CN112905961A - Network communication method for computer software protection - Google Patents

Network communication method for computer software protection Download PDF

Info

Publication number
CN112905961A
CN112905961A CN201911135649.3A CN201911135649A CN112905961A CN 112905961 A CN112905961 A CN 112905961A CN 201911135649 A CN201911135649 A CN 201911135649A CN 112905961 A CN112905961 A CN 112905961A
Authority
CN
China
Prior art keywords
software
computer
client
software client
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911135649.3A
Other languages
Chinese (zh)
Inventor
杨绍禹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
North China University of Water Resources and Electric Power
Original Assignee
North China University of Water Resources and Electric Power
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by North China University of Water Resources and Electric Power filed Critical North China University of Water Resources and Electric Power
Priority to CN201911135649.3A priority Critical patent/CN112905961A/en
Publication of CN112905961A publication Critical patent/CN112905961A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of computers, and discloses a network communication method for protecting computer software, which comprises the following steps: firstly, before the computer is opened and operated, firstly, the password of a user is verified, after the password is verified, the computer formally enters an operation stage, a secret key matched with a software client is inserted into a USB socket of the computer, then the downloaded software client on the computer is clicked, when the software client receives a command of opening the software, a command input window is popped up, and the secret key is verified. The invention ensures the security of the encrypted software by bidirectional encryption of the key and the mobile client, updates different verification codes in real time when the software client is used, reduces the risk of log-in of the software client by breaking, automatically generates obfuscation codes when malicious browsing data is received by setting a data security protection system, and hides and protects metadata, thereby improving the code intrusion resistance.

Description

Network communication method for computer software protection
Technical Field
The invention relates to the technical field of computers, in particular to a network communication method for protecting computer software.
Background
Along with the continuous progress of society, computers have also been popularized and used, and the computers are modern electronic computing machines, which are used for high-speed computing, can perform numerical computation and logic computation, also have a memory function, store a large amount of data for reuse, and are modern intelligent electronic equipment capable of automatically and high-speed processing mass data according to program operation. Because of the continuous development of computers, network security is valued by more and more people, the research, development and maintenance of computer software consume a large amount of manpower and material resources, but the interests of software developers are seriously infringed due to a large amount of software piracy and software cracking behaviors.
The software protection of the existing computer is mostly simple encryption protection through self-contained encryption software, the encryption mode can enable the encrypted software to be easily cracked, not only can data in the encrypted software be easily stolen, but also the encrypted soft armor is easily attacked by various trojans, and the privacy of the internal encrypted data is lost.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides a network communication method for protecting computer software, which has the advantages of solving the problems that the existing computer software protection is mostly simple encryption protection through self-contained encryption software, the encryption mode can ensure that the encrypted software can be easily cracked, not only can the data in the encrypted software be easily stolen, but also the encrypted soft armor is easily attacked by various trojan viruses, and the privacy of the encrypted data in the encrypted soft armor is lost.
(II) technical scheme
In order to achieve the purpose, the invention provides the following technical scheme: a network communication method for protecting computer software comprises the following steps:
s1: firstly, before the computer is opened and operated, the password of a user is verified, and after the password is verified, the computer formally enters an operation stage.
S2: inserting a secret key matched with the software client into a USB socket of a computer, clicking the downloaded software client on the computer, popping up a command input window when the software client receives a command of opening the software, and verifying the secret key.
S3: and after the verification is passed, a verification code appears on a display screen of the key, the verification code is input in a pop-up window of the software client, and when the verification code is correctly input, the software client is successfully activated to realize successful login and enable the software to start to be used.
S4: the software client is internally provided with a virus protection system and a data security protection system.
S5: and if the virus protection system detects malicious intrusion during software running, the software client immediately closes the software client and carries out self-locking.
S6: after the software completes self-locking, the virus protection system sends an alarm signal to the mobile terminal through the built-in alarm module and the wireless communication module, so that a user can find that the computer software is invaded in time.
S7: and if the software detects malicious data reading or sensitive data downloading or copying during running, the data security protection system arranged in the software automatically runs.
S8: the data is encrypted and protected, the contents of the encrypted data cannot be acquired through copying, printing, memory stealing, uploading, downloading and other modes, and the encrypted data can be continuously accessed only after the mobile client passes identity authentication and under the management of a server.
Preferably, in the first step, when the verification code is input incorrectly for the first time, the software client activates the key again, and the key works again to generate a new verification code, where the verification code is inconsistent with the last verification code.
Preferably, after the software self-locking described in the sixth step, the user must carry the mobile terminal and verify the key at the same time to release the software self-locking state.
Preferably, after the access data described in the step eight is encrypted, the software client performs logic transformation on the metadata content according to a predetermined rule or rule set and correspondingly generates a obfuscation code, so as to achieve the effect of secondary encryption.
Preferably, the key is inserted into the computer, the software client can run successfully, and when the key is pulled out, the software client automatically stops running and exits to the verification code input window.
(III) advantageous effects
Compared with the prior art, the invention provides a network communication method for protecting computer software, which has the following beneficial effects:
the invention ensures the safety of the encrypted software by bidirectional encryption of the key and the mobile client, updates different verification codes in real time when the software client is used, reduces the risk of the software client being cracked and logged in, and automatically generates obfuscation codes when receiving malicious browsing data by setting a data security protection system, and the metadata is hidden and protected, the code intrusion resistance is improved, the intruder is prevented from tampering the code of the software, the problem that the software protection of the existing computer is mostly realized by simply encrypting protection through the own encrypting software is solved, the encryption mode can easily break the encrypted software, so that not only the data in the encrypted software is easily stolen, but also the encrypted soft armor is easily attacked by various Trojan viruses, thereby losing the privacy of the encrypted data in the encrypted soft armor.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example (b):
the invention provides a technical scheme that: a network communication method for protecting computer software comprises the following steps:
s1: firstly, before the computer is opened and operated, the password of a user is verified, and after the password is verified, the computer formally enters an operation stage.
S2: the key matched with the software client is inserted into a USB socket of a computer, the downloaded software client is clicked on the computer, when the software client receives a software opening command, a command input window is popped up, the key is verified, a memory is arranged in the key, the running data and the fault state information of the software can be stored in real time through the memory, maintenance personnel can check the history record of the fault information at any time, and the software client is maintained in a targeted manner.
S3: and after the verification is passed, a verification code appears on a display screen of the key, the verification code is input in a pop-up window of the software client, and when the verification code is correctly input, the software client is successfully activated to realize successful login and enable the software to start to be used.
S4: the software client is internally provided with a virus protection system and a data security protection system.
S5: and if the virus protection system detects malicious intrusion during software running, the software client immediately closes the software client and carries out self-locking.
S6: after the software completes self-locking, the virus protection system sends an alarm signal to the mobile terminal through the built-in alarm module and the wireless communication module, so that a user can find that the computer software is invaded in time.
S7: and if the software detects malicious data reading or sensitive data downloading or copying during running, the data security protection system arranged in the software automatically runs.
S8: the data is encrypted and protected, the contents of the encrypted data cannot be acquired through copying, printing, memory stealing, uploading, downloading and other modes, and the encrypted data can be continuously accessed only after the mobile client passes identity authentication and under the management of a server.
Specifically, in the first step, when the verification code is input for the first time in error, the software client activates the key again, the key works again to generate a new verification code, the verification code is inconsistent with the verification code at the last time, the real-time updating of the verification code is facilitated, and the login verification code is a random Chinese and English combined 6-bit verification code.
Specifically, after the software self-locking described in the step six is performed, the user must carry the mobile terminal and verify the key at the same time to release the software self-locking state.
Specifically, after the access data described in step eight is encrypted, the software client performs logical transformation on the metadata content according to a predetermined rule or rule set and correspondingly generates a obfuscation code, so as to achieve the effect of secondary encryption.
Specifically, the key is inserted into the computer, the software client can operate successfully, when the key is pulled out, the software client automatically stops operating and exits to the verification code input window, when the verification code input result is correct, the software operates normally, and if the verification code input result is incorrect for more than five times, the computer software is locked within a certain period.
The invention has the beneficial effects that: the invention ensures the safety of the encrypted software by bidirectional encryption of the key and the mobile client, updates different verification codes in real time when the software client is used, reduces the risk of the software client being cracked and logged in, and automatically generates obfuscation codes when receiving malicious browsing data by setting a data security protection system, and the metadata is hidden and protected, the code intrusion resistance is improved, the intruder is prevented from tampering the code of the software, the problem that the software protection of the existing computer is mostly realized by simply encrypting protection through the own encrypting software is solved, the encryption mode can easily break the encrypted software, so that not only the data in the encrypted software is easily stolen, but also the encrypted soft armor is easily attacked by various Trojan viruses, thereby losing the privacy of the encrypted data in the encrypted soft armor.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (5)

1. A network communication method for computer software protection, comprising the steps of:
s1: firstly, before the computer is opened and operated, the password of a user is verified, and after the password is verified, the computer formally enters an operation stage;
s2: inserting a secret key matched with the software client into a USB socket of a computer, clicking the downloaded software client on the computer, popping up a command input window when the software client receives a command for opening the software, and verifying the secret key;
s3: after the verification is passed, a verification code appears on a display screen of the key, the verification code is input in a pop-up window of the software client, and when the verification code is correctly input, the software client is successfully activated to realize successful login and enable the software to start to be used;
s4: a virus protection system and a data security protection system are arranged in the software client;
s5: if the virus protection system detects malicious intrusion while the software is running, the software client immediately closes the software client and carries out self-locking;
s6: after the software completes self-locking, the virus protection system sends an alarm signal to the mobile terminal through the built-in alarm module and the wireless communication module, so that a user can find that the computer software is invaded in time;
s7: if the software detects malicious reading of data or downloading or copying of sensitive data during operation, a data security protection system arranged in the software automatically operates;
s8: the data is encrypted and protected, the contents of the encrypted data cannot be acquired through copying, printing, memory stealing, uploading, downloading and other modes, and the encrypted data can be continuously accessed only after the mobile client passes identity authentication and under the management of a server.
2. The method as claimed in claim 1, wherein when the verification code is inputted for the first time in the first step, the software client reactivates the key, and the key reactivates to generate a new verification code, which is inconsistent with the last verification code.
3. The network communication method for protecting computer software according to claim 1, wherein after the software auto-lock described in the sixth step, the user must carry the mobile terminal and simultaneously authenticate the key to release the software auto-lock state.
4. The network communication method for protecting computer software according to claim 1, wherein after the access data described in step eight is encrypted, the software client performs logical transformation on metadata content according to a predetermined rule or rule set and correspondingly generates obfuscation codes, so as to achieve the effect of secondary encryption.
5. The network communication method for protecting computer software as claimed in claim 1, wherein the key is inserted into the computer, the software client can be successfully run, and when the key is removed, the software client will automatically terminate running and exit to the authentication code input window.
CN201911135649.3A 2019-11-19 2019-11-19 Network communication method for computer software protection Pending CN112905961A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911135649.3A CN112905961A (en) 2019-11-19 2019-11-19 Network communication method for computer software protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911135649.3A CN112905961A (en) 2019-11-19 2019-11-19 Network communication method for computer software protection

Publications (1)

Publication Number Publication Date
CN112905961A true CN112905961A (en) 2021-06-04

Family

ID=76104205

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911135649.3A Pending CN112905961A (en) 2019-11-19 2019-11-19 Network communication method for computer software protection

Country Status (1)

Country Link
CN (1) CN112905961A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113553573A (en) * 2021-07-09 2021-10-26 深圳市高德信通信股份有限公司 Data security verification method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113553573A (en) * 2021-07-09 2021-10-26 深圳市高德信通信股份有限公司 Data security verification method
CN113553573B (en) * 2021-07-09 2024-02-06 深圳市高德信通信股份有限公司 Data security verification method

Similar Documents

Publication Publication Date Title
CN100568212C (en) Shielding system and partition method
CN101340281B (en) Method and system for safe login input on network
US7263721B2 (en) Password protection
US20060101047A1 (en) Method and system for fortifying software
Almeshekah et al. Ersatzpasswords: Ending password cracking and detecting password leakage
US20160099960A1 (en) System and method for scanning hosts using an autonomous, self-destructing payload
US20090106827A1 (en) System and method for user password protection
BRPI0815605B1 (en) METHOD FOR COMMUNICATING DATA USING A COMPUTER DEVICE; METHOD FOR GENERATING A SECOND VERSION OF A DATA COMMUNICATION COMPONENT USING A COMPUTER DEVICE; METHOD FOR COMMUNICATING DATA USING A COMPUTER DEVICE; METHOD FOR CREATING A CERTIFICATE USING A COMPUTER DEVICE; AND METHOD FOR USING A CERTIFICATE USING A COMPUTER DEVICE
CN113841145A (en) Lexus software in inhibit integration, isolation applications
CA2842741C (en) Password audit system
CN114928462A (en) Web safety protection method based on user behavior recognition
CN104361298B (en) The method and apparatus of Information Security
CN112905961A (en) Network communication method for computer software protection
CN112434270A (en) Method and system for enhancing data security of computer system
WO2009023421A2 (en) System and method of generating and providing a set of randomly selected substitute characters in place of a user entered key phrase
CN107423627A (en) The time slot scrambling and electronic equipment of a kind of electronic equipment
CN113268743A (en) Method for improving safety of dynamic loop monitoring system
Banda et al. Technological paradox of hackers begetting hackers: A case of ethical and unethical hackers and their subtle tools
Brintha et al. Securing Banking Credentials from SQL Injection Attacks using AES Algorithm
CN113111336A (en) Authentication method based on security computer
Ganji et al. Provides a New Way to Enhance Security in the Linux Operating System
CN111079123A (en) System and method for limiting unauthorized camera shooting by computer
JP3227536B2 (en) Keyboard device and password authentication method using the same
CN116340920B (en) Intelligent wearable equipment coded lock system based on security model
Schneier Security pitfalls in cryptographic design

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination