CN113761483A - Software product protection method, device and medium based on soft encryption application program - Google Patents

Software product protection method, device and medium based on soft encryption application program Download PDF

Info

Publication number
CN113761483A
CN113761483A CN202111014219.3A CN202111014219A CN113761483A CN 113761483 A CN113761483 A CN 113761483A CN 202111014219 A CN202111014219 A CN 202111014219A CN 113761483 A CN113761483 A CN 113761483A
Authority
CN
China
Prior art keywords
serial number
file
application program
server information
soft encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111014219.3A
Other languages
Chinese (zh)
Inventor
李家奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Inspur Genersoft Information Technology Co Ltd
Original Assignee
Shandong Inspur Genersoft Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Inspur Genersoft Information Technology Co Ltd filed Critical Shandong Inspur Genersoft Information Technology Co Ltd
Priority to CN202111014219.3A priority Critical patent/CN113761483A/en
Publication of CN113761483A publication Critical patent/CN113761483A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a software product protection method, device and medium based on a soft encryption application program. The method comprises the steps of obtaining application server information of a client, and generating an application server information file according to the application server information; generating a soft encryption application program according to the application server information file; acquiring the manufacturing server information of the serial number manufacturing terminal, and generating a manufacturing server information file according to the manufacturing server information; generating an activation file according to the information file of the manufacturing server, and sending the activation file to the serial number manufacturing terminal; acquiring an encrypted serial number file generated by a serial number making terminal; and sending the soft encryption application program, the activation file and the encryption serial number file to an application server of the client. The method disclosed by the application ensures that the software product can only be used by the uniquely authorized application server, greatly ensures the safety of the software product, and effectively prevents the software product from being pirated, cracked and the like.

Description

Software product protection method, device and medium based on soft encryption application program
Technical Field
The present application relates to the field of computer software technologies, and in particular, to a method, an apparatus, and a medium for protecting a software product based on a soft encryption application.
Background
With the continuous and deep development of enterprise management cloud and automation, enterprise resource automation management becomes a key focus of attention, and the demand of various industries on system software products is increased.
At present, the purchasing modes of software products are mainly divided into two modes, one mode is that the software products are purchased by a consumer at one time, the software products are installed and used after being authorized by a software developer, and the software developer updates the consumer free at the later stage. This approach is more suitable for large customers. The other is that the consumer can try out the software for free first, and then purchase the software according to the requirement of the consumer to obtain the authorization or upgrade software products of certain functions. This approach is well suited for small and medium sized businesses or individual users. However, in any way, it is most important for software developers to prevent software products from being cracked or pirated, and once software products are cracked and pirated, the software developers face huge loss. Therefore, the problem that the authorized license of the software is protected to be solved urgently is to prevent the software from being cracked.
The protection method of the software product is generally verified through a serial number or an authorization file, and if the verification is passed, the software product can be installed and used on any machine. However, once a software product is sold, the software product cannot be tracked or monitored, illegal users can crack the authorization file of the software for any long time, once the authorization file is cracked, the software product can be copied in a large batch, and the rights and interests of software developers are seriously infringed.
Therefore, there is an urgent need to develop a novel software product protection method based on soft encryption application program, which performs authorization control on software products according to the soft encryption application program, so as to protect intellectual property rights and prevent software from being cracked and pirated.
Disclosure of Invention
The embodiment of the specification provides a software product protection method, device and medium based on a soft encryption application program, which are used for solving the following technical problems in the prior art: the serial number or the authorization file of the software product is easy to crack, so that the software product is copied and pirated in a large quantity, and a software developer suffers great economic loss.
The embodiment of the specification adopts the following technical scheme:
a software product protection method based on soft encryption application program is applied to a soft encryption application program manufacturing end, wherein the method comprises the following steps:
acquiring application server information of a client, and generating an application server information file according to the application server information;
generating a soft encryption application program according to the application server information file, wherein the soft encryption application program is at least used for randomly generating a secret key;
acquiring manufacturing server information of a serial number manufacturing end, and generating a manufacturing server information file according to the manufacturing server information;
generating an activation file according to the manufacturing server information file, and sending the activation file to the serial number manufacturing end, wherein the activation file is at least used for reading the secret key randomly generated by the soft encryption application program;
acquiring an encrypted serial number file generated by the serial number making end, wherein the encrypted serial number file is obtained by reading the key by applying the activation file by the serial number making end and encrypting serial number information of a software product according to the key;
and sending the soft encryption application program, the activation file and the encryption serial number file to an application server of a client.
A software product protection method based on soft encryption application program is applied to a client, and comprises the following steps:
sending the application server information to a soft encryption application program making end;
acquiring a soft encryption application program, an activation file and an encryption serial number file which are sent by a soft encryption application program making end, wherein the soft encryption application program is generated by the soft encryption application program making end according to an application server information file, the activation file is generated by the soft encryption application program making end according to a making server information file, and the encryption serial number file is obtained by encrypting serial number information of a software product by the serial number making end according to a secret key randomly generated by the soft encryption application program;
installing the soft encryption application program, importing the activation file, and reading a key randomly generated by the soft encryption application program by using the activation file;
decrypting the encrypted serial number by adopting the secret key to obtain serial number information of the software product;
and obtaining authorization through the serial number information and operating the software product.
A software product protection method based on soft encryption application program is applied to a serial number making end, wherein the method comprises the following steps:
sending the information of the manufacturing server to a manufacturing end of the soft encryption application program;
acquiring an activation file sent by the soft encryption application program making end;
importing the activation file, and reading a key randomly generated by the soft encryption application program by using the activation file;
encrypting the serial number information of the software product by adopting the secret key to obtain an encrypted serial number file;
and sending the encrypted serial number file to the encrypted application program making end.
Further, the application server information includes at least one of: CPU serial number of the application server, BIOS serial number of the application server, hard disk serial number of the application server, and MAC address of network card of the application server.
Further, the production server information includes at least one of: the serial number of a CPU of the manufacturing server, the serial number of a BIOS of the manufacturing server, the serial number of a hard disk of the manufacturing server and the MAC address of a network card of the manufacturing server.
Further, the software product protection method based on the soft encryption application program further comprises the following steps:
the method comprises the steps of obtaining information of a multi-tenant system server of a client, and generating an application server information file according to the information of the multi-tenant system server.
Further, the soft encryption application program making end adopts an authorization server on the Internet.
Furthermore, the soft encryption application program making end is at least provided with a server information collecting tool, and the server information collecting tool is at least used for obtaining the application server information of the client and/or obtaining the making server information of the serial number making end.
A software product protection device based on a soft encryption application, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
acquiring application server information of a client, and generating an application server information file according to the application server information;
generating a soft encryption application program according to the application server information file, wherein the soft encryption application program is at least used for randomly generating a secret key;
acquiring manufacturing server information of a serial number manufacturing end, and generating a manufacturing server information file according to the manufacturing server information;
generating an activation file according to the manufacturing server information file, and sending the activation file to the serial number manufacturing end, wherein the activation file is at least used for reading the secret key randomly generated by the soft encryption application program;
acquiring an encrypted serial number file generated by the serial number making end, wherein the encrypted serial number file is obtained by reading the key by applying the activation file by the serial number making end and encrypting the serial number of the software product according to the key;
and sending the soft encryption application program, the activation file and the encryption serial number file to an application server of a client.
A non-transitory computer storage medium for software product protection based on soft encryption applications, storing computer-executable instructions, wherein the computer-executable instructions are configured to:
acquiring application server information of a client, and generating an application server information file according to the application server information;
generating a soft encryption application program according to the application server information file, wherein the soft encryption application program is at least used for randomly generating a secret key;
acquiring manufacturing server information of a serial number manufacturing end, and generating a manufacturing server information file according to the manufacturing server information;
generating an activation file according to the manufacturing server information file, and sending the activation file to the serial number manufacturing end, wherein the activation file is at least used for reading the secret key randomly generated by the soft encryption application program;
acquiring an encrypted serial number file generated by the serial number making end, wherein the encrypted serial number file is obtained by reading the key by applying the activation file by the serial number making end and encrypting the serial number of the software product according to the key;
and sending the soft encryption application program, the activation file and the encryption serial number file to an application server of a client.
The embodiment of the specification adopts at least one technical scheme which can achieve the following beneficial effects:
(1) the software product protection method based on the soft encryption application program, which is exemplified by the embodiment of the specification, adopts the soft encryption application program, binds the application server of the client, and ensures that the software product can only be used by the only application server based on the protection of the soft encryption application program, so that the software is not cracked, and the piracy is prevented.
(2) The software product protection method based on the soft encryption application program, which is disclosed by the embodiment of the specification, has no hardware or logistics, can realize electronic distribution of software products, is easy to manage and maintain, and is beneficial to improving the authorization efficiency and improving the user experience. Meanwhile, the sales modes of trial-and-buy before-buy or on-demand can be conveniently realized, more profitable modes are created for software developers, the overall software protection, distribution and management cost of the software developers is reduced, and the competitiveness of the software developers is improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic flowchart of a software product protection method based on a soft encryption application according to an embodiment of the present disclosure;
fig. 2 is an architectural diagram of a software product protection method based on a soft encryption application according to an embodiment of the present disclosure.
Detailed Description
In order to make the objects, technical solutions and advantages of the present disclosure more apparent, the technical solutions of the present disclosure will be clearly and completely described below with reference to the specific embodiments of the present disclosure and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments obtained by a person skilled in the art without making any inventive step based on the embodiments in the description belong to the protection scope of the present application.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings. Fig. 1 is a schematic flowchart of a software product protection method based on a soft encryption application according to an embodiment of the present disclosure.
As shown in fig. 1, a method for protecting a software product based on a soft encryption application is applied to a soft encryption application making end, and includes:
acquiring application server information of a client, and generating an application server information file according to the application server information;
generating a soft encryption application program according to the application server information file, wherein the soft encryption application program is at least used for randomly generating a secret key;
acquiring manufacturing server information of a serial number manufacturing end, and generating a manufacturing server information file according to the manufacturing server information;
generating an activation file according to the manufacturing server information file, and sending the activation file to the serial number manufacturing end, wherein the activation file is at least used for reading the secret key randomly generated by the soft encryption application program;
acquiring an encrypted serial number file generated by the serial number making end, wherein the encrypted serial number file is obtained by reading the key by applying the activation file by the serial number making end and encrypting serial number information of a software product according to the key;
and sending the soft encryption application program, the activation file and the encryption serial number file to an application server of a client.
In this embodiment, the software product protection method based on soft encryption application is applied to a client, and includes:
sending the application server information to a soft encryption application program making end;
acquiring a soft encryption application program, an activation file and an encryption serial number file which are sent by a soft encryption application program making end, wherein the soft encryption application program is generated by the soft encryption application program making end according to an application server information file, the activation file is generated by the soft encryption application program making end according to a making server information file, and the encryption serial number file is obtained by encrypting serial number information of a software product by the serial number making end according to a secret key randomly generated by the soft encryption application program;
installing the soft encryption application program, importing the activation file, and reading a key randomly generated by the soft encryption application program by using the activation file;
decrypting the encrypted serial number by adopting the secret key to obtain serial number information of the software product;
and obtaining authorization through the serial number information and operating the software product.
In this embodiment, the software product protection method based on soft encryption application is applied to a serial number making end, and includes:
sending the information of the manufacturing server to a manufacturing end of the soft encryption application program;
acquiring an activation file sent by the soft encryption application program making end;
importing the activation file, and reading a key randomly generated by the soft encryption application program by using the activation file;
encrypting the serial number information of the software product by adopting the secret key to obtain an encrypted serial number file;
and sending the encrypted serial number file to the encrypted application program making end.
In this embodiment, the application server information at least includes one of the following items: CPU serial number of the application server, BIOS serial number of the application server, hard disk serial number of the application server, and MAC address of network card of the application server.
In this embodiment, the production server information at least includes one of the following items: the serial number of a CPU of the manufacturing server, the serial number of a BIOS of the manufacturing server, the serial number of a hard disk of the manufacturing server and the MAC address of a network card of the manufacturing server.
In this embodiment, the method for protecting a software product based on a soft encryption application further includes:
the method comprises the steps of obtaining information of a multi-tenant system server of a client, and generating an application server information file according to the information of the multi-tenant system server.
In this embodiment, the soft encryption application program making end adopts an authorization server on the internet.
In this embodiment, the soft encryption application program making end is at least provided with a server information collecting tool, and the server information collecting tool is at least used for acquiring application server information of the client and/or acquiring making server information of the serial number making end.
The software product protection method based on the soft encryption application program in the embodiment adopts the soft encryption application program and binds the application server of the client, and the protection based on the soft encryption application program ensures that the software product can only be used by the only application server, so that the software is not cracked, and the piracy is prevented.
On the other hand, the software product protection method based on the soft encryption application program of the embodiment has no hardware or logistics, can realize electronic distribution of software products, is easy to manage and maintain, and is beneficial to improving the authorization efficiency and improving the user experience.
Meanwhile, the sales modes of trial-and-buy before-buy or on-demand can be conveniently realized, more profitable modes are created for software developers, the overall software protection, distribution and management cost of the software developers is reduced, and the competitiveness of the software developers is improved.
For the understanding of the present invention, the following further describes the specific contents of the above software product protection method based on soft encryption application:
as shown in fig. 2, the software product protection method based on soft encryption application according to the embodiment includes application to a soft encryption application making end, a client end, and a serial number making end.
Firstly, a server information collecting tool arranged in a soft encryption application program manufacturing end respectively acquires application server information of a client and manufacturing server information of a serial number manufacturing end.
Then, generating an application server information file by the soft encryption application program making end according to the obtained application server information; the application server information file is used to generate a soft encryption application program, and the soft encryption application program can randomly generate a secret key.
Meanwhile, the soft encryption application program making end generates a making server information file according to the obtained making server information; and generating an activation file by using the production server information file, wherein the activation file is at least used for reading the key randomly generated by the soft encryption application program.
The soft encryption application program making end sends the activation file to the serial number making end. After obtaining the activation file, the serial number making end imports the activation file and reads the key randomly generated by the soft encryption application program by adopting the activation file. Then, the serial number information of the software product is encrypted by using the key to produce an encrypted serial number file, and the encrypted serial number file is sent to a soft encryption application program making end.
And after obtaining the encrypted serial number file, the soft encryption application program making end sends the encrypted serial number file, the soft encryption application program and the activation file to an application server of the client.
After acquiring a soft encryption application program, an activation file and an encryption serial number file which are sent by a soft encryption application program making end, an application server of a client installs the soft encryption application program, introduces the activation file, and reads a key randomly generated by the soft encryption application program by adopting the activation file; and decrypting the encrypted serial number with the key to obtain serial number information of the software product.
Finally, the application server of the client obtains authorization through the serial number information of the software product, so that the software product can be operated on the application server.
In this embodiment, the application server information may be, for example: CPU serial number of the application server, BIOS serial number of the application server, hard disk serial number of the application server, MAC address of network card of the application server, etc. But of course also the machine code, machine name or IP address of the application server etc. The application server information may also be multi-tenant system server information if the client is formed by a multi-tenant system.
In this embodiment, the production server information may be, for example: the serial number of the CPU of the production server, the serial number of the BIOS of the production server, the serial number of the hard disk of the production server, the MAC address of the network card of the production server and the like.
In this embodiment, the soft encryption application program making end may adopt an authorization server on the internet or a local authorization server.
In this embodiment, the soft encryption application is a software lock issued by a third-party software system for an application server of certain specified characteristic information (CPU serial number, BIOS serial number, hard disk serial number, or network card MAC address, etc.), and the software lock is issued by a uniquely determined soft encryption application making end and activated and used by the uniquely determined application server. When the software product uses a soft encryption application for inspection control, then only the application server that bound and activated the soft encryption application can use the software product.
The soft encryption application program can ensure that the only certainty of binding and activation is controlled by the soft encryption application program, when the soft encryption application program is manufactured, the address of an application server needs to be input, the characteristic information of the application server is written into the soft encryption application program, when the soft encryption application program is manufactured, only the application server written with the information can be bound and activated, and only the application server bound and activated with the soft encryption application program can use a software product protected by the soft encryption application program, so that the safety of a software system is greatly ensured, piracy is prevented, and cracking is prevented.
Another aspect is the authorized license for the software, i.e., the serial number, that is obtained upon purchase. The software product protection method based on the soft encryption application program of the embodiment example enables the number of the registered users to represent the number of purchased authorized licenses, namely, how many authorized users can be allowed for purchasing how many registered users, so that the software can be prevented from being abused infinitely. In the method of this embodiment, the authorized license of the software needs to be written into the feature information of the application server in addition to the purchased product information, that is, the feature information is consistent with the application server information written by the soft encryption application program, and when the authorized license is made, the software will be protected by using an encryption mechanism. Because the unique determined information of the application server is written in the authorization license, the authorization license is only allowed to be used in the uniquely determined application service period, thereby preventing the authorization license from being abused indefinitely.
In the software product protection method based on the soft encryption application program of the embodiment, on one hand, the soft encryption application program binds the application server information of the client, so that the soft encryption application program can only be used by the bound application server, and on the other hand, when the encrypted serial number file is decrypted, the secret key can only be read from the soft encryption application program, so that the application server which is not bound by the soft encryption application program can not run even if the soft encryption application program is installed on the application server, and the secret key can not be read; or even if the key is cracked, the soft encryption application program cannot be installed on the application server which is not bound by the soft encryption application program, so that the software product can only be used by the only application server, the software is prevented from being cracked, and piracy is prevented.
Based on the same idea, some embodiments of the present application further provide a device and a non-volatile computer storage medium corresponding to the above method.
Some embodiments of the present application provide a software product protection device based on a soft encryption application corresponding to fig. 1, the device comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
acquiring application server information of a client, and generating an application server information file according to the application server information;
generating a soft encryption application program according to the application server information file, wherein the soft encryption application program is at least used for randomly generating a secret key;
acquiring manufacturing server information of a serial number manufacturing end, and generating a manufacturing server information file according to the manufacturing server information;
generating an activation file according to the manufacturing server information file, and sending the activation file to the serial number manufacturing end, wherein the activation file is at least used for reading the secret key randomly generated by the soft encryption application program;
acquiring an encrypted serial number file generated by the serial number making end, wherein the encrypted serial number file is obtained by reading the key by applying the activation file by the serial number making end and encrypting the serial number of the software product according to the key;
and sending the soft encryption application program, the activation file and the encryption serial number file to an application server of a client.
Some embodiments of the present application provide a non-volatile computer storage medium corresponding to a soft encryption application based software product protection of fig. 1, storing computer executable instructions configured to:
acquiring application server information of a client, and generating an application server information file according to the application server information;
generating a soft encryption application program according to the application server information file, wherein the soft encryption application program is at least used for randomly generating a secret key;
acquiring manufacturing server information of a serial number manufacturing end, and generating a manufacturing server information file according to the manufacturing server information;
generating an activation file according to the manufacturing server information file, and sending the activation file to the serial number manufacturing end, wherein the activation file is at least used for reading the secret key randomly generated by the soft encryption application program;
acquiring an encrypted serial number file generated by the serial number making end, wherein the encrypted serial number file is obtained by reading the key by applying the activation file by the serial number making end and encrypting the serial number of the software product according to the key;
and sending the soft encryption application program, the activation file and the encryption serial number file to an application server of a client.
The device and the medium provided by the embodiment of the application correspond to the method one to one, so the device and the medium also have the similar beneficial technical effects as the corresponding method, and the beneficial technical effects of the method are explained in detail above, so the beneficial technical effects of the device and the medium are not repeated herein.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is directed to methods, apparatus (systems), and computer program products according to embodiments of the present invention
A flowchart and/or block diagram of an article. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A software product protection method based on soft encryption application program is applied to a soft encryption application program making end, and is characterized by comprising the following steps:
acquiring application server information of a client, and generating an application server information file according to the application server information;
generating a soft encryption application program according to the application server information file, wherein the soft encryption application program is at least used for randomly generating a secret key;
acquiring manufacturing server information of a serial number manufacturing end, and generating a manufacturing server information file according to the manufacturing server information;
generating an activation file according to the manufacturing server information file, and sending the activation file to the serial number manufacturing end, wherein the activation file is at least used for reading the secret key randomly generated by the soft encryption application program;
acquiring an encrypted serial number file generated by the serial number making end, wherein the encrypted serial number file is obtained by reading the key by applying the activation file by the serial number making end and encrypting serial number information of a software product according to the key;
and sending the soft encryption application program, the activation file and the encryption serial number file to an application server of a client.
2. A software product protection method based on soft encryption application program is applied to a client, and is characterized by comprising the following steps:
sending the application server information to a soft encryption application program making end;
acquiring a soft encryption application program, an activation file and an encryption serial number file which are sent by a soft encryption application program making end, wherein the soft encryption application program is generated by the soft encryption application program making end according to an application server information file, the activation file is generated by the soft encryption application program making end according to a making server information file, and the encryption serial number file is obtained by encrypting serial number information of a software product by the serial number making end according to a secret key randomly generated by the soft encryption application program;
installing the soft encryption application program, importing the activation file, and reading a key randomly generated by the soft encryption application program by using the activation file;
decrypting the encrypted serial number by adopting the secret key to obtain serial number information of the software product;
and obtaining authorization through the serial number information and operating the software product.
3. A software product protection method based on soft encryption application program is applied to a serial number making end, and is characterized by comprising the following steps:
sending the information of the manufacturing server to a manufacturing end of the soft encryption application program;
acquiring an activation file sent by the soft encryption application program making end;
importing the activation file, and reading a key randomly generated by the soft encryption application program by using the activation file;
encrypting the serial number information of the software product by adopting the secret key to obtain an encrypted serial number file;
and sending the encrypted serial number file to the encrypted application program making end.
4. The software product protection method based on soft encryption application program according to claim 1, characterized in that:
the application server information includes at least one of: CPU serial number of the application server, BIOS serial number of the application server, hard disk serial number of the application server, and MAC address of network card of the application server.
5. The software product protection method based on soft encryption application program according to claim 1, characterized in that:
the production server information includes at least one of: the serial number of a CPU of the manufacturing server, the serial number of a BIOS of the manufacturing server, the serial number of a hard disk of the manufacturing server and the MAC address of a network card of the manufacturing server.
6. The soft encryption application-based software product protection method of claim 1, further comprising:
the method comprises the steps of obtaining information of a multi-tenant system server of a client, and generating an application server information file according to the information of the multi-tenant system server.
7. The software product protection method based on soft encryption application program according to claim 1, characterized in that:
and the soft encryption application program making end adopts an authorization server on the Internet.
8. The software product protection method based on soft encryption application program according to claim 1, characterized in that:
the soft encryption application program making end is at least provided with a server information collecting tool, and the server information collecting tool is at least used for obtaining application server information of the client and/or obtaining making server information of the serial number making end.
9. A software product protection device based on a soft encryption application, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
acquiring application server information of a client, and generating an application server information file according to the application server information;
generating a soft encryption application program according to the application server information file, wherein the soft encryption application program is at least used for randomly generating a secret key;
acquiring manufacturing server information of a serial number manufacturing end, and generating a manufacturing server information file according to the manufacturing server information;
generating an activation file according to the manufacturing server information file, and sending the activation file to the serial number manufacturing end, wherein the activation file is at least used for reading the secret key randomly generated by the soft encryption application program;
acquiring an encrypted serial number file generated by the serial number making end, wherein the encrypted serial number file is obtained by reading the key by applying the activation file by the serial number making end and encrypting the serial number of the software product according to the key;
and sending the soft encryption application program, the activation file and the encryption serial number file to an application server of a client.
10. A non-transitory computer storage medium for software product protection based on soft cryptographic applications, storing computer-executable instructions configured to:
acquiring application server information of a client, and generating an application server information file according to the application server information;
generating a soft encryption application program according to the application server information file, wherein the soft encryption application program is at least used for randomly generating a secret key;
acquiring manufacturing server information of a serial number manufacturing end, and generating a manufacturing server information file according to the manufacturing server information;
generating an activation file according to the manufacturing server information file, and sending the activation file to the serial number manufacturing end, wherein the activation file is at least used for reading the secret key randomly generated by the soft encryption application program;
acquiring an encrypted serial number file generated by the serial number making end, wherein the encrypted serial number file is obtained by reading the key by applying the activation file by the serial number making end and encrypting the serial number of the software product according to the key;
and sending the soft encryption application program, the activation file and the encryption serial number file to an application server of a client.
CN202111014219.3A 2021-08-31 2021-08-31 Software product protection method, device and medium based on soft encryption application program Pending CN113761483A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111014219.3A CN113761483A (en) 2021-08-31 2021-08-31 Software product protection method, device and medium based on soft encryption application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111014219.3A CN113761483A (en) 2021-08-31 2021-08-31 Software product protection method, device and medium based on soft encryption application program

Publications (1)

Publication Number Publication Date
CN113761483A true CN113761483A (en) 2021-12-07

Family

ID=78792169

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111014219.3A Pending CN113761483A (en) 2021-08-31 2021-08-31 Software product protection method, device and medium based on soft encryption application program

Country Status (1)

Country Link
CN (1) CN113761483A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115859337A (en) * 2023-02-14 2023-03-28 杭州大晚成信息科技有限公司 Kernel-based method, device, server and medium for preventing device cracking

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115859337A (en) * 2023-02-14 2023-03-28 杭州大晚成信息科技有限公司 Kernel-based method, device, server and medium for preventing device cracking

Similar Documents

Publication Publication Date Title
US20210294879A1 (en) Securing executable code integrity using auto-derivative key
CN102073826B (en) Utilize the system and method for the digital copyright management of lightweight digital watermark adding component
CN113012008B (en) Identity management method, device and equipment based on trusted hardware
US8321352B1 (en) Fingerprinting for software license inventory management
US8533859B2 (en) System and method for software protection and secure software distribution
US10678893B2 (en) Methods and related apparatus for managing access to digital assets
CN111814196B (en) Data processing method, device and equipment
CN111814195B (en) Data management method, device and equipment based on trusted hardware
CN110188555B (en) Disk data protection method, system and related components
CN110992218A (en) Music copyright protection method, device and medium based on block chain
EP1837789A2 (en) Method and apparatus for temporarily accessing content using temporary license
Nair et al. Enabling DRM-preserving digital content redistribution
CN111460420A (en) Method, device and medium for using electronic seal based on block chain
CN107423583B (en) A kind of software protecting device remapping method and device
CN111159661B (en) Decompilation prevention method and device, electronic equipment and storage medium
CN113761483A (en) Software product protection method, device and medium based on soft encryption application program
US20150262084A1 (en) Methods for defending static and dynamic reverse engineering of software license control and devices thereof
CN111639346A (en) Method and equipment for realizing traceless credit investigation query based on block chain
KR101405915B1 (en) Method for writing data by encryption and reading the data thereof
CN111460465A (en) Identity authentication method, equipment and medium based on block chain
CN107704731B (en) Cloud platform mirror image anti-piracy method based on HOTP
CN113868691B (en) Authorized operation method and device of block chain based on cloud-native technology
CN111611551B (en) Dynamic link library protection method and system based on cryptographic algorithm
KR20140011021A (en) Method for preventing unauthorized copying of the android platform-based applications and inserting digital watermarking in order to track the first clone
CN112035800A (en) Copyright information storage method, device and medium based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination