CN107609359A - For protecting the method and system of software - Google Patents

For protecting the method and system of software Download PDF

Info

Publication number
CN107609359A
CN107609359A CN201710917542.9A CN201710917542A CN107609359A CN 107609359 A CN107609359 A CN 107609359A CN 201710917542 A CN201710917542 A CN 201710917542A CN 107609359 A CN107609359 A CN 107609359A
Authority
CN
China
Prior art keywords
feature
characteristic
software
type
level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710917542.9A
Other languages
Chinese (zh)
Other versions
CN107609359B (en
Inventor
孙吉平
张伟双
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Senseshield Technology Co Ltd
Original Assignee
Beijing Senseshield Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Senseshield Technology Co Ltd filed Critical Beijing Senseshield Technology Co Ltd
Priority to CN201710917542.9A priority Critical patent/CN107609359B/en
Publication of CN107609359A publication Critical patent/CN107609359A/en
Application granted granted Critical
Publication of CN107609359B publication Critical patent/CN107609359B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

Present disclose provides a kind of method for protecting software, wherein using the security component with protected software binding to protect protected software, methods described includes:During protected software is run, the detection of respective type feature is carried out to protected software according to the characteristic type for the industrial characteristic data being stored in industrial characteristic database corresponding with the protected software;When feature corresponding with the characteristic type is detected in the protected software, predetermined measures are taken to the protected software.Additionally provide a kind of security component for being used to protect software.The method and security component of the present invention can carry out depth customized treatment to development using industrial characteristic database and depth is protected.

Description

For protecting the method and system of software
Technical field
The present invention relates to the method and system of field of software protection, more particularly, to protection software.
Background technology
After software developer issues software, often perplexed by problem of piracy.Software piracy refers to be agreed to without owner In the case of, the behavior replicated to its software, distributed, and with infringing products made of this behavior.
In terms of software piracy, bootlegger generally carries out the mode such as increase appended document is as pirate patch to software Processing so that consumer can avoid the related checking of software owner and use the function of the software, it is generally pirate soft Part can not provide legal document of title (rights certificate), can not provide the user after-sale service, but consumer is due to stealing Version software cheap freely is also intended to use piracy software.
Because the software product iteration of present society itself is very fast, if software developer takes judicial means to solve to steal Version problem, not only right-safeguarding cost is high, and poor in timeliness.Thus whenever running into piracy, software developer's common method is oneself A large amount of human and material resources and time are spent to analyze the problem of piracy collected on the market, customizes corresponding encipherment scheme, Software is issued again again to solve problem of piracy.By this method come handle be the shortcomings that software piracy problem it is following Aspect:
1. adding the development cost of software developer, and special messenger is needed to handle corresponding work, thus it is overall Right-safeguarding cost increase;
2. because above-mentioned safety-related processing method and the logic of software in itself do not have much relations, common software is opened Hair business is usual and is bad at, unable to do what one wishes in processing, it is impossible to reach the Expected Results for ensureing that software ownership is inviolable;
3rd, whenever running into pirate, it is necessary to issue the version of software again, it is more passive to handle this problem;
The antivirus software of current each software developer's exploitation, can be to all target softwares on terminal device for working as The preceding viral trojan horse detection of prevalence and killing on the market, realize the protection to target software, but protect plan to a certain extent It is slightly relatively single.
The content of the invention
An object of the present invention, which is to provide, to be carried out using industrial characteristic database to development at depth customization Reason and the method and system of depth protection.
According to an aspect of the present invention, there is provided a kind of method for protecting software, bound using with protected software Security component protected software is protected, this method includes:During protected software is run, according to being stored in and quilt The characteristic type of the industrial characteristic data in industrial characteristic database corresponding to software is protected to carry out respective class to protected software The detection of type feature;When feature corresponding with characteristic type is detected in protected software, to protected software Take predetermined measures.
In one embodiment, detection type includes the detection of pirate patch feature and/or cracks analysis tool feature Detection.
In one embodiment, industrial characteristic data include industry ID, characteristic type and feature.
In one embodiment, industrial characteristic database is hierarchical structure, and the first level in hierarchical structure includes described Feature, the second level include the feature of profession identity, detection type and each detection type and first level The mapping relations of content.
In one embodiment, industrial characteristic database is hierarchical structure, and the first level in hierarchical structure includes described Feature, the second level include combinations of features mark and each combinations of features and the feature of first level Mapping relations, third layer level include profession identity, detection type and each detection type and the spy in first level Levy the mapping relations of the combinations of features mark in content and/or the second level.
In one embodiment, according to the characteristic type for the industrial characteristic data being stored in industrial characteristic database to quilt The detection that protection software carries out respective type feature is included according to the industrial characteristic number being stored in industrial characteristic database According to combinations of features to protected software carry out respective type feature detection.
In one embodiment, industrial characteristic data include memory features data, window name characteristic, process feature Data.
In one embodiment, industrial characteristic database obtains from service end.
According to another aspect of the present invention, there is provided a kind of system for protecting software, the system include security component, The security component is bound to be protected to it with protected software, and the security component includes:Detection unit, it is configured as During protected software is run, according to the industrial characteristic data being stored in industrial characteristic database corresponding with protected software Characteristic type to protected software carry out respective type feature detection;Processing unit, it is configured as being protected When feature corresponding with characteristic type is detected in software, predetermined measures are taken to protected software.
In one embodiment, detection type includes the detection of pirate patch feature and/or cracks analysis tool feature Detection.
In one embodiment, industrial characteristic data include industry ID, characteristic type and feature.
In one embodiment, industrial characteristic database is hierarchical structure, and the first level in hierarchical structure includes described Feature, the second level include the feature of profession identity, detection type and each detection type and first level The mapping relations of content.
In one embodiment, industrial characteristic database is hierarchical structure, and the first level in hierarchical structure includes described Feature, the second level include combinations of features mark and each combinations of features and the feature of first level Mapping relations, third layer level include profession identity, detection type and each detection type and the spy in first level Levy the mapping relations of the combinations of features mark in content and/or the second level.
In one embodiment, processing unit is additionally configured to according to the industrial characteristic being stored in industrial characteristic database The combinations of features of data carries out the detection of respective type feature to protected software.
In one embodiment, industrial characteristic data include memory features data, window name characteristic, process feature Data.
In one embodiment, industrial characteristic database obtains from service end.
The method according to the invention and security component, pirate patch feature for different industries software and/or are cracked point Tool characteristics are analysed, different types of detection is carried out to the target software of different industries, can accomplish to shoot the arrow at the target, improve detection Depth and efficiency, so as to realize the customized treatment that depth is carried out to different industries software.
The present invention is solved the problems, such as to there is no customized treatment and the protection for carrying out depth for development at present, realized More targeted protection is carried out to development, so as to reduce the problem of piracy of development.
Brief description of the drawings
Embodiment of the disclosure is illustrated in an illustrative manner with reference to accompanying drawing, and accompanying drawing is the part of this specification. Accompanying drawing should understand by way of example and not limitation, wherein:
Fig. 1 is the flow chart according to one embodiment of the method for software protection of the disclosure;
Fig. 2 is the block diagram for being used to protect one embodiment of the security component of software according to the disclosure;
Fig. 3 is the schematic diagram for being used to protect one embodiment of the system architecture of software according to the disclosure;
Fig. 4 is the schematic diagram for illustrating the hierarchical structure in industrial characteristic storehouse in accordance with an embodiment of the present disclosure.
Fig. 5 is the signal for illustrating the hierarchical structure of the industrial characteristic database according to another embodiment of the disclosure Figure.
Embodiment
It is according to the flow chart of one embodiment of the method for software protection of the disclosure, this method as shown in Figure 1 It is main that protected software is protected using the security component bound with protected software, i.e. so-called in the present invention to be protected Shield software is to bind the target software for having security component, especially development.
Illustrated with reference to shown in Fig. 3, Fig. 3 is the implementation for being used to protect the system architecture of software according to the disclosure The schematic diagram of example, wherein security component is referred to as engine of cracking down upon evil forces, and the binding of protected software and security component can be managed Solve for will both function bindings, so as to when user uses or runs protected software must component safe for operation simultaneously, and It is also to be understood that " interface " of the protected software using security component as communication with the outside world so that pirated disc copier can not be by secure group The function that part is separated without influenceing protected software from protected software.Security component can utilize the secure data of dynamic renewal Storehouse is detected to target software, and hereinafter also referred to as safety database is industrial characteristic database or industrial characteristic storehouse.According to Embodiments of the invention, it can include in safety database and the affiliated industry of protected software (such as A industries, B industries, C industries Deng) software corresponding to industrial characteristic data.Specifically, industrial characteristic data can include industry ID, characteristic type and spy Content is levied, wherein feature can include pirate patch feature and/or crack analysis tool feature.In addition, characteristic type can To be selected from including memory features data, window name characteristic, the group of process characteristic.
Then, as shown in figure 1, according to one embodiment of the disclosure, method for protecting software of the invention includes following step Suddenly:In frame S102, during protected software is run, according to being stored in industrial characteristic database corresponding with protected software In industrial characteristic data characteristic type to protected software carry out respective type feature detection;In frame S104, When feature corresponding with characteristic type is detected in protected software, predetermined measures are taken to protected software.This is pre- Setting down measures can include forbidding the running software, and prompting message is sent in client, and sending notice to software developer informs this Event, etc..
According to one embodiment of the disclosure, the framework of security system for software is specifically illustrated in Fig. 4.This of the present invention is soft Part protection system can include security component.Fig. 2 is the implementation for being used to protect the security component of software according to the disclosure The block diagram of example.According to one embodiment, as shown in Fig. 2 security component 20 can include detection unit 21 and processing unit 22.Should Detection unit 21 can be configured as during protected software is run, special according to industry corresponding with protected software is stored in The characteristic type for levying the industrial characteristic data in database carries out the detection of respective type feature to protected software.Processing When unit 22 can be configured as detecting feature corresponding with characteristic type in protected software, to protected software Take predetermined measures.The predetermined measures can include disabling the software, and the event is recorded to enter in security component Row statistics and analysis, prompting message is sent in client, sending notice to software developer informs the event, etc..
In one embodiment, safety database or industrial characteristic storehouse can be stored in client for security component or crack down upon evil forces Engine 20 is detected or used when being handled, and such client with service end without keeping connecting always.In another embodiment, Safety database or industrial characteristic storehouse can be not stored in client, but by security component or engine 20 of cracking down upon evil forces from service end Obtain, in this case, client needs to keep connecting with service end always, and can aid in prevents safety database or row Industry feature database is stolen by Malware etc., so as to improve software security.
Fig. 3 is the schematic diagram for being used to protect one embodiment of the system architecture of software according to the disclosure.Such as Fig. 3 institutes Show, service end stores the feature database of the different industries such as A industrial characteristics storehouse, B industrial characteristics storehouse and C industrial characteristics storehouse, and industry is soft The quantity of part is not limited to three, can be any amount, and correspondingly, the quantity in industrial characteristic storehouse is relative with the quantity of development Should, can equally there is any number of industrial characteristic storehouse.These industrial characteristic storehouses define to be run in corresponding development When need the running environment that detects, and need the behavior monitored.
In one embodiment, security system for software crack down upon evil forces engine or security component 20 can be located at client, safety Component 20 can communicate connection to realize that retrieval to industrial characteristic database, callings etc. operate with server end.In operation, Security component 20 can be obtained according to the category of employment of Current software from service end corresponding to property data base, while the secure group Part 20 can carry out different detection operations, such as internal memory inspection, debugger inspection, according to the behavior of definition according to feature Carry out behavior inspection etc..DB (A), DB (B) and DB (C) shown in Fig. 3 are respectively that engine 20 of cracking down upon evil forces is got from service end Corresponding A industry, the different industrial characteristic databases of B industries and C industries.
According to preferred embodiment of the present disclosure, crack down upon evil forces engine or security component 20 can be realized using software, that is, pass through To instruct the executable program realized to realize.In addition, in a further embodiment, security component 20 can also be embodied as hardware Or firmware.In other words, the implementation of security component 20 is unrestricted.
According to one embodiment of present invention, crack down upon evil forces engine, i.e. security component 20, safety database, the peace can be included Full database can obtain from service end in advance, either the safety database can be security component or corresponding software from Band, it can obtain database update from service end in use.
Fig. 4 is the schematic diagram for illustrating the hierarchical structure in industrial characteristic storehouse in accordance with an embodiment of the present disclosure.Tie below Fig. 4 is closed to illustrate the hierarchical structure in industrial characteristic storehouse in accordance with an embodiment of the present disclosure.
According to one embodiment of the disclosure, the industrial characteristic database of service end can use level as shown in Figure 4 Structure stores industry characteristic.Specifically, each characteristic is stored in the lowest hierarchical level (the first level) of database, The feature A/B ... N of first level as shown in Figure 4, the characteristic of lowest hierarchical level can be divided into multiple types, as internal memory is special Levy data, window name characteristic, process characteristic etc..In addition, it can be included in characteristic in industry ID and feature Hold, when so being detected to some development such as industry 1 to industry n software, with quick-searching and can obtain and the row Characteristic corresponding to industry software part, and then it is easy to carry out protected software the detection of respective type feature.In the second layer In level, the combination of each characteristic, such as AX, AY, XN, YN shown in Fig. 4 can be stored, wherein, the combination can be The combination of at least two characteristics of same type or the combination of different types of at least two characteristic.
In one embodiment, characteristic and/or the spy corresponding to different industries can also be stored in the first level The combination of data is levied, for example, for the software in industry 1, its corresponding A, B and XN assemblage characteristics, i.e. soft in industry 1 When part is protected, determine whether corresponding software is piracy software by detecting A, B and XN assemblage characteristic.
According to one embodiment, in the case where storage hierarchical structure includes three levels, it is stored with bottom a plurality of Characteristic, this feature data can include industry ID, characteristic type and feature, middle level be characterized rule (i.e. two kinds or The combination of more kinds of characteristics), upper strata is industry, and industry ID corresponding with bottom is only included in the upper strata, passes through industry ID Each feature of bottom is associated with the characterization rules in middle level, and got up indirectly with identical business association in upper strata;Depositing The storage stage, whenever characteristic type and feature is extracted for certain industry, then the industry ID that is allocated according to the sector , can when updating the characteristic type and feature of certain industry by the characteristic type of extraction and feature storage into bottom With according to the content update that industry ID will update into the characteristic with ID mutually of the same trade, so as to the data in bottom It is updated and upgrades.Then, this feature type and feature are associated by its industry ID with the characterization rules in middle level, and The identical industry ID with upper strata is associated indirectly, so as to which the data in data bottom storehouse layer are updated and upgraded;Adjusting With the stage, corresponding rule therefrom layer choosing can be taken by industry ID, then ID mutually of the same trade characteristic type is transferred from bottom And feature.The framework clear logic of this memory mechanism, data-reusing is strong, the operation such as is easy to count, manage and upgrade.
Although Fig. 4 shows that the hierarchical structure of industrial characteristic database includes three-level, in accordance with an embodiment of the present disclosure Industrial characteristic database can also use only industrial characteristic data are stored including the hierarchical structures of two levels.
In the case of only two levels, a plurality of feature (including industry ID, characteristic type and spy are stored with bottom Levy content), upper strata is industry, industry ID corresponding with bottom is only included in the upper strata, by industry ID by each of bottom Feature is got up with identical business association in upper strata;In memory phase, whenever extracting characteristic type and feature for certain industry During content, then the industry ID being allocated according to the sector stores the characteristic type extracted and feature into bottom, Then this feature type and feature are associated by the identical industry ID on its industry ID and upper strata, are updating certain row , can be according to the content update that industry ID will update to the spy with ID mutually of the same trade when the characteristic type and feature of industry Levy in data, so as to which the data in bottom are updated and upgraded;In the stage of calling, can be adjusted by industry ID from bottom Take ID mutually of the same trade characteristic type and feature.This memory mechanism logic is simple, and framework is convenient.
According to one embodiment, in the case where storage hierarchical structure includes three levels, software protection side of the invention Method carries out phase according to the combination of the characteristic type for the industrial characteristic data being stored in industrial characteristic database to protected software Answer the detection of type feature content.When feature corresponding with the characteristic type is detected in the protected software, Predetermined measures are taken to the protected software.
In one embodiment, industrial characteristic data can include memory features data, window name characteristic, process Characteristic.
According to one embodiment of the disclosure, industrial characteristic database can be hierarchical structure, first in hierarchical structure Level can include feature, and the second level can include profession identity, detection type and each detection type and first layer The mapping relations of the feature of level.
In accordance with an embodiment of the present disclosure, detection type includes the detection of pirate patch feature and/or cracks analysis tool spy The detection of sign.
According to another embodiment of the disclosure, industrial characteristic database can be hierarchical structure, in hierarchical structure One level can include feature, and the second level can include combinations of features mark and each combinations of features and the first level The mapping relations of feature, third layer level can include profession identity, detection type and each detection type and the first level In feature and/or the second level in combinations of features mark mapping relations.
In one embodiment, processing unit 22 can be additionally configured to according to the row being stored in industrial characteristic database The combinations of features of industry characteristic carries out the detection of respective type feature to protected software.
Fig. 5 is the signal for illustrating the hierarchical structure of the industrial characteristic database according to another embodiment of the disclosure Figure.Below, the hierarchical structure of the industrial characteristic database according to another embodiment of the disclosure is carried out with reference to figure 5 more detailed Explanation.
From figure 5 it can be seen that industrial characteristic database can be included as the data Layer of the first level, as the second layer The combination layer of level and the industry layer as third layer level.
In the data Layer as the first level, the 0n and 11 as shown in figure 5,01,02,03,04,05 ..., 12,13,14, 15 ... 1n etc. can represent feature, wherein numbering can reflect data type, for example, can represent interior with 0 beginning Deposit characteristic, and with 1 open can represent window feature data.
In the industry layer as third layer level, alphabetical A, B etc. can represent profession identity, can there is pin in the level To the feature of A industries, B industries etc..For example, as shown in figure 5, for A industries, feature A101 wherein [11, 001] in, A1 can represent the pirate patch feature in A industries, and in feature A201 [24,001] wherein, A2 can represent A Analysis tool feature, such as malice analysis tool feature are cracked in industry.
In the combination layer as the second level, for example, 001 [01,12] shown in Fig. 5 represent each combinations of features with The mapping relations of the feature of first level, wherein 001 expression combinations of features mark, the e.g. numbering of assemblage characteristic, 13 Or 21 representative feature data numbering.
Said above according to the storage of the industrial characteristic database of the embodiment, renewal, upgrading and calling It is bright, it will not be repeated here.
According to the embodiment, data Layer, industry layer and combination layer can be utilized to realize the storage of industrial characteristic data, and then Engine 20 is cracked down upon evil forces to realize retrieval and the calling to industrial characteristic data, so as to realize to industry by the security system for software The deep layer customization protection of software.
According to further embodiment, can not also include being used as the second layer in industrial characteristic database as shown in Figure 5 The combination layer of level.In such instances, the storage of industrial characteristic data is realized merely with data Layer and industry layer, and then passes through this Security system for software cracks down upon evil forces engine 20 to realize retrieval and the calling to industrial characteristic data, so as to realize to development Deep layer customization protection.
Although described above is the embodiment that hierarchical structure includes three levels and two levels, those skilled in the art exist After understanding the content of the embodiment of the present disclosure, can also conceive hierarchical structure includes more than three level, for example, level Four, Pyatyi etc., These modifications and variations examples are within the scope of this disclosure.
According to one embodiment, in the case where storage hierarchical structure includes three levels, the safety of security system for software The processing unit 22 of component 20 can be additionally configured to the spy according to the industrial characteristic data being stored in industrial characteristic database The combination for levying type carries out the detection of respective type feature to protected software.Detected in the protected software with Corresponding to the characteristic type during feature, processing unit can be configured as taking predetermined measures to the protected software.
According to the combination of the characteristic type for the industrial characteristic data being stored in industrial characteristic database to protected software The efficiency that data are retrieved from industrial characteristic database can be improved by carrying out the detection of respective type feature, improve secure group Whether part inspection software improves the efficiency and validity of protection software by the efficiency of piracy.
Mention in the description " one embodiment ", " preferred embodiment ", " embodiment " and " each embodiment " mean with Specific feature, structure, characteristic or the function that the embodiment is combined description are included at least one embodiment of the disclosure And it may be embodied in more than one embodiment.Moreover, specification occur everywhere above-mentioned wording be not necessarily all referring to it is same Embodiment.
, can be without departing from the scope of the invention to disclosed reality in addition to content described herein Apply example and carry out various modifications.Therefore, explanation and example here is interpreted as illustrative and not restrictive.The present invention's Spirit and scope should limit solely by reference to claim and its equivalents.

Claims (16)

  1. A kind of 1. method for protecting software, it is characterised in that using with the security component that protected software is bound to being protected Shield software is protected, and methods described includes:
    During protected software is run, according to the row being stored in industrial characteristic database corresponding with the protected software The characteristic type of industry characteristic carries out the detection of respective type feature to protected software;
    When feature corresponding with the characteristic type is detected in the protected software, the protected software is adopted Take predetermined measures.
  2. 2. according to the method for claim 1, wherein, the detection type includes:The detection of pirate patch feature and/or broken Solve the detection of analysis tool feature.
  3. 3. according to the method for claim 1, wherein, the industrial characteristic data include industry ID, the characteristic type and The feature.
  4. 4. according to the method for claim 1, wherein, the industrial characteristic database is hierarchical structure, the hierarchical structure In the first level include the feature, the second level includes profession identity, detection type and each detection type With the mapping relations of the feature of first level.
  5. 5. according to the method for claim 1, wherein, the industrial characteristic database is hierarchical structure, the hierarchical structure In the first level include the feature, the second level include combinations of features identify and each combinations of features with it is described The mapping relations of the feature of first level, third layer level include profession identity, detection type and each detection type With the mapping relations of the combinations of features mark in the feature and/or the second level in first level.
  6. 6. according to the method for claim 5, according to the feature for the industrial characteristic data being stored in industrial characteristic database The detection that type carries out respective type feature to protected software is included according to the row being stored in industrial characteristic database The combinations of features of industry characteristic carries out the detection of respective type feature to protected software.
  7. 7. according to the method for claim 1, wherein, the industrial characteristic data include memory features data, window name Characteristic, process characteristic.
  8. 8. according to the method for claim 1, wherein, the industrial characteristic database obtains from service end.
  9. 9. a kind of system for protecting software, it is characterised in that the system includes security component, the security component and quilt Protecting software binding, security component includes to be protected to it:
    Detection unit, it is configured as during protected software is run, corresponding with the protected software according to being stored in The characteristic type of industrial characteristic data in industrial characteristic database carries out the inspection of respective type feature to protected software Survey;
    Processing unit, it is configured as detecting feature corresponding with the characteristic type in the protected software When, predetermined measures are taken to the protected software.
  10. 10. system according to claim 9, wherein, the detection type includes:The detection of pirate patch feature and/or Crack the detection of analysis tool feature.
  11. 11. system according to claim 9, wherein, the industrial characteristic data include industry ID, the characteristic type and The feature.
  12. 12. system according to claim 9, wherein, the industrial characteristic database is hierarchical structure, the hierarchical structure In the first level include the feature, the second level includes profession identity, detection type and each detection type With the mapping relations of the feature of first level.
  13. 13. system according to claim 9, wherein, the industrial characteristic database is hierarchical structure, the hierarchical structure In the first level include the feature, the second level include combinations of features identify and each combinations of features with it is described The mapping relations of the feature of first level, third layer level include profession identity, detection type and each detection type With the mapping relations of the combinations of features mark in the feature and/or the second level in first level.
  14. 14. system according to claim 13, wherein, the processing unit is additionally configured to basis and is stored in industrial characteristic The combinations of features of industrial characteristic data in database carries out the detection of respective type feature to protected software.
  15. 15. system according to claim 9, wherein, the industrial characteristic data include memory features data, window name Characteristic, process characteristic.
  16. 16. system according to claim 9, wherein, the industrial characteristic database obtains from service end.
CN201710917542.9A 2017-09-30 2017-09-30 For protecting the method and system of software Active CN107609359B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710917542.9A CN107609359B (en) 2017-09-30 2017-09-30 For protecting the method and system of software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710917542.9A CN107609359B (en) 2017-09-30 2017-09-30 For protecting the method and system of software

Publications (2)

Publication Number Publication Date
CN107609359A true CN107609359A (en) 2018-01-19
CN107609359B CN107609359B (en) 2019-05-03

Family

ID=61068425

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710917542.9A Active CN107609359B (en) 2017-09-30 2017-09-30 For protecting the method and system of software

Country Status (1)

Country Link
CN (1) CN107609359B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11605146B2 (en) 2017-03-13 2023-03-14 Advanced New Technologies Co., Ltd. Traffic section fee payment method, fee system, and payment system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1972292A (en) * 2005-10-17 2007-05-30 飞塔信息科技(北京)有限公司 Electronic data processing system and method thereof
US20070220575A1 (en) * 2006-03-03 2007-09-20 Verimatrix, Inc. Movie studio-based network distribution system and method
CN102592103A (en) * 2011-01-17 2012-07-18 中国电信股份有限公司 Secure file processing method, equipment and system
CN102855439A (en) * 2012-07-26 2013-01-02 深圳市赛格导航科技股份有限公司 Executable file self-checking method and device
CN103164642A (en) * 2011-12-19 2013-06-19 比亚迪股份有限公司 Method and system for preventing software piracy
CN104063664A (en) * 2014-06-26 2014-09-24 北京奇虎科技有限公司 Software installation package security detection method, software installation package security detection client, software installation package security detection server and software installation package security detection system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1972292A (en) * 2005-10-17 2007-05-30 飞塔信息科技(北京)有限公司 Electronic data processing system and method thereof
US20070220575A1 (en) * 2006-03-03 2007-09-20 Verimatrix, Inc. Movie studio-based network distribution system and method
CN102592103A (en) * 2011-01-17 2012-07-18 中国电信股份有限公司 Secure file processing method, equipment and system
CN103164642A (en) * 2011-12-19 2013-06-19 比亚迪股份有限公司 Method and system for preventing software piracy
CN102855439A (en) * 2012-07-26 2013-01-02 深圳市赛格导航科技股份有限公司 Executable file self-checking method and device
CN104063664A (en) * 2014-06-26 2014-09-24 北京奇虎科技有限公司 Software installation package security detection method, software installation package security detection client, software installation package security detection server and software installation package security detection system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11605146B2 (en) 2017-03-13 2023-03-14 Advanced New Technologies Co., Ltd. Traffic section fee payment method, fee system, and payment system

Also Published As

Publication number Publication date
CN107609359B (en) 2019-05-03

Similar Documents

Publication Publication Date Title
CN102176224B (en) Methods and apparatus for dealing with malware
CN105260663B (en) A kind of safe storage service system and method based on TrustZone technologies
CN100578522C (en) Electronic device, update method for same and integrated circuit
US7975308B1 (en) Method and apparatus to secure user confidential data from untrusted browser extensions
CN104318135B (en) A kind of Java code Safety actuality loading method based on credible performing environment
US9183377B1 (en) Unauthorized account monitoring system and method
CN105408911A (en) Hardware and software execution profiling
CN107766728A (en) Mobile application security managing device, method and mobile operation safety protection system
CN100452908C (en) System and method for preventing software and hardware with communication condition / function from being embezzled
CN103493061A (en) Methods and apparatus for dealing with malware
CN107003866A (en) The safety establishment of encrypted virtual machine from encrypted template
CN101414327B (en) Method for file protection
CN101483658B (en) System and method for input content protection of browser
CN104573530A (en) Server safety reinforcing system
US20230308459A1 (en) Authentication attack detection and mitigation with embedded authentication and delegation
US20230362141A1 (en) Network authentication toxicity assessment
CN109815701A (en) Detection method, client, system and the storage medium of software security
CN106548097A (en) The operation method and device of network device software
CN103970540A (en) Method and device for safely calling key function
CN108763062A (en) Bury the filter method and terminal device of a title
CN104955043B (en) A kind of intelligent terminal security protection system
CN107609359B (en) For protecting the method and system of software
CN109583191B (en) Method and device for protecting integrity of control flow of cloud program
KR102541888B1 (en) Image-based malicious code analysis method and apparatus and artificial intelligence-based endpoint detection and response system using the same
CN105912945A (en) Safety reinforcing device and operation method of operating system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee after: Beijing Shendun Technology Co.,Ltd.

Address before: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

CP01 Change in the name or title of a patent holder