CN1929381A - 一种基于网络的软件保护方法 - Google Patents
一种基于网络的软件保护方法 Download PDFInfo
- Publication number
- CN1929381A CN1929381A CN200610113237.6A CN200610113237A CN1929381A CN 1929381 A CN1929381 A CN 1929381A CN 200610113237 A CN200610113237 A CN 200610113237A CN 1929381 A CN1929381 A CN 1929381A
- Authority
- CN
- China
- Prior art keywords
- client
- side program
- server end
- code
- program
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 230000004044 response Effects 0.000 claims description 14
- 238000012545 processing Methods 0.000 claims description 3
- 230000008569 process Effects 0.000 abstract description 6
- 238000004891 communication Methods 0.000 abstract description 2
- 230000006870 function Effects 0.000 description 6
- 238000012795 verification Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000010200 validation analysis Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 208000027418 Wounds and injury Diseases 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 208000014674 injury Diseases 0.000 description 1
- 230000002787 reinforcement Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Remote Sensing (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Radar, Positioning & Navigation (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (9)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200610113237.6A CN100555939C (zh) | 2006-09-20 | 2006-09-20 | 一种基于网络的软件保护方法 |
US11/855,643 US8321924B2 (en) | 2006-09-20 | 2007-09-14 | Method for protecting software accessible over a network using a key device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200610113237.6A CN100555939C (zh) | 2006-09-20 | 2006-09-20 | 一种基于网络的软件保护方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1929381A true CN1929381A (zh) | 2007-03-14 |
CN100555939C CN100555939C (zh) | 2009-10-28 |
Family
ID=37859183
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200610113237.6A Active CN100555939C (zh) | 2006-09-20 | 2006-09-20 | 一种基于网络的软件保护方法 |
Country Status (2)
Country | Link |
---|---|
US (1) | US8321924B2 (zh) |
CN (1) | CN100555939C (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102420800A (zh) * | 2010-09-28 | 2012-04-18 | 俞浩波 | 通过多因子身份认证完成服务的方法、系统及认证终端 |
CN102420800B (zh) * | 2010-09-28 | 2016-12-14 | 俞浩波 | 通过多因子身份认证完成服务的方法、系统及认证终端 |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
MX2012000076A (es) * | 2009-07-01 | 2012-03-06 | Mandar Patil | Un metodo para controlar el uso no autorizado de una aplicacion de software. |
US9043863B1 (en) | 2010-09-07 | 2015-05-26 | Symantec Corporation | Policy enforcing browser |
US8832855B1 (en) | 2010-09-07 | 2014-09-09 | Symantec Corporation | System for the distribution and deployment of applications with provisions for security and policy conformance |
US8955152B1 (en) | 2010-09-07 | 2015-02-10 | Symantec Corporation | Systems and methods to manage an application |
JP2012084071A (ja) | 2010-10-14 | 2012-04-26 | Toshiba Corp | デジタルコンテンツの保護方法、復号方法、再生装置、記憶媒体、暗号装置 |
US8661527B2 (en) | 2011-08-31 | 2014-02-25 | Kabushiki Kaisha Toshiba | Authenticator, authenticatee and authentication method |
JP5275432B2 (ja) | 2011-11-11 | 2013-08-28 | 株式会社東芝 | ストレージメディア、ホスト装置、メモリ装置、及びシステム |
JP5100884B1 (ja) * | 2011-12-02 | 2012-12-19 | 株式会社東芝 | メモリ装置 |
JP5204290B1 (ja) | 2011-12-02 | 2013-06-05 | 株式会社東芝 | ホスト装置、システム、及び装置 |
JP5275482B2 (ja) | 2012-01-16 | 2013-08-28 | 株式会社東芝 | ストレージメディア、ホスト装置、メモリ装置、及びシステム |
US9201811B2 (en) | 2013-02-14 | 2015-12-01 | Kabushiki Kaisha Toshiba | Device and authentication method therefor |
US8984294B2 (en) | 2013-02-15 | 2015-03-17 | Kabushiki Kaisha Toshiba | System of authenticating an individual memory device via reading data including prohibited data and readable data |
US9942213B2 (en) * | 2013-03-15 | 2018-04-10 | Comcast Cable Communications, Llc | Systems and methods for providing secure services |
CA2892535C (en) * | 2014-05-26 | 2022-11-22 | Robert Hayhow | Post-manufacture configuration of pin-pad terminals |
CN104125073B (zh) * | 2014-08-07 | 2017-09-08 | 南京雨巢网络有限公司 | 一种基于物联网喷淋控制系统的设备识别方法 |
CN109413181A (zh) * | 2018-10-28 | 2019-03-01 | 广州中元软件有限公司 | 一种实现应用程序的双架构模式方法 |
Family Cites Families (54)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0175487A3 (en) * | 1984-08-23 | 1989-03-08 | Btg International Limited | Software protection device |
US5007089A (en) * | 1990-04-09 | 1991-04-09 | International Business Machines Corporation | Secure key management using programable control vector checking |
US5291598A (en) * | 1992-04-07 | 1994-03-01 | Gregory Grundy | Method and system for decentralized manufacture of copy-controlled software |
US5754646A (en) * | 1995-07-19 | 1998-05-19 | Cable Television Laboratories, Inc. | Method for protecting publicly distributed software |
US6523119B2 (en) * | 1996-12-04 | 2003-02-18 | Rainbow Technologies, Inc. | Software protection device and method |
US6189099B1 (en) * | 1998-02-11 | 2001-02-13 | Durango Corporation | Notebook security system (NBS) |
US6216230B1 (en) * | 1998-02-11 | 2001-04-10 | Durango Corporation | Notebook security system (NBS) |
US6243692B1 (en) * | 1998-05-22 | 2001-06-05 | Preview Software | Secure electronic software packaging using setup-external unlocking module |
US6343280B2 (en) * | 1998-12-15 | 2002-01-29 | Jonathan Clark | Distributed execution software license server |
US7055040B2 (en) * | 1999-04-02 | 2006-05-30 | Hewlett-Packard Development Company, L.P. | Method and apparatus for uniquely and securely loading software to an individual computer |
US7032240B1 (en) * | 1999-12-07 | 2006-04-18 | Pace Anti-Piracy, Inc. | Portable authorization device for authorizing use of protected information and associated method |
US6832312B1 (en) * | 1999-12-22 | 2004-12-14 | Evga.Com | Process for automatically installing video display software upon detecting new video display controller |
DE19963471B4 (de) * | 1999-12-29 | 2008-10-09 | Robert Bosch Gmbh | Vorrichtung und Verfahren zur Verhinderung von Raubkopien von Computerprogrammen |
US6904528B1 (en) * | 2000-01-03 | 2005-06-07 | Ge Yokogawa Medical Systems, Limited | Illegitimate duplication preventing method, data processing apparatus and medical imaging apparatus |
US7200230B2 (en) * | 2000-04-06 | 2007-04-03 | Macrovision Corporation | System and method for controlling and enforcing access rights to encrypted media |
US6957199B1 (en) * | 2000-08-30 | 2005-10-18 | Douglas Fisher | Method, system and service for conducting authenticated business transactions |
US6857067B2 (en) * | 2000-09-01 | 2005-02-15 | Martin S. Edelman | System and method for preventing unauthorized access to electronic data |
US7134016B1 (en) * | 2000-11-14 | 2006-11-07 | Harris Scott C | Software system with a biometric dongle function |
DE10065684A1 (de) * | 2000-12-29 | 2002-07-18 | Aladdin Knowledge Systems Gmbh | System und Verfahren zum Erteilen der Laufberechtigung für ein auf einem Rechner installiertes Programm |
US20020174345A1 (en) * | 2001-05-17 | 2002-11-21 | Patel Pankaj B. | Remote authenticating biometric apparatus and method for networks and the like |
US7353281B2 (en) * | 2001-08-06 | 2008-04-01 | Micron Technology, Inc. | Method and system for providing access to computer resources |
DE60202568T8 (de) * | 2001-08-08 | 2005-10-20 | Matsushita Electric Industrial Co., Ltd., Kadoma | Urheberrechtschutzsystem, Aufzeichungsvorrichtung, und Wiedergabevorrichtung |
US20030046189A1 (en) * | 2001-09-05 | 2003-03-06 | Takao Asayama | System and method for a server to enable and disable client computer features |
JP2003085321A (ja) * | 2001-09-11 | 2003-03-20 | Sony Corp | コンテンツ利用権限管理システム、コンテンツ利用権限管理方法、および情報処理装置、並びにコンピュータ・プログラム |
US7231526B2 (en) * | 2001-10-26 | 2007-06-12 | Authenex, Inc. | System and method for validating a network session |
JP3963385B2 (ja) * | 2001-10-30 | 2007-08-22 | インターナショナル・ビジネス・マシーンズ・コーポレーション | ディジタル・エンコードされた製品の使用を制御する方法およびシステム |
GB2384066A (en) * | 2002-01-09 | 2003-07-16 | Hewlett Packard Co | Installation of software components having multiple implementations |
US7299364B2 (en) * | 2002-04-09 | 2007-11-20 | The Regents Of The University Of Michigan | Method and system to maintain application data secure and authentication token for use therein |
US7209559B2 (en) * | 2002-04-29 | 2007-04-24 | The Boeing Company | Method and apparatus for securely distributing large digital video/data files with optimum security |
JP3754004B2 (ja) * | 2002-05-20 | 2006-03-08 | システムニーズ株式会社 | データ更新方法 |
US7454784B2 (en) * | 2002-07-09 | 2008-11-18 | Harvinder Sahota | System and method for identity verification |
US7191344B2 (en) * | 2002-08-08 | 2007-03-13 | Authenex, Inc. | Method and system for controlling access to data stored on a data storage device |
US7181016B2 (en) * | 2003-01-27 | 2007-02-20 | Microsoft Corporation | Deriving a symmetric key from an asymmetric key for file encryption or decryption |
US7380125B2 (en) * | 2003-05-22 | 2008-05-27 | International Business Machines Corporation | Smart card data transaction system and methods for providing high levels of storage and transmission security |
JP4253543B2 (ja) * | 2003-07-29 | 2009-04-15 | 矢崎総業株式会社 | ハードウェアプロテクトキー及びその再発行方法 |
US7185204B2 (en) * | 2003-08-28 | 2007-02-27 | International Business Machines Corporation | Method and system for privacy in public networks |
CN101421968B (zh) * | 2003-12-23 | 2011-01-26 | 万朝维亚有限公司 | 用于连网计算机应用的鉴权系统 |
TWI324875B (en) * | 2003-12-31 | 2010-05-11 | Green Packet Berhad | Method of managing digital rights and a computer |
US7711951B2 (en) * | 2004-01-08 | 2010-05-04 | International Business Machines Corporation | Method and system for establishing a trust framework based on smart key devices |
US7512800B2 (en) * | 2004-02-03 | 2009-03-31 | Hewlett-Packard Development Company, L.P. | Key management technique for establishing a secure channel |
US20050235363A1 (en) * | 2004-04-06 | 2005-10-20 | Fortress Technologies, Inc. | Network, device, and/or user authentication in a secure communication network |
US7434252B2 (en) * | 2004-07-14 | 2008-10-07 | Microsoft Corporation | Role-based authorization of network services using diversified security tokens |
JP4639676B2 (ja) * | 2004-07-21 | 2011-02-23 | 株式会社日立製作所 | レンタルサーバシステム |
US20060137016A1 (en) * | 2004-12-20 | 2006-06-22 | Dany Margalit | Method for blocking unauthorized use of a software application |
US20080215468A1 (en) * | 2005-01-06 | 2008-09-04 | Double Trump International Inc. | Software Licensing Method And System |
US7712131B1 (en) * | 2005-02-09 | 2010-05-04 | David Lethe | Method and apparatus for storage and use of diagnostic software using removeable secure solid-state memory |
JP4662802B2 (ja) * | 2005-03-30 | 2011-03-30 | 富士通株式会社 | 計算方法、計算装置及びコンピュータプログラム |
JP2006333095A (ja) * | 2005-05-26 | 2006-12-07 | Hiromi Fukaya | 暗号通信方法、暗号通信システム、暗号通信装置及び暗号通信プログラム |
US7900246B1 (en) * | 2005-05-31 | 2011-03-01 | Adobe Systems Incorporated | Software deactivation based on a deactivation time period |
US20070061893A1 (en) * | 2005-09-09 | 2007-03-15 | Black Jeffery D | Methods and devices for copy protection of software |
US8051299B2 (en) * | 2006-03-20 | 2011-11-01 | Hewlett-Packard Development Company, L.P. | Computer security method and computer system |
US7822209B2 (en) * | 2006-06-06 | 2010-10-26 | Red Hat, Inc. | Methods and systems for key recovery for a token |
US20080092239A1 (en) * | 2006-10-11 | 2008-04-17 | David H. Sitrick | Method and system for secure distribution of selected content to be protected |
US20080126810A1 (en) * | 2006-11-06 | 2008-05-29 | Li-Kuo Chiu | Data protection method for optical storage media/device |
-
2006
- 2006-09-20 CN CN200610113237.6A patent/CN100555939C/zh active Active
-
2007
- 2007-09-14 US US11/855,643 patent/US8321924B2/en active Active
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102420800A (zh) * | 2010-09-28 | 2012-04-18 | 俞浩波 | 通过多因子身份认证完成服务的方法、系统及认证终端 |
CN102420800B (zh) * | 2010-09-28 | 2016-12-14 | 俞浩波 | 通过多因子身份认证完成服务的方法、系统及认证终端 |
Also Published As
Publication number | Publication date |
---|---|
US8321924B2 (en) | 2012-11-27 |
US20080072297A1 (en) | 2008-03-20 |
CN100555939C (zh) | 2009-10-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1929381A (zh) | 一种基于网络的软件保护方法 | |
US10530582B2 (en) | Method and device for information system access authentication | |
CN101005361B (zh) | 一种服务器端软件保护方法及系统 | |
US10491587B2 (en) | Method and device for information system access authentication | |
CN103995991B (zh) | 一种软件版权保护中绑定硬件信息与密钥的方法 | |
CN1946022A (zh) | 转接第三方登陆的方法、系统及第三方网站、业务服务器 | |
CN101075875A (zh) | 在门户/系统之间实现单点登录的方法及其系统 | |
CN1855814A (zh) | 一种安全的统一身份认证方案 | |
CN1505309A (zh) | 安全地处理被用于基于web的资源访问的客户证书 | |
CN101051904A (zh) | 一种保护网络应用程序使用账号密码进行登录的方法 | |
CN1703004A (zh) | 一种实现网络接入认证的方法 | |
CN1897523A (zh) | 一种实现单点登录的系统及方法 | |
CN101056196A (zh) | 安全登录方法、客户端及其服务器 | |
CN101039186A (zh) | 系统日志的安全审计方法 | |
CN1956449A (zh) | 数据资源防复制加密传输方法及设备系统 | |
CN101047504A (zh) | 一种网站登录认证方法及认证系统 | |
CN101075866A (zh) | 一种互联网信息的上报方法和系统 | |
CN109040079A (zh) | 直播链接地址的组建和验证方法及相应装置 | |
CN1268157C (zh) | 一种用于动态身份认证的手机 | |
Wang et al. | Cracking IoT device user account via brute-force attack to SMS authentication code | |
CN101582896A (zh) | 第三方网络认证系统及其认证方法 | |
CN1851604A (zh) | 一种数字版权保护系统及方法 | |
CN101047505A (zh) | 一种网络应用push业务中建立安全连接的方法及系统 | |
CN1588846A (zh) | 一种网络中动态加密装置及其口令认证方法 | |
CN1744523A (zh) | 一种面向移动代理网管的安全保护方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C56 | Change in the name or address of the patentee |
Owner name: FEITIAN TECHNOLOGIES CO., LTD. Free format text: FORMER NAME: BEIJING FEITIAN CHENGXIN TECHNOLOGY CO., LTD. |
|
CP03 | Change of name, title or address |
Address after: 100085 Beijing city Haidian District Xueqing Road No. 9 Ebizal building B block 17 layer Patentee after: Feitian Technologies Co.,Ltd. Address before: 100083, Haidian District, Xueyuan Road, No. 40 research, 7 floor, 5 floor, Beijing Patentee before: FEITIAN TECHNOLOGIES Co.,Ltd. |
|
CP03 | Change of name, title or address |
Address after: 17th floor, building B, Huizhi building, No.9, Xueqing Road, Haidian District, Beijing 100085 Patentee after: Feitian Technologies Co.,Ltd. Country or region after: China Address before: 100085 17th floor, block B, Huizhi building, No.9 Xueqing Road, Haidian District, Beijing Patentee before: Feitian Technologies Co.,Ltd. Country or region before: China |
|
CP03 | Change of name, title or address |