CN112905961A - Network communication method for computer software protection - Google Patents
Network communication method for computer software protection Download PDFInfo
- Publication number
- CN112905961A CN112905961A CN201911135649.3A CN201911135649A CN112905961A CN 112905961 A CN112905961 A CN 112905961A CN 201911135649 A CN201911135649 A CN 201911135649A CN 112905961 A CN112905961 A CN 112905961A
- Authority
- CN
- China
- Prior art keywords
- software
- computer
- client
- software client
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 title claims abstract description 15
- 238000000034 method Methods 0.000 title claims abstract description 13
- 238000012795 verification Methods 0.000 claims abstract description 33
- 241000700605 Viruses Species 0.000 claims description 12
- 230000000694 effects Effects 0.000 claims description 4
- 230000009466 transformation Effects 0.000 claims description 3
- 230000002457 bidirectional effect Effects 0.000 abstract description 3
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000006386 memory function Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Technology Law (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to the technical field of computers, and discloses a network communication method for protecting computer software, which comprises the following steps: firstly, before the computer is opened and operated, firstly, the password of a user is verified, after the password is verified, the computer formally enters an operation stage, a secret key matched with a software client is inserted into a USB socket of the computer, then the downloaded software client on the computer is clicked, when the software client receives a command of opening the software, a command input window is popped up, and the secret key is verified. The invention ensures the security of the encrypted software by bidirectional encryption of the key and the mobile client, updates different verification codes in real time when the software client is used, reduces the risk of log-in of the software client by breaking, automatically generates obfuscation codes when malicious browsing data is received by setting a data security protection system, and hides and protects metadata, thereby improving the code intrusion resistance.
Description
Technical Field
The invention relates to the technical field of computers, in particular to a network communication method for protecting computer software.
Background
Along with the continuous progress of society, computers have also been popularized and used, and the computers are modern electronic computing machines, which are used for high-speed computing, can perform numerical computation and logic computation, also have a memory function, store a large amount of data for reuse, and are modern intelligent electronic equipment capable of automatically and high-speed processing mass data according to program operation. Because of the continuous development of computers, network security is valued by more and more people, the research, development and maintenance of computer software consume a large amount of manpower and material resources, but the interests of software developers are seriously infringed due to a large amount of software piracy and software cracking behaviors.
The software protection of the existing computer is mostly simple encryption protection through self-contained encryption software, the encryption mode can enable the encrypted software to be easily cracked, not only can data in the encrypted software be easily stolen, but also the encrypted soft armor is easily attacked by various trojans, and the privacy of the internal encrypted data is lost.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides a network communication method for protecting computer software, which has the advantages of solving the problems that the existing computer software protection is mostly simple encryption protection through self-contained encryption software, the encryption mode can ensure that the encrypted software can be easily cracked, not only can the data in the encrypted software be easily stolen, but also the encrypted soft armor is easily attacked by various trojan viruses, and the privacy of the encrypted data in the encrypted soft armor is lost.
(II) technical scheme
In order to achieve the purpose, the invention provides the following technical scheme: a network communication method for protecting computer software comprises the following steps:
s1: firstly, before the computer is opened and operated, the password of a user is verified, and after the password is verified, the computer formally enters an operation stage.
S2: inserting a secret key matched with the software client into a USB socket of a computer, clicking the downloaded software client on the computer, popping up a command input window when the software client receives a command of opening the software, and verifying the secret key.
S3: and after the verification is passed, a verification code appears on a display screen of the key, the verification code is input in a pop-up window of the software client, and when the verification code is correctly input, the software client is successfully activated to realize successful login and enable the software to start to be used.
S4: the software client is internally provided with a virus protection system and a data security protection system.
S5: and if the virus protection system detects malicious intrusion during software running, the software client immediately closes the software client and carries out self-locking.
S6: after the software completes self-locking, the virus protection system sends an alarm signal to the mobile terminal through the built-in alarm module and the wireless communication module, so that a user can find that the computer software is invaded in time.
S7: and if the software detects malicious data reading or sensitive data downloading or copying during running, the data security protection system arranged in the software automatically runs.
S8: the data is encrypted and protected, the contents of the encrypted data cannot be acquired through copying, printing, memory stealing, uploading, downloading and other modes, and the encrypted data can be continuously accessed only after the mobile client passes identity authentication and under the management of a server.
Preferably, in the first step, when the verification code is input incorrectly for the first time, the software client activates the key again, and the key works again to generate a new verification code, where the verification code is inconsistent with the last verification code.
Preferably, after the software self-locking described in the sixth step, the user must carry the mobile terminal and verify the key at the same time to release the software self-locking state.
Preferably, after the access data described in the step eight is encrypted, the software client performs logic transformation on the metadata content according to a predetermined rule or rule set and correspondingly generates a obfuscation code, so as to achieve the effect of secondary encryption.
Preferably, the key is inserted into the computer, the software client can run successfully, and when the key is pulled out, the software client automatically stops running and exits to the verification code input window.
(III) advantageous effects
Compared with the prior art, the invention provides a network communication method for protecting computer software, which has the following beneficial effects:
the invention ensures the safety of the encrypted software by bidirectional encryption of the key and the mobile client, updates different verification codes in real time when the software client is used, reduces the risk of the software client being cracked and logged in, and automatically generates obfuscation codes when receiving malicious browsing data by setting a data security protection system, and the metadata is hidden and protected, the code intrusion resistance is improved, the intruder is prevented from tampering the code of the software, the problem that the software protection of the existing computer is mostly realized by simply encrypting protection through the own encrypting software is solved, the encryption mode can easily break the encrypted software, so that not only the data in the encrypted software is easily stolen, but also the encrypted soft armor is easily attacked by various Trojan viruses, thereby losing the privacy of the encrypted data in the encrypted soft armor.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example (b):
the invention provides a technical scheme that: a network communication method for protecting computer software comprises the following steps:
s1: firstly, before the computer is opened and operated, the password of a user is verified, and after the password is verified, the computer formally enters an operation stage.
S2: the key matched with the software client is inserted into a USB socket of a computer, the downloaded software client is clicked on the computer, when the software client receives a software opening command, a command input window is popped up, the key is verified, a memory is arranged in the key, the running data and the fault state information of the software can be stored in real time through the memory, maintenance personnel can check the history record of the fault information at any time, and the software client is maintained in a targeted manner.
S3: and after the verification is passed, a verification code appears on a display screen of the key, the verification code is input in a pop-up window of the software client, and when the verification code is correctly input, the software client is successfully activated to realize successful login and enable the software to start to be used.
S4: the software client is internally provided with a virus protection system and a data security protection system.
S5: and if the virus protection system detects malicious intrusion during software running, the software client immediately closes the software client and carries out self-locking.
S6: after the software completes self-locking, the virus protection system sends an alarm signal to the mobile terminal through the built-in alarm module and the wireless communication module, so that a user can find that the computer software is invaded in time.
S7: and if the software detects malicious data reading or sensitive data downloading or copying during running, the data security protection system arranged in the software automatically runs.
S8: the data is encrypted and protected, the contents of the encrypted data cannot be acquired through copying, printing, memory stealing, uploading, downloading and other modes, and the encrypted data can be continuously accessed only after the mobile client passes identity authentication and under the management of a server.
Specifically, in the first step, when the verification code is input for the first time in error, the software client activates the key again, the key works again to generate a new verification code, the verification code is inconsistent with the verification code at the last time, the real-time updating of the verification code is facilitated, and the login verification code is a random Chinese and English combined 6-bit verification code.
Specifically, after the software self-locking described in the step six is performed, the user must carry the mobile terminal and verify the key at the same time to release the software self-locking state.
Specifically, after the access data described in step eight is encrypted, the software client performs logical transformation on the metadata content according to a predetermined rule or rule set and correspondingly generates a obfuscation code, so as to achieve the effect of secondary encryption.
Specifically, the key is inserted into the computer, the software client can operate successfully, when the key is pulled out, the software client automatically stops operating and exits to the verification code input window, when the verification code input result is correct, the software operates normally, and if the verification code input result is incorrect for more than five times, the computer software is locked within a certain period.
The invention has the beneficial effects that: the invention ensures the safety of the encrypted software by bidirectional encryption of the key and the mobile client, updates different verification codes in real time when the software client is used, reduces the risk of the software client being cracked and logged in, and automatically generates obfuscation codes when receiving malicious browsing data by setting a data security protection system, and the metadata is hidden and protected, the code intrusion resistance is improved, the intruder is prevented from tampering the code of the software, the problem that the software protection of the existing computer is mostly realized by simply encrypting protection through the own encrypting software is solved, the encryption mode can easily break the encrypted software, so that not only the data in the encrypted software is easily stolen, but also the encrypted soft armor is easily attacked by various Trojan viruses, thereby losing the privacy of the encrypted data in the encrypted soft armor.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (5)
1. A network communication method for computer software protection, comprising the steps of:
s1: firstly, before the computer is opened and operated, the password of a user is verified, and after the password is verified, the computer formally enters an operation stage;
s2: inserting a secret key matched with the software client into a USB socket of a computer, clicking the downloaded software client on the computer, popping up a command input window when the software client receives a command for opening the software, and verifying the secret key;
s3: after the verification is passed, a verification code appears on a display screen of the key, the verification code is input in a pop-up window of the software client, and when the verification code is correctly input, the software client is successfully activated to realize successful login and enable the software to start to be used;
s4: a virus protection system and a data security protection system are arranged in the software client;
s5: if the virus protection system detects malicious intrusion while the software is running, the software client immediately closes the software client and carries out self-locking;
s6: after the software completes self-locking, the virus protection system sends an alarm signal to the mobile terminal through the built-in alarm module and the wireless communication module, so that a user can find that the computer software is invaded in time;
s7: if the software detects malicious reading of data or downloading or copying of sensitive data during operation, a data security protection system arranged in the software automatically operates;
s8: the data is encrypted and protected, the contents of the encrypted data cannot be acquired through copying, printing, memory stealing, uploading, downloading and other modes, and the encrypted data can be continuously accessed only after the mobile client passes identity authentication and under the management of a server.
2. The method as claimed in claim 1, wherein when the verification code is inputted for the first time in the first step, the software client reactivates the key, and the key reactivates to generate a new verification code, which is inconsistent with the last verification code.
3. The network communication method for protecting computer software according to claim 1, wherein after the software auto-lock described in the sixth step, the user must carry the mobile terminal and simultaneously authenticate the key to release the software auto-lock state.
4. The network communication method for protecting computer software according to claim 1, wherein after the access data described in step eight is encrypted, the software client performs logical transformation on metadata content according to a predetermined rule or rule set and correspondingly generates obfuscation codes, so as to achieve the effect of secondary encryption.
5. The network communication method for protecting computer software as claimed in claim 1, wherein the key is inserted into the computer, the software client can be successfully run, and when the key is removed, the software client will automatically terminate running and exit to the authentication code input window.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911135649.3A CN112905961A (en) | 2019-11-19 | 2019-11-19 | Network communication method for computer software protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911135649.3A CN112905961A (en) | 2019-11-19 | 2019-11-19 | Network communication method for computer software protection |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112905961A true CN112905961A (en) | 2021-06-04 |
Family
ID=76104205
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911135649.3A Pending CN112905961A (en) | 2019-11-19 | 2019-11-19 | Network communication method for computer software protection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112905961A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113553573A (en) * | 2021-07-09 | 2021-10-26 | 深圳市高德信通信股份有限公司 | Data security verification method |
-
2019
- 2019-11-19 CN CN201911135649.3A patent/CN112905961A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113553573A (en) * | 2021-07-09 | 2021-10-26 | 深圳市高德信通信股份有限公司 | Data security verification method |
CN113553573B (en) * | 2021-07-09 | 2024-02-06 | 深圳市高德信通信股份有限公司 | Data security verification method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100568212C (en) | Shielding system and partition method | |
CN101340281B (en) | Method and system for safe login input on network | |
US7263721B2 (en) | Password protection | |
US20060101047A1 (en) | Method and system for fortifying software | |
Almeshekah et al. | Ersatzpasswords: Ending password cracking and detecting password leakage | |
US20160099960A1 (en) | System and method for scanning hosts using an autonomous, self-destructing payload | |
US20090106827A1 (en) | System and method for user password protection | |
BRPI0815605B1 (en) | METHOD FOR COMMUNICATING DATA USING A COMPUTER DEVICE; METHOD FOR GENERATING A SECOND VERSION OF A DATA COMMUNICATION COMPONENT USING A COMPUTER DEVICE; METHOD FOR COMMUNICATING DATA USING A COMPUTER DEVICE; METHOD FOR CREATING A CERTIFICATE USING A COMPUTER DEVICE; AND METHOD FOR USING A CERTIFICATE USING A COMPUTER DEVICE | |
CN113841145A (en) | Lexus software in inhibit integration, isolation applications | |
CA2842741C (en) | Password audit system | |
CN114928462A (en) | Web safety protection method based on user behavior recognition | |
CN104361298B (en) | The method and apparatus of Information Security | |
CN112905961A (en) | Network communication method for computer software protection | |
CN112434270A (en) | Method and system for enhancing data security of computer system | |
WO2009023421A2 (en) | System and method of generating and providing a set of randomly selected substitute characters in place of a user entered key phrase | |
CN107423627A (en) | The time slot scrambling and electronic equipment of a kind of electronic equipment | |
CN113268743A (en) | Method for improving safety of dynamic loop monitoring system | |
Banda et al. | Technological paradox of hackers begetting hackers: A case of ethical and unethical hackers and their subtle tools | |
Brintha et al. | Securing Banking Credentials from SQL Injection Attacks using AES Algorithm | |
CN113111336A (en) | Authentication method based on security computer | |
Ganji et al. | Provides a New Way to Enhance Security in the Linux Operating System | |
CN111079123A (en) | System and method for limiting unauthorized camera shooting by computer | |
JP3227536B2 (en) | Keyboard device and password authentication method using the same | |
CN116340920B (en) | Intelligent wearable equipment coded lock system based on security model | |
Schneier | Security pitfalls in cryptographic design |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |