CN107609359A - For protecting the method and system of software - Google Patents
For protecting the method and system of software Download PDFInfo
- Publication number
- CN107609359A CN107609359A CN201710917542.9A CN201710917542A CN107609359A CN 107609359 A CN107609359 A CN 107609359A CN 201710917542 A CN201710917542 A CN 201710917542A CN 107609359 A CN107609359 A CN 107609359A
- Authority
- CN
- China
- Prior art keywords
- feature
- characteristic
- software
- type
- level
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Storage Device Security (AREA)
Abstract
Present disclose provides a kind of method for protecting software, wherein using the security component with protected software binding to protect protected software, methods described includes:During protected software is run, the detection of respective type feature is carried out to protected software according to the characteristic type for the industrial characteristic data being stored in industrial characteristic database corresponding with the protected software;When feature corresponding with the characteristic type is detected in the protected software, predetermined measures are taken to the protected software.Additionally provide a kind of security component for being used to protect software.The method and security component of the present invention can carry out depth customized treatment to development using industrial characteristic database and depth is protected.
Description
Technical field
The present invention relates to the method and system of field of software protection, more particularly, to protection software.
Background technology
After software developer issues software, often perplexed by problem of piracy.Software piracy refers to be agreed to without owner
In the case of, the behavior replicated to its software, distributed, and with infringing products made of this behavior.
In terms of software piracy, bootlegger generally carries out the mode such as increase appended document is as pirate patch to software
Processing so that consumer can avoid the related checking of software owner and use the function of the software, it is generally pirate soft
Part can not provide legal document of title (rights certificate), can not provide the user after-sale service, but consumer is due to stealing
Version software cheap freely is also intended to use piracy software.
Because the software product iteration of present society itself is very fast, if software developer takes judicial means to solve to steal
Version problem, not only right-safeguarding cost is high, and poor in timeliness.Thus whenever running into piracy, software developer's common method is oneself
A large amount of human and material resources and time are spent to analyze the problem of piracy collected on the market, customizes corresponding encipherment scheme,
Software is issued again again to solve problem of piracy.By this method come handle be the shortcomings that software piracy problem it is following
Aspect:
1. adding the development cost of software developer, and special messenger is needed to handle corresponding work, thus it is overall
Right-safeguarding cost increase;
2. because above-mentioned safety-related processing method and the logic of software in itself do not have much relations, common software is opened
Hair business is usual and is bad at, unable to do what one wishes in processing, it is impossible to reach the Expected Results for ensureing that software ownership is inviolable;
3rd, whenever running into pirate, it is necessary to issue the version of software again, it is more passive to handle this problem;
The antivirus software of current each software developer's exploitation, can be to all target softwares on terminal device for working as
The preceding viral trojan horse detection of prevalence and killing on the market, realize the protection to target software, but protect plan to a certain extent
It is slightly relatively single.
The content of the invention
An object of the present invention, which is to provide, to be carried out using industrial characteristic database to development at depth customization
Reason and the method and system of depth protection.
According to an aspect of the present invention, there is provided a kind of method for protecting software, bound using with protected software
Security component protected software is protected, this method includes:During protected software is run, according to being stored in and quilt
The characteristic type of the industrial characteristic data in industrial characteristic database corresponding to software is protected to carry out respective class to protected software
The detection of type feature;When feature corresponding with characteristic type is detected in protected software, to protected software
Take predetermined measures.
In one embodiment, detection type includes the detection of pirate patch feature and/or cracks analysis tool feature
Detection.
In one embodiment, industrial characteristic data include industry ID, characteristic type and feature.
In one embodiment, industrial characteristic database is hierarchical structure, and the first level in hierarchical structure includes described
Feature, the second level include the feature of profession identity, detection type and each detection type and first level
The mapping relations of content.
In one embodiment, industrial characteristic database is hierarchical structure, and the first level in hierarchical structure includes described
Feature, the second level include combinations of features mark and each combinations of features and the feature of first level
Mapping relations, third layer level include profession identity, detection type and each detection type and the spy in first level
Levy the mapping relations of the combinations of features mark in content and/or the second level.
In one embodiment, according to the characteristic type for the industrial characteristic data being stored in industrial characteristic database to quilt
The detection that protection software carries out respective type feature is included according to the industrial characteristic number being stored in industrial characteristic database
According to combinations of features to protected software carry out respective type feature detection.
In one embodiment, industrial characteristic data include memory features data, window name characteristic, process feature
Data.
In one embodiment, industrial characteristic database obtains from service end.
According to another aspect of the present invention, there is provided a kind of system for protecting software, the system include security component,
The security component is bound to be protected to it with protected software, and the security component includes:Detection unit, it is configured as
During protected software is run, according to the industrial characteristic data being stored in industrial characteristic database corresponding with protected software
Characteristic type to protected software carry out respective type feature detection;Processing unit, it is configured as being protected
When feature corresponding with characteristic type is detected in software, predetermined measures are taken to protected software.
In one embodiment, detection type includes the detection of pirate patch feature and/or cracks analysis tool feature
Detection.
In one embodiment, industrial characteristic data include industry ID, characteristic type and feature.
In one embodiment, industrial characteristic database is hierarchical structure, and the first level in hierarchical structure includes described
Feature, the second level include the feature of profession identity, detection type and each detection type and first level
The mapping relations of content.
In one embodiment, industrial characteristic database is hierarchical structure, and the first level in hierarchical structure includes described
Feature, the second level include combinations of features mark and each combinations of features and the feature of first level
Mapping relations, third layer level include profession identity, detection type and each detection type and the spy in first level
Levy the mapping relations of the combinations of features mark in content and/or the second level.
In one embodiment, processing unit is additionally configured to according to the industrial characteristic being stored in industrial characteristic database
The combinations of features of data carries out the detection of respective type feature to protected software.
In one embodiment, industrial characteristic data include memory features data, window name characteristic, process feature
Data.
In one embodiment, industrial characteristic database obtains from service end.
The method according to the invention and security component, pirate patch feature for different industries software and/or are cracked point
Tool characteristics are analysed, different types of detection is carried out to the target software of different industries, can accomplish to shoot the arrow at the target, improve detection
Depth and efficiency, so as to realize the customized treatment that depth is carried out to different industries software.
The present invention is solved the problems, such as to there is no customized treatment and the protection for carrying out depth for development at present, realized
More targeted protection is carried out to development, so as to reduce the problem of piracy of development.
Brief description of the drawings
Embodiment of the disclosure is illustrated in an illustrative manner with reference to accompanying drawing, and accompanying drawing is the part of this specification.
Accompanying drawing should understand by way of example and not limitation, wherein:
Fig. 1 is the flow chart according to one embodiment of the method for software protection of the disclosure;
Fig. 2 is the block diagram for being used to protect one embodiment of the security component of software according to the disclosure;
Fig. 3 is the schematic diagram for being used to protect one embodiment of the system architecture of software according to the disclosure;
Fig. 4 is the schematic diagram for illustrating the hierarchical structure in industrial characteristic storehouse in accordance with an embodiment of the present disclosure.
Fig. 5 is the signal for illustrating the hierarchical structure of the industrial characteristic database according to another embodiment of the disclosure
Figure.
Embodiment
It is according to the flow chart of one embodiment of the method for software protection of the disclosure, this method as shown in Figure 1
It is main that protected software is protected using the security component bound with protected software, i.e. so-called in the present invention to be protected
Shield software is to bind the target software for having security component, especially development.
Illustrated with reference to shown in Fig. 3, Fig. 3 is the implementation for being used to protect the system architecture of software according to the disclosure
The schematic diagram of example, wherein security component is referred to as engine of cracking down upon evil forces, and the binding of protected software and security component can be managed
Solve for will both function bindings, so as to when user uses or runs protected software must component safe for operation simultaneously, and
It is also to be understood that " interface " of the protected software using security component as communication with the outside world so that pirated disc copier can not be by secure group
The function that part is separated without influenceing protected software from protected software.Security component can utilize the secure data of dynamic renewal
Storehouse is detected to target software, and hereinafter also referred to as safety database is industrial characteristic database or industrial characteristic storehouse.According to
Embodiments of the invention, it can include in safety database and the affiliated industry of protected software (such as A industries, B industries, C industries
Deng) software corresponding to industrial characteristic data.Specifically, industrial characteristic data can include industry ID, characteristic type and spy
Content is levied, wherein feature can include pirate patch feature and/or crack analysis tool feature.In addition, characteristic type can
To be selected from including memory features data, window name characteristic, the group of process characteristic.
Then, as shown in figure 1, according to one embodiment of the disclosure, method for protecting software of the invention includes following step
Suddenly:In frame S102, during protected software is run, according to being stored in industrial characteristic database corresponding with protected software
In industrial characteristic data characteristic type to protected software carry out respective type feature detection;In frame S104,
When feature corresponding with characteristic type is detected in protected software, predetermined measures are taken to protected software.This is pre-
Setting down measures can include forbidding the running software, and prompting message is sent in client, and sending notice to software developer informs this
Event, etc..
According to one embodiment of the disclosure, the framework of security system for software is specifically illustrated in Fig. 4.This of the present invention is soft
Part protection system can include security component.Fig. 2 is the implementation for being used to protect the security component of software according to the disclosure
The block diagram of example.According to one embodiment, as shown in Fig. 2 security component 20 can include detection unit 21 and processing unit 22.Should
Detection unit 21 can be configured as during protected software is run, special according to industry corresponding with protected software is stored in
The characteristic type for levying the industrial characteristic data in database carries out the detection of respective type feature to protected software.Processing
When unit 22 can be configured as detecting feature corresponding with characteristic type in protected software, to protected software
Take predetermined measures.The predetermined measures can include disabling the software, and the event is recorded to enter in security component
Row statistics and analysis, prompting message is sent in client, sending notice to software developer informs the event, etc..
In one embodiment, safety database or industrial characteristic storehouse can be stored in client for security component or crack down upon evil forces
Engine 20 is detected or used when being handled, and such client with service end without keeping connecting always.In another embodiment,
Safety database or industrial characteristic storehouse can be not stored in client, but by security component or engine 20 of cracking down upon evil forces from service end
Obtain, in this case, client needs to keep connecting with service end always, and can aid in prevents safety database or row
Industry feature database is stolen by Malware etc., so as to improve software security.
Fig. 3 is the schematic diagram for being used to protect one embodiment of the system architecture of software according to the disclosure.Such as Fig. 3 institutes
Show, service end stores the feature database of the different industries such as A industrial characteristics storehouse, B industrial characteristics storehouse and C industrial characteristics storehouse, and industry is soft
The quantity of part is not limited to three, can be any amount, and correspondingly, the quantity in industrial characteristic storehouse is relative with the quantity of development
Should, can equally there is any number of industrial characteristic storehouse.These industrial characteristic storehouses define to be run in corresponding development
When need the running environment that detects, and need the behavior monitored.
In one embodiment, security system for software crack down upon evil forces engine or security component 20 can be located at client, safety
Component 20 can communicate connection to realize that retrieval to industrial characteristic database, callings etc. operate with server end.In operation,
Security component 20 can be obtained according to the category of employment of Current software from service end corresponding to property data base, while the secure group
Part 20 can carry out different detection operations, such as internal memory inspection, debugger inspection, according to the behavior of definition according to feature
Carry out behavior inspection etc..DB (A), DB (B) and DB (C) shown in Fig. 3 are respectively that engine 20 of cracking down upon evil forces is got from service end
Corresponding A industry, the different industrial characteristic databases of B industries and C industries.
According to preferred embodiment of the present disclosure, crack down upon evil forces engine or security component 20 can be realized using software, that is, pass through
To instruct the executable program realized to realize.In addition, in a further embodiment, security component 20 can also be embodied as hardware
Or firmware.In other words, the implementation of security component 20 is unrestricted.
According to one embodiment of present invention, crack down upon evil forces engine, i.e. security component 20, safety database, the peace can be included
Full database can obtain from service end in advance, either the safety database can be security component or corresponding software from
Band, it can obtain database update from service end in use.
Fig. 4 is the schematic diagram for illustrating the hierarchical structure in industrial characteristic storehouse in accordance with an embodiment of the present disclosure.Tie below
Fig. 4 is closed to illustrate the hierarchical structure in industrial characteristic storehouse in accordance with an embodiment of the present disclosure.
According to one embodiment of the disclosure, the industrial characteristic database of service end can use level as shown in Figure 4
Structure stores industry characteristic.Specifically, each characteristic is stored in the lowest hierarchical level (the first level) of database,
The feature A/B ... N of first level as shown in Figure 4, the characteristic of lowest hierarchical level can be divided into multiple types, as internal memory is special
Levy data, window name characteristic, process characteristic etc..In addition, it can be included in characteristic in industry ID and feature
Hold, when so being detected to some development such as industry 1 to industry n software, with quick-searching and can obtain and the row
Characteristic corresponding to industry software part, and then it is easy to carry out protected software the detection of respective type feature.In the second layer
In level, the combination of each characteristic, such as AX, AY, XN, YN shown in Fig. 4 can be stored, wherein, the combination can be
The combination of at least two characteristics of same type or the combination of different types of at least two characteristic.
In one embodiment, characteristic and/or the spy corresponding to different industries can also be stored in the first level
The combination of data is levied, for example, for the software in industry 1, its corresponding A, B and XN assemblage characteristics, i.e. soft in industry 1
When part is protected, determine whether corresponding software is piracy software by detecting A, B and XN assemblage characteristic.
According to one embodiment, in the case where storage hierarchical structure includes three levels, it is stored with bottom a plurality of
Characteristic, this feature data can include industry ID, characteristic type and feature, middle level be characterized rule (i.e. two kinds or
The combination of more kinds of characteristics), upper strata is industry, and industry ID corresponding with bottom is only included in the upper strata, passes through industry ID
Each feature of bottom is associated with the characterization rules in middle level, and got up indirectly with identical business association in upper strata;Depositing
The storage stage, whenever characteristic type and feature is extracted for certain industry, then the industry ID that is allocated according to the sector
, can when updating the characteristic type and feature of certain industry by the characteristic type of extraction and feature storage into bottom
With according to the content update that industry ID will update into the characteristic with ID mutually of the same trade, so as to the data in bottom
It is updated and upgrades.Then, this feature type and feature are associated by its industry ID with the characterization rules in middle level, and
The identical industry ID with upper strata is associated indirectly, so as to which the data in data bottom storehouse layer are updated and upgraded;Adjusting
With the stage, corresponding rule therefrom layer choosing can be taken by industry ID, then ID mutually of the same trade characteristic type is transferred from bottom
And feature.The framework clear logic of this memory mechanism, data-reusing is strong, the operation such as is easy to count, manage and upgrade.
Although Fig. 4 shows that the hierarchical structure of industrial characteristic database includes three-level, in accordance with an embodiment of the present disclosure
Industrial characteristic database can also use only industrial characteristic data are stored including the hierarchical structures of two levels.
In the case of only two levels, a plurality of feature (including industry ID, characteristic type and spy are stored with bottom
Levy content), upper strata is industry, industry ID corresponding with bottom is only included in the upper strata, by industry ID by each of bottom
Feature is got up with identical business association in upper strata;In memory phase, whenever extracting characteristic type and feature for certain industry
During content, then the industry ID being allocated according to the sector stores the characteristic type extracted and feature into bottom,
Then this feature type and feature are associated by the identical industry ID on its industry ID and upper strata, are updating certain row
, can be according to the content update that industry ID will update to the spy with ID mutually of the same trade when the characteristic type and feature of industry
Levy in data, so as to which the data in bottom are updated and upgraded;In the stage of calling, can be adjusted by industry ID from bottom
Take ID mutually of the same trade characteristic type and feature.This memory mechanism logic is simple, and framework is convenient.
According to one embodiment, in the case where storage hierarchical structure includes three levels, software protection side of the invention
Method carries out phase according to the combination of the characteristic type for the industrial characteristic data being stored in industrial characteristic database to protected software
Answer the detection of type feature content.When feature corresponding with the characteristic type is detected in the protected software,
Predetermined measures are taken to the protected software.
In one embodiment, industrial characteristic data can include memory features data, window name characteristic, process
Characteristic.
According to one embodiment of the disclosure, industrial characteristic database can be hierarchical structure, first in hierarchical structure
Level can include feature, and the second level can include profession identity, detection type and each detection type and first layer
The mapping relations of the feature of level.
In accordance with an embodiment of the present disclosure, detection type includes the detection of pirate patch feature and/or cracks analysis tool spy
The detection of sign.
According to another embodiment of the disclosure, industrial characteristic database can be hierarchical structure, in hierarchical structure
One level can include feature, and the second level can include combinations of features mark and each combinations of features and the first level
The mapping relations of feature, third layer level can include profession identity, detection type and each detection type and the first level
In feature and/or the second level in combinations of features mark mapping relations.
In one embodiment, processing unit 22 can be additionally configured to according to the row being stored in industrial characteristic database
The combinations of features of industry characteristic carries out the detection of respective type feature to protected software.
Fig. 5 is the signal for illustrating the hierarchical structure of the industrial characteristic database according to another embodiment of the disclosure
Figure.Below, the hierarchical structure of the industrial characteristic database according to another embodiment of the disclosure is carried out with reference to figure 5 more detailed
Explanation.
From figure 5 it can be seen that industrial characteristic database can be included as the data Layer of the first level, as the second layer
The combination layer of level and the industry layer as third layer level.
In the data Layer as the first level, the 0n and 11 as shown in figure 5,01,02,03,04,05 ..., 12,13,14,
15 ... 1n etc. can represent feature, wherein numbering can reflect data type, for example, can represent interior with 0 beginning
Deposit characteristic, and with 1 open can represent window feature data.
In the industry layer as third layer level, alphabetical A, B etc. can represent profession identity, can there is pin in the level
To the feature of A industries, B industries etc..For example, as shown in figure 5, for A industries, feature A101 wherein [11,
001] in, A1 can represent the pirate patch feature in A industries, and in feature A201 [24,001] wherein, A2 can represent A
Analysis tool feature, such as malice analysis tool feature are cracked in industry.
In the combination layer as the second level, for example, 001 [01,12] shown in Fig. 5 represent each combinations of features with
The mapping relations of the feature of first level, wherein 001 expression combinations of features mark, the e.g. numbering of assemblage characteristic, 13
Or 21 representative feature data numbering.
Said above according to the storage of the industrial characteristic database of the embodiment, renewal, upgrading and calling
It is bright, it will not be repeated here.
According to the embodiment, data Layer, industry layer and combination layer can be utilized to realize the storage of industrial characteristic data, and then
Engine 20 is cracked down upon evil forces to realize retrieval and the calling to industrial characteristic data, so as to realize to industry by the security system for software
The deep layer customization protection of software.
According to further embodiment, can not also include being used as the second layer in industrial characteristic database as shown in Figure 5
The combination layer of level.In such instances, the storage of industrial characteristic data is realized merely with data Layer and industry layer, and then passes through this
Security system for software cracks down upon evil forces engine 20 to realize retrieval and the calling to industrial characteristic data, so as to realize to development
Deep layer customization protection.
Although described above is the embodiment that hierarchical structure includes three levels and two levels, those skilled in the art exist
After understanding the content of the embodiment of the present disclosure, can also conceive hierarchical structure includes more than three level, for example, level Four, Pyatyi etc.,
These modifications and variations examples are within the scope of this disclosure.
According to one embodiment, in the case where storage hierarchical structure includes three levels, the safety of security system for software
The processing unit 22 of component 20 can be additionally configured to the spy according to the industrial characteristic data being stored in industrial characteristic database
The combination for levying type carries out the detection of respective type feature to protected software.Detected in the protected software with
Corresponding to the characteristic type during feature, processing unit can be configured as taking predetermined measures to the protected software.
According to the combination of the characteristic type for the industrial characteristic data being stored in industrial characteristic database to protected software
The efficiency that data are retrieved from industrial characteristic database can be improved by carrying out the detection of respective type feature, improve secure group
Whether part inspection software improves the efficiency and validity of protection software by the efficiency of piracy.
Mention in the description " one embodiment ", " preferred embodiment ", " embodiment " and " each embodiment " mean with
Specific feature, structure, characteristic or the function that the embodiment is combined description are included at least one embodiment of the disclosure
And it may be embodied in more than one embodiment.Moreover, specification occur everywhere above-mentioned wording be not necessarily all referring to it is same
Embodiment.
, can be without departing from the scope of the invention to disclosed reality in addition to content described herein
Apply example and carry out various modifications.Therefore, explanation and example here is interpreted as illustrative and not restrictive.The present invention's
Spirit and scope should limit solely by reference to claim and its equivalents.
Claims (16)
- A kind of 1. method for protecting software, it is characterised in that using with the security component that protected software is bound to being protected Shield software is protected, and methods described includes:During protected software is run, according to the row being stored in industrial characteristic database corresponding with the protected software The characteristic type of industry characteristic carries out the detection of respective type feature to protected software;When feature corresponding with the characteristic type is detected in the protected software, the protected software is adopted Take predetermined measures.
- 2. according to the method for claim 1, wherein, the detection type includes:The detection of pirate patch feature and/or broken Solve the detection of analysis tool feature.
- 3. according to the method for claim 1, wherein, the industrial characteristic data include industry ID, the characteristic type and The feature.
- 4. according to the method for claim 1, wherein, the industrial characteristic database is hierarchical structure, the hierarchical structure In the first level include the feature, the second level includes profession identity, detection type and each detection type With the mapping relations of the feature of first level.
- 5. according to the method for claim 1, wherein, the industrial characteristic database is hierarchical structure, the hierarchical structure In the first level include the feature, the second level include combinations of features identify and each combinations of features with it is described The mapping relations of the feature of first level, third layer level include profession identity, detection type and each detection type With the mapping relations of the combinations of features mark in the feature and/or the second level in first level.
- 6. according to the method for claim 5, according to the feature for the industrial characteristic data being stored in industrial characteristic database The detection that type carries out respective type feature to protected software is included according to the row being stored in industrial characteristic database The combinations of features of industry characteristic carries out the detection of respective type feature to protected software.
- 7. according to the method for claim 1, wherein, the industrial characteristic data include memory features data, window name Characteristic, process characteristic.
- 8. according to the method for claim 1, wherein, the industrial characteristic database obtains from service end.
- 9. a kind of system for protecting software, it is characterised in that the system includes security component, the security component and quilt Protecting software binding, security component includes to be protected to it:Detection unit, it is configured as during protected software is run, corresponding with the protected software according to being stored in The characteristic type of industrial characteristic data in industrial characteristic database carries out the inspection of respective type feature to protected software Survey;Processing unit, it is configured as detecting feature corresponding with the characteristic type in the protected software When, predetermined measures are taken to the protected software.
- 10. system according to claim 9, wherein, the detection type includes:The detection of pirate patch feature and/or Crack the detection of analysis tool feature.
- 11. system according to claim 9, wherein, the industrial characteristic data include industry ID, the characteristic type and The feature.
- 12. system according to claim 9, wherein, the industrial characteristic database is hierarchical structure, the hierarchical structure In the first level include the feature, the second level includes profession identity, detection type and each detection type With the mapping relations of the feature of first level.
- 13. system according to claim 9, wherein, the industrial characteristic database is hierarchical structure, the hierarchical structure In the first level include the feature, the second level include combinations of features identify and each combinations of features with it is described The mapping relations of the feature of first level, third layer level include profession identity, detection type and each detection type With the mapping relations of the combinations of features mark in the feature and/or the second level in first level.
- 14. system according to claim 13, wherein, the processing unit is additionally configured to basis and is stored in industrial characteristic The combinations of features of industrial characteristic data in database carries out the detection of respective type feature to protected software.
- 15. system according to claim 9, wherein, the industrial characteristic data include memory features data, window name Characteristic, process characteristic.
- 16. system according to claim 9, wherein, the industrial characteristic database obtains from service end.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710917542.9A CN107609359B (en) | 2017-09-30 | 2017-09-30 | For protecting the method and system of software |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710917542.9A CN107609359B (en) | 2017-09-30 | 2017-09-30 | For protecting the method and system of software |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107609359A true CN107609359A (en) | 2018-01-19 |
CN107609359B CN107609359B (en) | 2019-05-03 |
Family
ID=61068425
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710917542.9A Active CN107609359B (en) | 2017-09-30 | 2017-09-30 | For protecting the method and system of software |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107609359B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11605146B2 (en) | 2017-03-13 | 2023-03-14 | Advanced New Technologies Co., Ltd. | Traffic section fee payment method, fee system, and payment system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1972292A (en) * | 2005-10-17 | 2007-05-30 | 飞塔信息科技(北京)有限公司 | Electronic data processing system and method thereof |
US20070220575A1 (en) * | 2006-03-03 | 2007-09-20 | Verimatrix, Inc. | Movie studio-based network distribution system and method |
CN102592103A (en) * | 2011-01-17 | 2012-07-18 | 中国电信股份有限公司 | Secure file processing method, equipment and system |
CN102855439A (en) * | 2012-07-26 | 2013-01-02 | 深圳市赛格导航科技股份有限公司 | Executable file self-checking method and device |
CN103164642A (en) * | 2011-12-19 | 2013-06-19 | 比亚迪股份有限公司 | Method and system for preventing software piracy |
CN104063664A (en) * | 2014-06-26 | 2014-09-24 | 北京奇虎科技有限公司 | Software installation package security detection method, software installation package security detection client, software installation package security detection server and software installation package security detection system |
-
2017
- 2017-09-30 CN CN201710917542.9A patent/CN107609359B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1972292A (en) * | 2005-10-17 | 2007-05-30 | 飞塔信息科技(北京)有限公司 | Electronic data processing system and method thereof |
US20070220575A1 (en) * | 2006-03-03 | 2007-09-20 | Verimatrix, Inc. | Movie studio-based network distribution system and method |
CN102592103A (en) * | 2011-01-17 | 2012-07-18 | 中国电信股份有限公司 | Secure file processing method, equipment and system |
CN103164642A (en) * | 2011-12-19 | 2013-06-19 | 比亚迪股份有限公司 | Method and system for preventing software piracy |
CN102855439A (en) * | 2012-07-26 | 2013-01-02 | 深圳市赛格导航科技股份有限公司 | Executable file self-checking method and device |
CN104063664A (en) * | 2014-06-26 | 2014-09-24 | 北京奇虎科技有限公司 | Software installation package security detection method, software installation package security detection client, software installation package security detection server and software installation package security detection system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11605146B2 (en) | 2017-03-13 | 2023-03-14 | Advanced New Technologies Co., Ltd. | Traffic section fee payment method, fee system, and payment system |
Also Published As
Publication number | Publication date |
---|---|
CN107609359B (en) | 2019-05-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102176224B (en) | Methods and apparatus for dealing with malware | |
CN105260663B (en) | A kind of safe storage service system and method based on TrustZone technologies | |
CN100578522C (en) | Electronic device, update method for same and integrated circuit | |
US7975308B1 (en) | Method and apparatus to secure user confidential data from untrusted browser extensions | |
CN104318135B (en) | A kind of Java code Safety actuality loading method based on credible performing environment | |
US9183377B1 (en) | Unauthorized account monitoring system and method | |
CN105408911A (en) | Hardware and software execution profiling | |
CN107766728A (en) | Mobile application security managing device, method and mobile operation safety protection system | |
CN100452908C (en) | System and method for preventing software and hardware with communication condition / function from being embezzled | |
CN103493061A (en) | Methods and apparatus for dealing with malware | |
CN107003866A (en) | The safety establishment of encrypted virtual machine from encrypted template | |
CN101414327B (en) | Method for file protection | |
CN101483658B (en) | System and method for input content protection of browser | |
CN104573530A (en) | Server safety reinforcing system | |
US20230308459A1 (en) | Authentication attack detection and mitigation with embedded authentication and delegation | |
US20230362141A1 (en) | Network authentication toxicity assessment | |
CN109815701A (en) | Detection method, client, system and the storage medium of software security | |
CN106548097A (en) | The operation method and device of network device software | |
CN103970540A (en) | Method and device for safely calling key function | |
CN108763062A (en) | Bury the filter method and terminal device of a title | |
CN104955043B (en) | A kind of intelligent terminal security protection system | |
CN107609359B (en) | For protecting the method and system of software | |
CN109583191B (en) | Method and device for protecting integrity of control flow of cloud program | |
KR102541888B1 (en) | Image-based malicious code analysis method and apparatus and artificial intelligence-based endpoint detection and response system using the same | |
CN105912945A (en) | Safety reinforcing device and operation method of operating system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing Patentee after: Beijing Shendun Technology Co.,Ltd. Address before: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd. |
|
CP01 | Change in the name or title of a patent holder |