CN107368711A - A kind of implementation method for the code protection system that business model support is provided - Google Patents

A kind of implementation method for the code protection system that business model support is provided Download PDF

Info

Publication number
CN107368711A
CN107368711A CN201610310540.9A CN201610310540A CN107368711A CN 107368711 A CN107368711 A CN 107368711A CN 201610310540 A CN201610310540 A CN 201610310540A CN 107368711 A CN107368711 A CN 107368711A
Authority
CN
China
Prior art keywords
code
software
implementation method
encryption
protection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610310540.9A
Other languages
Chinese (zh)
Inventor
徐国庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Global elegant Road Group Co., Ltd.
Original Assignee
徐国庆
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 徐国庆 filed Critical 徐国庆
Priority to CN201610310540.9A priority Critical patent/CN107368711A/en
Publication of CN107368711A publication Critical patent/CN107368711A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Abstract

A kind of implementation method for the code protection system that business model support is provided, including core code, key, code protection container, licensed software, authority composition after common code, encryption;It is exactly briefly that software developer can be allowed selectively to encrypt part or all of code, and developer can specify its business model by the system.Helper applications developer of the present invention simply directly specifies business model, and the software protection between different developers has built bridge with software collaboration.

Description

A kind of implementation method for the code protection system that business model support is provided
Technical field
The present invention relates to protecting computer software field, and specifically, the invention can enter to the executable code after the part of software or compiling Row encryption, and code protection will be provided and support to be combined with providing business model, it is most suitable soft so as to be that user provides under different business scenarios Part protection is supported.
Background technology
For translation type language (language of intermediate code is used including java .net etc.) and regulation engine or workflow, software is held Row code is exactly software code or intermediate code, and this partial code by decompiling or can be directly exposed in face of user and other staff.As long as it is obtained Actuating code is obtained, then system does not just have secret to say.
In order to protect system code, people use the mode of Code obfuscation, localization or code encryption.But these methods are only to specific soft Part system is useful, cannot meet the code after different system software cryptography can also synthetic operation demand, the business model of user can not be supported.
A kind of new code protection system is inventors herein proposed, the system will be integrated into code protection mistake to the Control Technique of business model Cheng Zhong so that software developer easily can be sold the software developed in a different business model, it is also possible that different developers open The module of hair is protected respectively in same system program, and carries out seamless cooperation.
The content of the invention
The system is made up of the core code after common code, encryption, key, code protection container, licensed software, certificate.Common Code is exactly the executable code without encryption, and the core code after encryption is exactly by the code of system protection, and key is exactly that can perform before and after encrypting The conversion bridge of code;Code protection container obtains certificate, using secret key decryption code and performs, common code is exactly based on code protection container Call core code;Licensed software is Generated Certificate, and core code is encrypted by certificate.
The system authorization software can choose whether to specify its useful life, whether verify using catalogue, whether self-defined key, whether refer to Surely machine is run, if it is, what its useful life, operation catalogue, self-defined key, operation machine be.System may further specify that The state of software, calls corresponding interface to change state, and the state change value that then system is specified can change.
Specific implementation step is as follows:
A. licensed software Generates Certificate according to acquired target machine information;
B. licensed software is according to certificate, core code to be protected needed for encryption;
C. the code protection of the core code after the certificate of generation, encryption, the software systems other parts of exploitation, system of the present invention is held Device is deployed to target machine operation;
D. component can according to demand be deployed under different paths and run after different encryptions, and system can configure its environment, and make it that it is used different Key and AES.
Brief description of the drawings
The software of the interpreter languages such as java/.NET is encrypted using traditional mode for accompanying drawing 1, and system can only be carried out once to whole system Encryption, inversely can not call and cooperate.1. protective layer;2 whole system softwares;The actuating code of 3 unencryptions.
Accompanying drawing 2 using the present invention mode the software of the interpreter languages such as java/.NET is encrypted, system can accommodate it is each for encryption or Component cooperation after encryption.Actuating code after the encryption of 4 protective containers 5.
Embodiment
The present invention uses but is not limited to following technological means and application scenario:
Secret unit has used the system made by interpreter language, due to worrying that actuating code is obtained by people, distorted, database sensitive information quilt Leakage, because if dangerous comprising the actuating code to sensitive information Processing Algorithm, then how to be encrypted to sensitive information all dangerous;And if made With system of the present invention, because the actuating code of actuating code or core is encrypted, therefore other people can not obtain and distort, and sensitive information only need to be Slightly encryption during code accesses information, the algorithm to sensitive information processing is safe, and sensitive information is also safe.
Middle unit development company A wishes that the middleware of its exploitation is generally sold to different clients, and its technology is not stolen again, then by it After code encryption other developers are sold to together with code protection container.B Products have used A middleware, while he also uses this hair Bright described system carries out the part of code encryption B companies oneself exploitation.Liang Ge companies all protect the rights and interests of oneself, while seamlessly cooperate with work Make.
Software company can use its software of invented system encryption, can also decontrol code completely.Its product open source code of customer requirement, In order to system maintenance, it is contemplated that technology may be exposed after open source code, client may be also without all events fund be paid, in order to control these The risk of aspect, then software company's selection only encrypt its core code, will belong to the code opening of product maintenance part to client.So he only needs To be that user issues different certificates, or condition conversion is carried out to software using corresponding interface.

Claims (8)

1. the present invention proposes a kind of implementation method of new security system for software, it is characterized in that:In code protection, the branch to business model is extended Hold.
2. the implementation method of protection system according to claim 1, it is characterised in that:Developer may determine whether designated software time limit, fortune Column catalogue, the machine for limiting running software;And designated software time limit, operation catalogue, the machine of running software.
3. the implementation method of protection system according to claim 2, it is characterised in that:The system support status convert, the software protected from When one state is to another condition conversion, if designated software time limit, operation catalogue, the machine for limiting running software, and the software phase specified Limit, operation catalogue, the information such as machine of running software can change.
4. the implementation method of protection system according to claim 1, it is characterised in that:The system is by the core after common intermediate code, encryption Heart code, key, code protection container, licensed software, certificate composition.
5. the implementation method of protection system according to claim 4, it is characterised in that:Obtain target machine information;System is given birth to by licensed software Into certificate;According to certificate encryption core code;The normal codes of core code after encryption, certificate, unencryption are deployed on target machine and performed.
6. the implementation method of new security system for software proposed by the present invention, it is characterised in that:The system can be protected while on a machine, same The software section of the multiple different development of user exploitations run in system, they use no key and encryption mechanism.
7. the implementation method of the protection system according to claim 3 and claim 6, it is characterised in that:The system can allow User Defined Key and AES, code protection container call key and AES operationally code to be decrypted code encryption.
8. the implementation method of the protection system according to claim 1 and claim 6, it is characterised in that:The present invention be applied to regulation engine or Workflow.
CN201610310540.9A 2016-05-11 2016-05-11 A kind of implementation method for the code protection system that business model support is provided Pending CN107368711A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610310540.9A CN107368711A (en) 2016-05-11 2016-05-11 A kind of implementation method for the code protection system that business model support is provided

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610310540.9A CN107368711A (en) 2016-05-11 2016-05-11 A kind of implementation method for the code protection system that business model support is provided

Publications (1)

Publication Number Publication Date
CN107368711A true CN107368711A (en) 2017-11-21

Family

ID=60303965

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610310540.9A Pending CN107368711A (en) 2016-05-11 2016-05-11 A kind of implementation method for the code protection system that business model support is provided

Country Status (1)

Country Link
CN (1) CN107368711A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1591333A (en) * 2003-09-01 2005-03-09 许必熙 Intelligent encryption method capable of identifying computer
CN101082950A (en) * 2007-07-10 2007-12-05 侯同济 Software encrypting registration piracy-preventing method
CN105530236A (en) * 2014-10-20 2016-04-27 帝斯贝思数字信号处理和控制工程有限公司 Protection of software models

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1591333A (en) * 2003-09-01 2005-03-09 许必熙 Intelligent encryption method capable of identifying computer
CN101082950A (en) * 2007-07-10 2007-12-05 侯同济 Software encrypting registration piracy-preventing method
CN105530236A (en) * 2014-10-20 2016-04-27 帝斯贝思数字信号处理和控制工程有限公司 Protection of software models

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张勇: "数字版权管理(DMR)系统的研究、设计和实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Similar Documents

Publication Publication Date Title
CN106462438B (en) The proof of host comprising trusted execution environment
CN105408912B (en) Handle certification and resource grant
CN101872404B (en) Method for protecting Java software program
CN107743133A (en) Mobile terminal and its access control method and system based on trustable security environment
CN101866404B (en) Software system module independent authorization control method and device
CN104794388B (en) application program access protection method and application program access protection device
CN107003866A (en) The safety establishment of encrypted virtual machine from encrypted template
EP2264639B1 (en) Securing executable code integrity using auto-derivative key
CN101142599A (en) Digital rights management system based on hardware identification
WO2007130320A2 (en) Concealment of information in electronic design automation
CN109992987B (en) Script file protection method and device based on Nginx and terminal equipment
CN1863038B (en) Method of implementing control and management of applied program in terminal apparatus
CN104268444A (en) Cloud OS Java source code protection method
CN106304040A (en) The management method of Mobile solution, device
CN101957903A (en) Method and device for protecting class files
CN102456111A (en) Method and system for license control of Linux operating system
Götzfried et al. Soteria: Offline software protection within low-cost embedded devices
CN100367144C (en) Architecture for encrypted application progam installation
US20060259978A1 (en) Secure exchange of information in electronic design automation with license-related key generation
Ozkan et al. Security analysis of mobile authenticator applications
US20150262084A1 (en) Methods for defending static and dynamic reverse engineering of software license control and devices thereof
EP2517140B1 (en) Securing execution of computational resources
CN105022651B (en) A kind of method for preventing piracy in equipment production process and firmware programming device
Park et al. CAFE: A virtualization-based approach to protecting sensitive cloud application logic confidentiality
CN107368711A (en) A kind of implementation method for the code protection system that business model support is provided

Legal Events

Date Code Title Description
DD01 Delivery of document by public notice

Addressee: Xu Guoqing

Document name: Notification of Passing Preliminary Examination of the Application for Invention

PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20180807

Address after: 518000 Guangdong, Shenzhen, Nanshan District, Guangdong Province, nine new 10 South Road, No. nine Shenzhen Bay science and Technology Park 10 B block 17 level No.

Applicant after: Global elegant Road Group Co., Ltd.

Address before: 330000 Chaoyang Tiancheng 6 yuan 1 unit 403, Tao Hua South Road, Xihu District, Nanchang, Jiangxi

Applicant before: Xu Guoqing

WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20171121