation of software.
Step 214, it is allowed to be continuing with software.
In the present embodiment, extract from software registration information software use total degree, already with number of times and residue access times, the software access times information extracted is calculated and contrasts, so that it is determined that whether software registration information is illegally modified.By software access times information being carried out simply calculating and contrast, improve the accuracy judging whether software registration information is illegally modified.
As it is shown on figure 3, in one embodiment, it is provided that the detecting device 300 of a kind of unauthorized use of software, this device specifically includes: log-on message acquisition module 302, detection determination type module 304, software information extraction module 306 and software information detection module 308.
Log-on message acquisition module 302, is used for obtaining software registration information.
Detection determination type module 304, for determining detection type according to the software registration type identification in software registration information.
Software information extraction module 306, if being that software uses time detecting for detection type, then the software extracted in software registration information uses temporal information.
Software information detection module 308, uses the software in temporal information finally to use time, system time and software finally to use the time include day part and be accurate to the moment part of second for obtaining system time and software;When software finally uses the day part of time identical with the day part of system time, finally use according to software the moment part of time to carry out contrast with the moment part of system time and detect whether system time is illegally modified.
In the present embodiment, software registration information detection type is determined according to software registration type identification in software registration information, when detecting type and being software use time detecting, the software then extracted in software registration information uses temporal information, and obtain system time and the software in the software use time finally uses the time, first comparison software finally uses the day part of time and the day part of system time, when software finally uses the day part of time identical with the day part of system time, judge that software finally uses the moment part of time and the moment part of system time again.This device can apply to can install in the arbitrary equipment of software, effectively avoids and system time is revised as software finally uses the time can be continuing with the situation of software.
In one embodiment, software information detection module 308 is additionally operable to perform at least one step in following steps:
Obtain multiple softwares in software registration information and finally use the time, by judging that multiple software finally uses the time whether identical, so that whether inspection software log-on message is illegally modified.
Extract the software useful life in software registration information, software finally uses time and deadline time poor, software for calculation useful life and software finally use the difference of time, whether identical by judging difference and deadline time difference, so that whether inspection software log-on message is illegally modified.
Obtain the software registration date in the day part of system time and software registration information, by judging that the software registration date is whether less than or equal to the day part of system time, to detect whether system time is illegally modified.
In the present embodiment, it is possible to by different detecting steps is judged whether software registration information or system time are modified, it is also possible to detect by combining multiple detecting step, improve the accuracy of detection, make detection method more rigorous.
Each technical characteristic of embodiment described above can combine arbitrarily, for making description succinct, the all possible combination of each technical characteristic in above-described embodiment is not all described, but, as long as the combination of these technical characteristics is absent from contradiction, all it is considered to be the scope that this specification is recorded.
Embodiment described above only have expressed the several embodiments of the present invention, and it describes comparatively concrete and detailed, but can not therefore be construed as limiting the scope of the patent.It should be pointed out that, for the person of ordinary skill of the art, without departing from the inventive concept of the premise, it is also possible to making some deformation and improvement, these broadly fall into protection scope of the present invention.Therefore, the protection domain of patent of the present invention should be as the criterion with claims.
Claims (12)
1. a detection method for unauthorized use of software, described method includes:
Obtain software registration information;
Detection type is determined according to the software registration type identification in described software registration information;
If described detection type is software uses time detecting, then extracts the software in described software registration information and use temporal information;
Obtain system time and described software uses the software in temporal information finally to use time, described system time and described software finally to use the time include day part and be accurate to the moment part of second;When described software finally uses the day part of time identical with the day part of described system time, judge that described software finally uses the moment part of time whether be more than or equal to the moment part of described system time, if so, then judge that described system time is illegally modified.
2. method according to claim 1, it is characterised in that at least one step during described method is further comprising the steps of:
A) obtain multiple softwares in described software registration information and finally use the time, by judging that the plurality of software finally uses the time whether identical, to detect whether described software registration information is illegally modified;
B) extract the software useful life in described software registration information, software finally uses time and deadline time poor, calculate described software useful life and software finally uses the difference of time, whether identical by judging described difference and described deadline time difference, to detect whether described software registration information is illegally modified;
C) the software registration date in the day part of described system time and described software registration information is obtained, by judging that the described software registration date is whether less than or equal to the day part of described system time, to detect whether described system time is illegally modified.
3. method according to claim 2, it is characterised in that by judging that the plurality of software finally uses the time whether identical in described step a), to detect whether described software registration information is illegally modified, including:
Judge that the plurality of software finally uses the time whether identical;
If identical, then allow to be continuing with software, and/or perform described step b), and/or perform described step c);
If differing, then judge that described software registration information is illegally modified.
4. method according to claim 2, it is characterised in that whether identical by judging described difference and described deadline time difference in described step b), to detect whether described software registration information is illegally modified, including:
Judge that whether described difference and described deadline time difference be identical;
If identical, then allow to be continuing with software, and/or perform described step a), and/or perform described step c);
If differing, then judge that described software registration information is illegally modified.
5. method according to claim 2, it is characterised in that by judging that the described software registration date is whether less than or equal to the day part of described system time in described step c), to detect whether described system time is illegally modified, including:
Judge that the described software registration date is whether less than or equal to the day part of described system time;
If so, then allow to be continuing with software, and/or perform described step a), and/or perform described step b);
If it is not, then judge that described software registration information is illegally modified.
6. method according to claim 1, it is characterized in that, it is described when described software finally uses the day part of time identical with the day part of described system time, judge that described software finally uses the moment part of time whether be more than or equal to the moment part of described system time, if, then judge in the step that described system time is illegally modified, further comprising the steps of:
When the day part of described system time finally uses the day part of time less than described software, then judge that described system time is illegally modified;
When the day part of described system time finally uses the day part of time more than described software, then obtain the software useful life in described system time and described software registration information, by judging that whether described system time is more than described software useful life, so that whether inspection software has arrived at described software useful life.
7. method according to claim 6, it is characterized in that, software useful life in the described system time of described acquisition and described software registration information, by judging that whether described system time is more than described software useful life, so that whether inspection software has arrived at described software useful life, including:
Obtain the software useful life in described system time and described software registration information, by judging that whether described system time is more than described software useful life;
If so, then judge that software useful life arrives, terminates software and uses;
If it is not, then allow to be continuing with software.
8. method according to claim 1, it is characterised in that described according to the software registration type identification in described software registration information determine detection type after, also include:
If described detection type is the detections of software access times, then from described software registration information, obtain software access times information, and whether software registration information according to described software access times infomation detection is illegally modified.
9. method according to claim 8, it is characterised in that obtain software access times information from described software registration information, and whether software registration information according to described software access times infomation detection is illegally modified, including:
The use total degree of software is obtained, already with number of times and residue access times from described software registration information;
Additive operation is carried out to obtain operation values already with number of times and residue access times to described;
Detect whether described software registration information is illegally modified according to described operation values and described use total degree.
10. method according to claim 9, it is characterised in that described according to whether described operation values and the described use total degree described software registration information of detection are illegally modified, including:
Judge that whether described operation values is equal to described use total degree;
If so, when described residue access times are more than 0, then allow to be continuing with;When described residue access times are less than or equal to 0, then terminate software operation;
If it is not, then judge that software registration information is illegally modified.
11. the detecting device of a unauthorized use of software, it is characterised in that described device includes:
Log-on message acquisition module, is used for obtaining software registration information;
Detection determination type module, for determining detection type according to the software registration type identification in described software registration information;
Software information extraction module, if being that software uses time detecting for described detection type, then extracts the software in described software registration information and uses temporal information;
Software information detection module, uses the software in temporal information finally to use time, described system time and described software finally to use the time include day part and be accurate to the moment part of second for obtaining system time and described software;When described software finally uses the day part of time identical with the day part of described system time, finally use the moment part of time to carry out contrast with the moment of described system time part according to described software and detect whether described system time is illegally modified.
12. device according to claim 11, it is characterised in that described software information detection module is also additionally operable to perform at least one step in following steps:
Obtain multiple softwares in described software registration information and finally use the time, by judging that the plurality of software finally uses the time whether identical, to detect whether described software registration information is illegally modified;
Extract the software useful life in described software registration information, software finally uses time and deadline time poor, calculate described software useful life and software finally uses the difference of time, whether identical by judging described difference and described deadline time difference, to detect whether described software registration information is illegally modified;
Obtain the software registration date in the day part of described system time and described software registration information, by judging that the described software registration date is whether less than or equal to the day part of described system time, to detect whether described system time is illegally modified.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610130104.3A CN105808980B (en) | 2016-03-07 | 2016-03-07 | The detection method and device of unauthorized use of software |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610130104.3A CN105808980B (en) | 2016-03-07 | 2016-03-07 | The detection method and device of unauthorized use of software |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105808980A true CN105808980A (en) | 2016-07-27 |
CN105808980B CN105808980B (en) | 2019-06-11 |
Family
ID=56466889
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610130104.3A Active CN105808980B (en) | 2016-03-07 | 2016-03-07 | The detection method and device of unauthorized use of software |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105808980B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106250727A (en) * | 2016-08-16 | 2016-12-21 | 深圳市冠旭电子股份有限公司 | A kind of method for protecting software and device |
CN107403078A (en) * | 2017-06-27 | 2017-11-28 | 深圳市元征科技股份有限公司 | The restriction application method and terminal of a kind of application |
CN111079132A (en) * | 2019-12-27 | 2020-04-28 | 深圳市元征科技股份有限公司 | User authority management method, device and related equipment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1702596A (en) * | 2005-07-08 | 2005-11-30 | 北京北大方正电子有限公司 | Method for protecting content of digital works for hand-held devices |
CN101777002A (en) * | 2010-01-18 | 2010-07-14 | 杭州宇酷信息技术有限公司 | Software running method based on virtualization |
CN102208003A (en) * | 2010-03-31 | 2011-10-05 | 鸿富锦精密工业(深圳)有限公司 | Software program protection system and method |
US20120041878A1 (en) * | 2004-12-27 | 2012-02-16 | Mtekvision Co., Ltd. | Method And System For Authenticating Software License |
CN103577727A (en) * | 2013-11-13 | 2014-02-12 | 深圳市创维群欣安防科技有限公司 | Software deadline verifying method and device |
CN105046115A (en) * | 2015-09-15 | 2015-11-11 | 北京深思数盾科技有限公司 | Method and apparatus for detecting tampering with software operation time |
CN105138900A (en) * | 2015-07-30 | 2015-12-09 | 珠海格力电器股份有限公司 | Control method and system for validity period of single-machine software |
-
2016
- 2016-03-07 CN CN201610130104.3A patent/CN105808980B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120041878A1 (en) * | 2004-12-27 | 2012-02-16 | Mtekvision Co., Ltd. | Method And System For Authenticating Software License |
CN1702596A (en) * | 2005-07-08 | 2005-11-30 | 北京北大方正电子有限公司 | Method for protecting content of digital works for hand-held devices |
CN101777002A (en) * | 2010-01-18 | 2010-07-14 | 杭州宇酷信息技术有限公司 | Software running method based on virtualization |
CN102208003A (en) * | 2010-03-31 | 2011-10-05 | 鸿富锦精密工业(深圳)有限公司 | Software program protection system and method |
CN103577727A (en) * | 2013-11-13 | 2014-02-12 | 深圳市创维群欣安防科技有限公司 | Software deadline verifying method and device |
CN105138900A (en) * | 2015-07-30 | 2015-12-09 | 珠海格力电器股份有限公司 | Control method and system for validity period of single-machine software |
CN105046115A (en) * | 2015-09-15 | 2015-11-11 | 北京深思数盾科技有限公司 | Method and apparatus for detecting tampering with software operation time |
Non-Patent Citations (1)
Title |
---|
FASCN工作室: "《电脑安全高手秘笈666招》", 30 June 2005, 西安电子科技大学出版社 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106250727A (en) * | 2016-08-16 | 2016-12-21 | 深圳市冠旭电子股份有限公司 | A kind of method for protecting software and device |
CN107403078A (en) * | 2017-06-27 | 2017-11-28 | 深圳市元征科技股份有限公司 | The restriction application method and terminal of a kind of application |
CN111079132A (en) * | 2019-12-27 | 2020-04-28 | 深圳市元征科技股份有限公司 | User authority management method, device and related equipment |
Also Published As
Publication number | Publication date |
---|---|
CN105808980B (en) | 2019-06-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6047463B2 (en) | Evaluation apparatus and method for evaluating security threats | |
CN109117250A (en) | A kind of simulator recognition methods, identification equipment and computer-readable medium | |
CN103297267B (en) | A kind of methods of risk assessment of network behavior and system | |
CN110661863B (en) | Request processing method and device, electronic equipment and storage medium | |
CN107016473B (en) | Risk control method and equipment | |
CN109145590B (en) | Function hook detection method, detection equipment and computer readable medium | |
CN105808980A (en) | Detection method and device of illegal use of software | |
CN105205358A (en) | Method for identifying Android APP reinforcement and detection method | |
CN109062667A (en) | A kind of simulator recognition methods, identification equipment and computer-readable medium | |
CN109543408A (en) | A kind of Malware recognition methods and system | |
CN103870244B (en) | Task stack overflow detection algorithm for SPARC (scalable processor architecture) platform | |
CN105306610A (en) | Network identifier detection method and device | |
CN107291487A (en) | CONFIG.SYS amending method and system | |
CN108765786A (en) | Quick Response Code withdrawal safe verification method and its system, computer storage media | |
CN104063288A (en) | Process management method and device | |
CN104636661A (en) | Method and system for analyzing Android application program | |
CN105205395B (en) | Malware automated detection method | |
CN104035655B (en) | The method and device that control character input method is shown | |
CN112418714A (en) | Building construction data safety detection method and device and server | |
KR20180089997A (en) | Measuring Similarity System and Method of Android Application Using Text Mining | |
CN104932885B (en) | A kind of information processing method and electronic equipment | |
CN112328515B (en) | Equipment detection method and device | |
CN205862457U (en) | Also system rented by a kind of lock box and vehicle | |
CN108062463A (en) | It is a kind of that packet inspection method and system are beaten again based on screenshot picture | |
CN103973708B (en) | A kind of determination method and system for the event that leaks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |