Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software protecting method and system based on safety chip

A security chip and software protection technology, applied in computer security devices, program/content distribution protection, digital data processing components, etc., can solve problems such as software being cracked

Inactive Publication Date: 2009-06-24
LENOVO (BEIJING) CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (2) The method of binding computer hardware (hard disk or network card) or operating system configuration information, the problem is that when the hardware or operating system changes, the software needs to be re-bound, and can be replaced by replacing the hardware Where the software is installed
[0007] To sum up, there are some defects in the existing methods, especially in the face of decompilation and memory copy technology, theoretically speaking, the software protected by the above methods can be cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software protecting method and system based on safety chip
  • Software protecting method and system based on safety chip
  • Software protecting method and system based on safety chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings, wherein for the purpose of clarity, the description of the content known to those of ordinary skill in the art is omitted.

[0033] [The composition of the software encryption party]

[0034] figure 2 A schematic diagram illustrating a software protection system according to an embodiment of the present invention is shown, wherein a partial structure of a software encryption device of a software producer and a partial structure of a target host 400 of a software user are shown. also, image 3 A structural block diagram of the software encryption device 100 of the software manufacturer is shown.

[0035] Such as image 3 The shown software encryption device 100 includes: a determination part 130 , a compilation part 140 , a symmetric encryption engine 150 , a symmetric key generation part 110 and an asymmetric encryption engine 120 .

[0036] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention has publicized a method basing on the safe CMOS chip to protect software. The following steps are included: firstly, the cell needing to be protected will be confirmed from software at least, each of which contains several cells. Secondly, the cell above will be translated and edited into the aim files executable by the safe CMOS chip. Thirdly, the aim file will be encrypted by the symmetrical key corresponding to the every software to produce the cryptograph cell. And then a function to transfer the safe CMOS chip will be set aim at the above files, and the cryptograph cell will be taken as the parameter of the function. The cells needing to be protected in software will be displaced by the function, and the cryptograph cell will be added to corresponding software. We can used this installation to avoid the software be deciphered and used illegally, and it is effective to the deciphered technology for the counter-translation and memory copy.

Description

technical field [0001] The present invention relates to the technical field of information security and trusted computing, in particular, the present invention relates to a software protection method capable of preventing cracking and a corresponding protection system. Background technique [0002] Software protection technology has always been a hot spot in the field of information security research. In today's Internet age, once the software is cracked or illegally copied in some way, it will bring huge losses to the software copyright owner. Therefore, various protection methods have been developed, among which the more common software protection methods are as follows: [0003] (1) A method of inputting a password or key during software installation, wherein if an incorrect password is entered, the installation process is terminated or only limited functions can be used. However, once the password is stolen or disclosed by the owner, the software can be installed at wi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F1/00G06F21/12
Inventor 郭轶尊尹萍宁晓魁林洋
Owner LENOVO (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products