CN105808980B - The detection method and device of unauthorized use of software - Google Patents

The detection method and device of unauthorized use of software Download PDF

Info

Publication number
CN105808980B
CN105808980B CN201610130104.3A CN201610130104A CN105808980B CN 105808980 B CN105808980 B CN 105808980B CN 201610130104 A CN201610130104 A CN 201610130104A CN 105808980 B CN105808980 B CN 105808980B
Authority
CN
China
Prior art keywords
software
time
registration information
system time
finally
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610130104.3A
Other languages
Chinese (zh)
Other versions
CN105808980A (en
Inventor
汤俊辉
陈淑娟
麦祎祺
钟彩青
陈淡芳
刘芬
肖豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen New Industries Biomedical Engineering Co Ltd
Original Assignee
Shenzhen New Industries Biomedical Engineering Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen New Industries Biomedical Engineering Co Ltd filed Critical Shenzhen New Industries Biomedical Engineering Co Ltd
Priority to CN201610130104.3A priority Critical patent/CN105808980B/en
Publication of CN105808980A publication Critical patent/CN105808980A/en
Application granted granted Critical
Publication of CN105808980B publication Critical patent/CN105808980B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of detection method of unauthorized use of software and device, method includes: acquisition software registration information;Detection type is determined according to the software registration type identification in software registration information;If detection type is that software is detected using the time, the software extracted in software registration information uses temporal information;It obtains system time and software and finally uses the time using the software in temporal information, part at the time of system time and software are finally included day part and are accurate to second using the time;When software finally uses the day part of time identical with the day part of system time, part at the time of whether part is more than or equal to system time at the time of software finally uses the time is judged, if so, the decision-making system time is illegally modified.In this way, modified according to part at the time of being accurate to second come the detection system time, the accuracy whether the detection system time be illegally modified improved.

Description

The detection method and device of unauthorized use of software
Technical field
The present invention relates to software detection fields, more particularly to the detection method and device of a kind of unauthorized use of software.
Background technique
With the development of software industry, after software supplier develops software, user needs to software supplier Payment is to obtain licensing for software supplier.But there are some users, when by software registration information or system Between modify, can indefinite duration use software, without obtaining the authorization of software supplier by way of payment.If energy Detect whether software registration information or system time are modified, and prevent these user's unauthorized use of software, it will to software system Make team and reduce loss, therefore whether inspection software registration information or system time are very important by modification.
Traditional detection method mainly includes that software uses two kinds of time detection and software access times detection.Wherein, it passes For the software of system using in time detection, software is only accurate to the date using temporal information, causes system time to hold easily modified, And only considered the case where system time finally uses the time more than or less than software in the detection process, it does not account for when being The case where system time is equal to software when finally using the time, and software can be used always.If user will be accurate to the date System time be revised as with software using the time it is equal when, user can continue to use software, above-mentioned detection method failure, Cause detection accuracy lower.
Summary of the invention
Based on this, it is necessary to can illegally continue to make for how to avoid passing through modification software registration information and system time The problem of with software, provides the detection method and device of a kind of unauthorized use of software.
A kind of detection method of unauthorized use of software, which comprises
Obtain software registration information;
Detection type is determined according to the software registration type identification in the software registration information;
If the detection type is that software is detected using the time, when extracting the software use in the software registration information Between information;
Obtain system time and the software and finally use the time using the software in temporal information, the system time and The part at the time of software is included day part and be accurate to second using the time;When the software finally uses the date of time When part is identical with the day part of the system time, judge whether part is greater than at the time of the software finally uses the time Part at the time of equal to the system time, if so, determining that the system time is illegally modified.
The method also includes at least one steps in following steps in one of the embodiments:
It obtains multiple softwares in the software registration information and finally uses the time, made by judging the multiple software finally It is whether identical with the time, to detect whether the software registration information is illegally modified;
Extract the software service life in the software registration information, software finally uses time and deadline time poor, meter It calculates the software service life and software finally uses the difference of time, by judging that the difference is with the deadline time difference It is no identical, to detect whether the software registration information is illegally modified;
The software registration date in the day part and the software registration information of the system time is obtained, judgement is passed through Whether whether the software registration date is less than or equal to the day part of the system time, non-to detect the system time Method modification.
It is described by judging that the multiple software finally uses the time whether identical in one of the embodiments, with inspection Survey whether the software registration information is illegally modified, comprising:
Judge that the multiple software finally uses the time whether identical;
If they are the same, then allow to continue to use software, and/or execute the software extracted in the software registration information to make The step of time and deadline time difference are finally used with time limit, software, and/or execute the date for obtaining the system time Partially with the software registration date in software registration information the step of;
If not identical, determine that the software registration information is illegally modified.
It is described by judging whether the difference and the deadline time difference are identical in one of the embodiments, with inspection Survey whether the software registration information is illegally modified, comprising:
Judge whether the difference and the deadline time difference are identical;
If they are the same, then allow to continue to use software, and/or execute multiple softwares in the acquisition software registration information The step of finally using the time, and/or execute the day part and the software registration information for obtaining the system time In the software registration date;
If not identical, determine that the software registration information is illegally modified.
It is described by when judging whether the software registration date is less than or equal to the system in one of the embodiments, Between day part, to detect whether the system time is illegally modified, comprising:
Judge whether the software registration date is less than or equal to the day part of the system time;
If so, allow to continue to use software, and/or executes and described obtain in the software registration information multiple softwares most The time is used afterwards;And/or the execution software service life extracted in the software registration information, software finally use the time With the step of deadline time difference;
If it is not, then determining that the software registration information is illegally modified.
The day part and the system time that the time is finally used when the software in one of the embodiments, Day part it is identical when, judge at the time of the software finally uses the time whether part is more than or equal to the system time Moment part, if so, determine in the step of system time is illegally modified, it is further comprising the steps of:
When the day part of the system time, which is less than the software, finally uses the day part of time, then institute is determined System time is stated to be illegally modified;
When the day part of the system time, which is greater than the software, finally uses the day part of time, then institute is obtained The software service life in system time and the software registration information is stated, by judging it is described whether the system time is greater than Whether software service life has arrived at the software service life with inspection software.
The software obtained in the system time and the software registration information uses in one of the embodiments, Whether the time limit is had arrived at described by judging whether the system time is greater than the software service life with inspection software Software service life, comprising:
The software service life in the system time and the software registration information is obtained, when by judging the system Between whether be greater than the software service life;
If so, determining that software service life has arrived, terminates software and use;
If it is not, then allowing to continue to use software.
In one of the embodiments, it is described detection type is determined according to the software registration type identification after, also wrap It includes:
If the detection type is the detection of software access times, acquisition software is used secondary from the software registration information Number information, and whether the software registration information according to the software access times infomation detection is illegally modified.
Software access times information is obtained from the software registration information in one of the embodiments, and according to institute State whether software registration information described in software access times infomation detection is illegally modified, comprising:
Software is obtained from the software registration information uses total degree, access times and remaining access times;
Add operation is carried out to obtain operation values to the access times and remaining access times;
Detect whether the software registration information is illegally modified according to the operation values and the use total degree.
It is described in one of the embodiments, to detect the software registration using total degree with described according to the operation values Whether information is illegally modified, comprising:
It is described using total degree to judge whether the operation values are equal to;
If so, then allowing to continue to use when the remaining access times are greater than 0;When the remaining access times are less than When equal to 0, then software operation is terminated;
If it is not, then determining that software registration information is illegally modified.
The detection method of above-mentioned unauthorized use of software determines software according to software registration type identification in software registration information Registration information detection type, when detection type is that software is detected using the time, then the software extracted in software registration information makes It with temporal information, and obtains system time and software and finally uses the time using the software in temporal information, first comparison software is most Afterwards using the day part of the day part of time and system time, when software finally uses the day part and system of time Between day part it is identical when, then judge at the time of software finally uses the time part at the time of part and system time.In this way, Effectively avoid for system time being revised as the case where software finally can continue to use software using the time.
A kind of detection device of unauthorized use of software, described device include:
Registration information obtains module, for obtaining software registration information;
Detection type determining module, for determining detection according to the software registration type identification in the software registration information Type;
Software information extraction module extracts the software if detecting for software using the time for the detection type Software in registration information uses temporal information;
Software information detection module is finally made for obtaining system time and the software using the software in temporal information With the time, the part at the time of system time and the software are finally included day part and are accurate to second using the time;? It is last according to the software when software finally uses the day part of time identical with the day part of the system time It is whether non-to detect the system time using partially being compared with part at the time of the system time at the time of time Method modification.
The software information detection module is also also used to execute at least one in following steps in one of the embodiments, A step:
It obtains multiple softwares in the software registration information and finally uses the time, made by judging the multiple software finally It is whether identical with the time, to detect whether the software registration information is illegally modified;
Extract the software service life in the software registration information, software finally uses time and deadline time poor, meter It calculates the software service life and software finally uses the difference of time, by judging that the difference is with the deadline time difference It is no identical, to detect whether the software registration information is illegally modified;
The software registration date in the day part and the software registration information of the system time is obtained, judgement is passed through Whether whether the software registration date is less than or equal to the day part of the system time, non-to detect the system time Method modification.
The detection device of above-mentioned unauthorized use of software determines software according to software registration type identification in software registration information Registration information detection type, when detection type is that software is detected using the time, then the software extracted in software registration information makes It with temporal information, and obtains system time and software and finally uses the time using the software in temporal information, first comparison software is most Afterwards using the day part of the day part of time and system time, when software finally uses the day part and system of time Between day part it is identical when, then judge at the time of software finally uses the time part at the time of part and system time.In this way, It effectively avoids and system time is revised as the case where software finally can continue to use software using the time.
Detailed description of the invention
Fig. 1 is the flow diagram of the detection method of unauthorized use of software in one embodiment;
Fig. 2 is the flow diagram for the step of detection type is the detection of software access times in one embodiment;
Fig. 3 is the structural block diagram of the detection device of unauthorized use of software in one embodiment.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
As shown in Figure 1, provide a kind of detection method of unauthorized use of software, this method specifically includes the following steps:
Step 102, software registration information is obtained.
Specifically, software is installed in equipment, software registration information can be stored in multiple files by software, can also The content in software registration information to be respectively stored in multiple files.Optimal storage mode is to distinguish software registration information It stores in the software registration file under the root of software, in the Logical Disk where system file and registration table.Software fortune It can be soft from being extracted in the software registration file under software root, in Logical Disk where system file and registration table respectively when row Part registration information.Software registration information is updated with the operation or registration of software.
Wherein, when software registration type is that software uses the time, corresponding software registration information includes software registration type Whether mark, software service life, software registration date, software are finally used the mark of time type using the time, currently Knowledge, deadline time are poor.
Software registration type identification: software developer can utilize character definition software registration type identification, such as define software Registration type is identified as A or B, wherein software is using the A that is identified as of time type, then software access times type is identified as B; Or defining software registration type identification is 01 or 02, software is identified as 01 using time type, then software access times type Be identified as 02.
Software service life: the expiration time that logging software uses, software often re-register primary just update once, accurately To second, example " 20151205 23:59:59 ".
The software registration date: on date when record registration, every registration is once primary with regard to updating, and is accurate to day, example “20151205”。
Software finally uses the time: record last time uses the time of software or software kernels function, is accurate to the second, often Primary, example " 20151110 10:15:23 " is updated using primary.
The mark of time type currently whether is used: indicating whether software is used this software registration class at this time Type, 1 indicates to be used, and when inspection software registration information is just detected according to software using the information of time type;0 indicates not It uses, uses the information of time type when inspection software registration information without using software.
Deadline time is poor: referring to that software finally uses the difference between time and software service life.
Wherein, when software registration type is software access times, corresponding software registration information includes software registration type Mark, using total degree, the software registration date, the number used, currently whether be used number type mark and Remaining access times.
It uses total degree: referring to that total number of software can be used in user, be generally subject to the requirement of user, such as It 1000 times or 100 times, is operated and is updated according to the registration of software access times type using total degree, from registering first time, As long as registered according to software access times type, new software will not cover the value of last time using total degree, and understand It is with the total degree that uses using the cumulative last time registration of total degree currently registered, such as the total degree that uses of last registration 100 times, be specifically 1000 using total degree, then after registration finishes, software is exactly 1100 using total degree, behind when registering And so on.
The number used: as soon as user uses the core function of time software or software, this number plus 1 adds up to use Family is used for how many times.
The mark of number type currently whether is used: indicating whether software is used number registration type at this time, 1 Expression is used, and when inspection software registration information is just detected according to the information of software access times type;0 indicates not make With information when, inspection software registration information without using software access times type.
Remaining access times: referring to that user there remains the number for being able to use software, when this value is 0, means that and removes Non- purchase authorization again, otherwise can not normal use software or software core function.
Step 104, detection type is determined according to the software registration type identification in software registration information.
Specifically, software registration type identification is extracted from software registration information, software registration type identification can be number At least one of word, character and a combination thereof.Software registration type identification mainly include software using the mark of time type and The mark of software access times type.The software in equipment is mounted on according to the software registration type identification in software registration information Determine corresponding detection type.
Step 106, if detection type is that software is detected using the time, when extracting the software use in software registration information Between information.
It specifically, is to be registered using software using the time when determining software registration according to software registration type identification, then Determine that detection type is that software is detected using the time.When being used further according to the software for extracting storage in corresponding software registration information Between information.Software includes that software registration date, software finally use time and deadline time poor using temporal information.
Step 108, system time and software are obtained and finally uses the time using the software in temporal information, system time and Part at the time of software is finally included day part and be accurate to second using the time;When software finally uses the day part of time When identical with the day part of system time, judge whether part is more than or equal to system time at the time of software finally uses the time At the time of part, if so, the decision-making system time is illegally modified.
Specifically, the system time of current system is obtained, and is finally used from software using extraction software in temporal information Time.Wherein system time and software are finally using the time by the day part for being accurate to the date and at the time of being accurate to second Part is constituted.The day part and software of first extraction system time finally use the day part of time, to the date portion of the two Divide and is compared.When software finally use the time day part and system time day part it is equal when, then extraction system Part and software part at the time of finally use the time at the time of time, part is compared at the time of to the two, when software most When being partially larger than part at the time of being equal to system time at the time of using the time afterwards, then the decision-making system time is illegally modified, together When terminate software any operation;When being partially less than system time at the time of software finally uses the time, then allow to continue to make With software or continue to detect software, wherein continuing to carry out software detection can be by whether judging system time Whether arrived more than inspection software service life with the software service life of inspection software.
In the present embodiment, determine that software registration information detects class according to software registration type identification in software registration information Type then extracts the software in software registration information using temporal information, and obtain when detection type is that software is detected using the time System time and software is taken finally to use the time using the software in the time, first comparison software finally uses the day part of time With the day part of system time, when software finally uses the day part of time identical with the day part of system time, Part at the time of part and system time at the time of software finally uses the time is judged again.This method can be applied to mountable soft In the arbitrary equipment of part, effectively avoids and system time is revised as software finally can continue to use software using the time Situation.
In one embodiment, the detection method of unauthorized use of software further includes in step a), step b) and step c) At least one step:
Step a) obtains multiple softwares in software registration information and finally uses the time, made by judging multiple softwares finally It is whether identical with the time, whether it is illegally modified with inspection software registration information.
Specifically, multiple softwares are extracted from software registration information and finally use the time, and plurality of software finally uses Time is respectively stored in multiple and different file or position, extracts multiple softwares and finally uses time and more multiple softwares It is finally whether consistent using the time, allow software to continue to use or continue to detect software if consistent;If different It causes, then determines that software registration information is illegally modified, while terminating any operation of software.
Step b), extract software registration information in software service life, software finally use time and deadline time poor, Software for calculation service life and software finally use the difference of time, by judging whether difference is identical as deadline time difference, with Whether inspection software registration information is illegally modified.
Specifically, acquisition software service life, software finally use time and deadline time poor from software registration information, Software final time is subtracted using software service life and obtains difference, judges whether difference is identical as deadline time difference, if phase Together, then software is allowed to continue to use or continue to detect software;If it is not the same, then determining that software registration information is non- Method modification, while terminating any operation of software.
Step c) obtains the software registration date in the day part and software registration information of system time, passes through judgement Whether whether the software registration date is less than or equal to the day part of system time, be illegally modified with the detection system time.
Specifically, it obtains and is accurate to the day part of date in system time, and extract from software registration information soft Part registration date, software registration date are equally accurate to the date, judge whether the software registration date is less than or equal to system time Day part, if the software registration date be less than or equal to system time day part, allow to continue to use software or after Continuous to detect to software, if the software registration date is greater than the day part of system time, the decision-making system time is illegally repaired Change, while terminating any operation of software.
In one embodiment, step a) includes: to judge that multiple softwares finally use the time whether identical;If they are the same, then Allow to continue to use software, and/or executes at least one step in step b) and step c);If not identical, determine that software is infused Volume information is illegally modified, while terminating any operation of software.
Specifically, when determining that multiple softwares finally use the time not identical, then determine that software registration information is illegally repaired Change, while terminating any operation of software;If it is determined that then allowing to continue to use software when multiple softwares finally use the time identical Or the step of continuing to execute software detection.
The step of continuing to execute software detection specifically can be the software service life extracted in software registration information, software Finally poor using time and deadline time, software for calculation service life and software finally use the difference of time, determine difference with When deadline time difference is not identical, determine that software registration information is illegally modified, while the step of terminating any operation of software; And/or software registration date in the day part and software registration information of system time is obtained, determine that the software registration date is big When the day part of system time, determine that system time is illegally modified, while the step of terminating any operation of software.
In one embodiment, step b) includes: to judge whether difference is identical as deadline time difference;If they are the same, then allow Software is continued to use, and/or executes at least one step in step c) and step a);If not identical, determine that software registration is believed Breath is illegally modified, and terminates software operation.
Specifically, when determining that difference and deadline time difference be not identical, then determine that software registration information is illegally modified, eventually Only any operation of software;If it is determined that then allowing to continue to use software when difference is identical as deadline time difference or continuing to execute soft The step of part detects.
The step of continuing to execute software detection specifically can be the day part and software registration information for obtaining system time In the software registration date, determine the software registration date whether be less than or equal to the day part of system time when, determine system The step of time is illegally modified and terminates any operation of software;And/or multiple softwares are last in acquisition software registration information Determine that system time is illegally modified and terminates software when determining that multiple softwares finally use the time identical using the time The step of any operation.
In one embodiment, step c) includes: to judge whether the software registration date is less than or equal to the date of system time Part;If so, allowing to continue to use software, and/or execute at least one step in step a) and step b);If it is not, then Determine that software registration information is illegally modified, terminates software operation.
Specifically, when determining that the software registration date is greater than the day part of system time, then determine software registration information It is illegally modified, then terminates any operation of software;Determining that the software registration date is less than or equal to the day part of system time When, then allow the step of continuing to use software or continuing to execute software detection.
The step of continuing to execute software detection, which specifically can be, obtains in software registration information multiple softwares when finally using Between, when determining that multiple softwares finally use the time identical, determine that system time is illegally modified and terminates any behaviour of software The step of making;And/or the software service life in extraction software registration information, software finally use time and deadline time poor, Software for calculation service life and software finally use the difference of time, when determining that difference and deadline time difference be not identical, determine The step of software registration information is modified and terminates any operation of software.
In a preferred embodiment, multiple softwares in software registration information are obtained and finally use the time, it is more multiple Whether software finally uses the time identical, if software occur finally uses time different situation, determines that software registration is believed Breath is illegally modified, and terminates the use of software.
If multiple softwares finally use the time identical, software service life in software registration information, software are extracted most It is poor using time and deadline time afterwards, finally subtracted each other software service life and software to obtain the two difference using the time, The two difference is compared with deadline time difference, judges whether difference is identical as deadline time difference, if not identical, is determined soft Part registration information is illegally modified, then terminates the use of software.
If software service life and software finally use the difference of time identical as deadline time difference, system time is obtained Day part and software registration information in the software registration date, by the day part of system time and software registration date into Row compares, if the software registration date is greater than the day part of system time, determines that software registration information is illegally modified, and terminates The use of software;If the software registration date is less than or equal to the day part of system time, 108 are thened follow the steps.
In one embodiment, step 108 is further comprising the steps of:
When the day part of system time, which is less than software, finally uses the day part of time, then decision-making system time quilt Illegal modifications, while terminating any operation of software.
When the day part of system time be greater than software finally use the day part of time when, then obtain system time and Software service life in the software registration information, by judging whether the system time is greater than software service life, if It is then to determine that software service life has arrived, terminates software and use;If it is not, then allowing to continue to use software.
In the present embodiment, can determine whether software registration information or system time are repaired by different detecting steps Change, can also be detected by combining a variety of detecting steps, improve the accuracy of detection, keep detection method tighter Sincerely.
As shown in Fig. 2, in one embodiment, step 104 specifically further includes that detection type is software access times later The step of detection, the specific steps are as follows:
Step 202, if detection type is the detection of software access times, the use that software is extracted from software registration information is total Number, access times and remaining access times.
Specifically, after determining the detection of software access times, using total degree, having made in software registration information is extracted With the softwares access times information such as number and remaining access times.
Step 204, add operation is carried out to access times and remaining access times, with obtain access times and The sum of remaining access times.
Step 206, judgement access times and residue access times sum with use total degree whether equal;If so, Then follow the steps 210;If it is not, thening follow the steps 208.
Specifically, when software registration information is not illegally modified, the sum of access times and remaining access times with make Be with total degree it is equal, if unequal, then it represents that software registration information is illegally modified.
Step 208, determine that software registration information is illegally modified;After step 208, step 212 is executed.
Specifically, when determining that software registration information is illegally modified, indicate user in the case where uncommitted using soft There is the suspicion that software is continued to use by modification software registration information in part, be illegally modified in judgement software registration information Afterwards, any operation of software is terminated.
Step 210, judge whether remaining access times are greater than 0;If so, thening follow the steps 214;If it is not, thening follow the steps 212。
Specifically, when the sum for determining access times and remaining access times is equal with sum is used, software is indicated Registration information is not illegally modified, but if remaining access times are greater than 0, expression can also continue to normal use software;It is no Then, it indicates the use total degree for having reached software using the number of software, cannot be used continuously the software, terminate software behaviour Make, user needs the usage charges for paying software again that can just continue to use software.
Step 212, any operation of software is terminated.
Step 214, allow to continue to use software.
In the present embodiment, making using total degree, access times and residue for software is extracted from software registration information With number, extracted software access times information is calculated and compared, so that it is determined that whether software registration information is non- Method modification.By the way that software access times information is simply calculated and compared, improves and whether determine software registration information The accuracy being illegally modified.
As shown in figure 3, in one embodiment, providing a kind of detection device 300 of unauthorized use of software, the device is specific It include: that registration information obtains module 302, detection type determining module 304, software information extraction module 306 and software information inspection Survey module 308.
Registration information obtains module 302, for obtaining software registration information.
Detection type determining module 304, for determining detection according to the software registration type identification in software registration information Type.
Software information extraction module 306 extracts software registration letter if detecting for software using the time for detection type Software in breath uses temporal information.
Software information detection module 308 is finally made for obtaining system time and software using the software in temporal information With the time, part at the time of system time and software are finally included day part and are accurate to second using the time;It is last in software When using the day part of time and the identical day part of system time, at the time of finally using the time according to software part with Part, which compares, at the time of system time comes whether the detection system time is illegally modified.
In the present embodiment, determine that software registration information detects class according to software registration type identification in software registration information Type then extracts the software in software registration information using temporal information, and obtain when detection type is that software is detected using the time System time and software is taken finally to use the time using the software in the time, first comparison software finally uses the day part of time With the day part of system time, when software finally uses the day part of time identical with the day part of system time, Part at the time of part and system time at the time of software finally uses the time is judged again.The device can be applied to mountable soft In the arbitrary equipment of part, effectively avoids and system time is revised as software finally can continue to use software using the time Situation.
In one embodiment, software information detection module 308 is also used to execute at least one step in following steps:
It obtains multiple softwares in software registration information and finally uses the time, be using the time by judging multiple softwares finally It is no identical, whether it is illegally modified with inspection software registration information.
Software service life, software in extraction software registration information finally use time and deadline time poor, calculate soft Part service life and software finally use the difference of time, soft to detect by judging whether difference is identical as deadline time difference Whether part registration information is illegally modified.
The software registration date in the day part and software registration information of system time is obtained, by judging software registration Whether whether the date is less than or equal to the day part of system time, be illegally modified with the detection system time.
In the present embodiment, can by different detecting steps is determined software registration information or system time whether by Modification can also be detected by combining a variety of detecting steps, improve the accuracy of detection, keep detection method tighter Sincerely.
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited In contradiction, all should be considered as described in this specification.
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to protection of the invention Range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.

Claims (12)

1. a kind of detection method of unauthorized use of software, which comprises
Respectively from extraction software is infused in the software registration file under software root, in Logical Disk where system file and registration table Volume information;It include that multiple softwares being stored in different positions respectively finally use the time in the software registration information;
Detection type is determined according to the software registration type identification in the software registration information;
If the detection type is that software is detected using the time, obtains system time and extracted from the software registration information Multiple softwares finally use the time;The system time and the multiple software include finally day part and essence using the time Part at the time of really to the second;
When determining that the multiple software finally uses the time not identical, it is determined that the software registration information is illegally modified, Terminate software operation;
When determining that the multiple software finally uses the time identical, and software finally use the time day part and the system When the day part of time is identical, when judging whether part is more than or equal to the system at the time of software finally uses the time Between at the time of part, if so, determining that the system time is illegally modified.
2. the method according to claim 1, wherein the method also includes at least one of following steps steps It is rapid:
B) the software service life in the software registration information is extracted, software finally uses time and deadline time poor, calculating The software service life and software finally use the difference of time, by judging whether are the difference and the deadline time difference It is identical, to detect whether the software registration information is illegally modified;
C) the software registration date in the day part and the software registration information of the system time is obtained, by judging The day part whether the software registration date be less than or equal to the system time is stated, it is whether illegal to detect the system time Modification.
3. according to the method described in claim 2, it is characterized in that, the method also includes:
Judge that the multiple software finally uses the time whether identical;
If they are the same, then allow to continue to use software, alternatively, executing the step b) and/or executing the step c);
If not identical, determine that the software registration information is illegally modified.
4. according to the method described in claim 2, it is characterized in that, by judging the difference and the phase in the step b) Whether the limit time difference is identical, to detect whether the software registration information is illegally modified, comprising:
Judge whether the difference and the deadline time difference are identical;
If they are the same, then allow to continue to use software, and/or execute the step c);
If not identical, determine that the software registration information is illegally modified.
5. according to the method described in claim 2, it is characterized in that, by judging the software registration date in the step c) Whether the day part of the system time is less than or equal to, to detect whether the system time is illegally modified, comprising:
Judge whether the software registration date is less than or equal to the day part of the system time;
If so, allowing to continue to use software, and/or execute the step b);
If it is not, then determining that the software registration information is illegally modified.
6. the method according to claim 1, wherein the day part for finally using the time when the software When identical with the day part of the system time, judge whether part is more than or equal at the time of the software finally uses the time The part at the time of system time further includes following step if so, determining in the step of system time is illegally modified It is rapid:
When the day part of the system time, which is less than the software, finally uses the day part of time, then the system is determined The system time is illegally modified;
When the day part of the system time, which is greater than the software, finally uses the day part of time, then the system is obtained Software service life in system time and the software registration information, by judging whether the system time is greater than the software Whether service life has arrived at the software service life with inspection software.
7. according to the method described in claim 6, it is characterized in that, the acquisition system time and software registration letter Software service life in breath is with inspection software by judging whether the system time is greater than the software service life It is no to have arrived at the software service life, comprising:
The software service life in the system time and the software registration information is obtained, by judging that the system time is It is no to be greater than the software service life;
If so, determining that software service life has arrived, terminates software and use;
If it is not, then allowing to continue to use software.
8. the method according to claim 1, wherein the software registration according in the software registration information Type identification determines after detection type, further includes:
If the detection type is the detection of software access times, software access times letter is obtained from the software registration information Breath, and whether the software registration information according to the software access times infomation detection is illegally modified.
9. according to the method described in claim 8, it is characterized in that, obtaining software access times from the software registration information Information, and whether the software registration information according to the software access times infomation detection is illegally modified, comprising:
Software is obtained from the software registration information uses total degree, access times and remaining access times;
Add operation is carried out to obtain operation values to the access times and remaining access times;
Detect whether the software registration information is illegally modified according to the operation values and the use total degree.
10. according to the method described in claim 9, it is characterized in that, described use total degree with described according to the operation values Detect whether the software registration information is illegally modified, comprising:
It is described using total degree to judge whether the operation values are equal to;
If so, then allowing to continue to use when the remaining access times are greater than 0;When the remaining access times are less than or equal to 0 When, then terminate software operation;
If it is not, then determining that software registration information is illegally modified.
11. a kind of detection device of unauthorized use of software, which is characterized in that described device includes:
Registration information obtains module, for the logic from the software registration file under software root, where system file respectively Software registration information is extracted in disk and registration table;It is stored in different positions respectively including multiple in the software registration information In software finally use the time;
Detection type determining module, for determining detection class according to the software registration type identification in the software registration information Type;
Software information extraction module, if being that software was detected using the time for the detection type, obtain system time and from The multiple softwares extracted in the software registration information finally use the time;The system time and the multiple software finally make Part at the time of being included day part and be accurate to second with the time;
Software information detection module, for when determining that the multiple software finally uses the time not identical, it is determined that described soft Part registration information is illegally modified, and terminates software operation;When determining that the multiple software finally uses the time identical, and software is most When identical with the day part of the system time using the day part of time afterwards, the time is finally used according to the software Moment part is compared with part at the time of the system time to detect whether the system time is illegally modified.
12. device according to claim 11, which is characterized in that the software information detection module be also also used to execute with At least one step in lower step:
Extract the software service life in the software registration information, software finally uses time and deadline time poor, calculating institute State the difference that software service life and software finally use the time, by judge the difference and the deadline time difference whether phase Together, to detect whether the software registration information is illegally modified;
The software registration date in the day part and the software registration information of the system time is obtained, by described in judgement Whether the software registration date is less than or equal to the day part of the system time, to detect whether the system time is illegally repaired Change.
CN201610130104.3A 2016-03-07 2016-03-07 The detection method and device of unauthorized use of software Active CN105808980B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610130104.3A CN105808980B (en) 2016-03-07 2016-03-07 The detection method and device of unauthorized use of software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610130104.3A CN105808980B (en) 2016-03-07 2016-03-07 The detection method and device of unauthorized use of software

Publications (2)

Publication Number Publication Date
CN105808980A CN105808980A (en) 2016-07-27
CN105808980B true CN105808980B (en) 2019-06-11

Family

ID=56466889

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610130104.3A Active CN105808980B (en) 2016-03-07 2016-03-07 The detection method and device of unauthorized use of software

Country Status (1)

Country Link
CN (1) CN105808980B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106250727A (en) * 2016-08-16 2016-12-21 深圳市冠旭电子股份有限公司 A kind of method for protecting software and device
CN107403078A (en) * 2017-06-27 2017-11-28 深圳市元征科技股份有限公司 The restriction application method and terminal of a kind of application
CN111079132A (en) * 2019-12-27 2020-04-28 深圳市元征科技股份有限公司 User authority management method, device and related equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1702596A (en) * 2005-07-08 2005-11-30 北京北大方正电子有限公司 Method for protecting content of digital works for hand-held devices
CN102208003A (en) * 2010-03-31 2011-10-05 鸿富锦精密工业(深圳)有限公司 Software program protection system and method
CN103577727A (en) * 2013-11-13 2014-02-12 深圳市创维群欣安防科技有限公司 Software deadline verifying method and device
CN105046115A (en) * 2015-09-15 2015-11-11 北京深思数盾科技有限公司 Method and apparatus for detecting tampering with software operation time
CN105138900A (en) * 2015-07-30 2015-12-09 珠海格力电器股份有限公司 Control method and system for validity period of standalone software

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100516826B1 (en) * 2004-12-27 2005-09-26 엠텍비젼 주식회사 Method and system for authenticating software license
CN101777002B (en) * 2010-01-18 2012-12-19 杭州宇酷信息技术有限公司 Software running method based on virtualization

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1702596A (en) * 2005-07-08 2005-11-30 北京北大方正电子有限公司 Method for protecting content of digital works for hand-held devices
CN102208003A (en) * 2010-03-31 2011-10-05 鸿富锦精密工业(深圳)有限公司 Software program protection system and method
CN103577727A (en) * 2013-11-13 2014-02-12 深圳市创维群欣安防科技有限公司 Software deadline verifying method and device
CN105138900A (en) * 2015-07-30 2015-12-09 珠海格力电器股份有限公司 Control method and system for validity period of standalone software
CN105046115A (en) * 2015-09-15 2015-11-11 北京深思数盾科技有限公司 Method and apparatus for detecting tampering with software operation time

Also Published As

Publication number Publication date
CN105808980A (en) 2016-07-27

Similar Documents

Publication Publication Date Title
CN104123493B (en) The safety detecting method and device of application program
CN105808980B (en) The detection method and device of unauthorized use of software
CN103577748B (en) Dynamic measuring method based on dependable computing and management system
Phan et al. Quantifying information leaks using reliability analysis
Kang et al. Changes in US inflation persistence
CN108989150A (en) A kind of login method for detecting abnormality and device
CN105022957B (en) Method for detecting malicious program on demand and electronic device thereof
CN109302410A (en) A kind of internal user anomaly detection method, system and computer storage medium
CN106716382A (en) Methods and systems for aggregated multi-application behavioral analysis of mobile device behaviors
CN106529283B (en) A kind of software-oriented defines network-based control device safety quantitative analysis method
CN110048997A (en) The security system and method for handling failure injection attacks
CN109308411B (en) Method and system for hierarchically detecting software behavior defects based on artificial intelligence decision tree
CN112749389B (en) Detection method and device for detecting vulnerability of intelligent contract damage sensitive data
CN110414222A (en) A kind of application privacy leakage failure detecting method and device based on component liaison
CN105138903A (en) ROP attack detection method based on RET instructions and JMP instructions
CN109543408A (en) A kind of Malware recognition methods and system
US11720462B2 (en) Physical execution monitor
CN106650438A (en) Method and device for detecting baleful programs
CN110222243A (en) Determine the method, apparatus and storage medium of abnormal behaviour
CN109842858A (en) A kind of service exception order detection method and device
US7827534B2 (en) Method for determining operational characteristics of a program
Nabi et al. A process of security assurance properties unification for application logic
CN103678841A (en) Monitoring alarm method and device for game
CN104486353B (en) A kind of security incident detection method and device based on flow
CN102681936B (en) Verification method and device for test result of financial system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant