Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software protection method based on virtual machine

A technology of software protection and virtual machine, applied in the direction of platform integrity maintenance, computer security devices, program control design, etc., can solve the problems of weak storage and computing capabilities of secure smart card chips, running complex algorithms, poor user experience, etc., to achieve strong Anti-illegal tampering function, anti-use, anti-piracy effects

Inactive Publication Date: 2008-06-18
北京赛柏科技有限责任公司
View PDF0 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, for software distributed in large quantities, the cost of distribution will increase significantly, and, due to the existence of software locks, the online distribution of software is limited
In addition, compared with the current computers, the storage and computing capabilities of the security smart card chip in the software lock are very weak, which also causes the defects of low overall performance of the software and poor user experience, and cannot be implemented in the software lock. run complex algorithms
And if a simple algorithm is used for the hidden components in the software lock, it will make it easy for the attacker to guess the function of the algorithm, which greatly reduces the security of the software

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software protection method based on virtual machine
  • Software protection method based on virtual machine
  • Software protection method based on virtual machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be further described below in conjunction with the accompanying drawings.

[0040] As shown in FIG. 1 , the software developer can divide the software through the following steps A to H, so that the software can be effectively protected.

[0041] A. Define a high-level programming language HCPL for writing hidden components. High-level programming language HCPL is a writing language defined by software developers themselves. This HCPL can adopt the grammatical rules in existing programming languages, such as the grammatical rules similar to JAVA language. Of course, HCPL can also be completely composed of Software developers specify a new set of grammatical rules different from existing programming languages.

[0042] B. Define a virtual machine specification, which includes a non-public virtual machine-specific instruction set and a virtual machine file format.

[0043] C. A compiler that implements high-level programming language HCPL to a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for protecting software based on a virtual computer, which comprises the steps that: a high level programming language applied to compiling hidden components is defined; virtual computer specification is defined; a compiler of exclusive instruction set from the high level programming language to the virtual computer is realized; the virtual computer taking an interpreter as an execution engine is realized; the software is divided into open components and hidden components; the open components are added with a module to get the hardware ID information of the computer of users; source code of the virtual computer and the open components obtained in the steps are compiled into executable files; the hidden components are again realized through the high level programming language and complied into the code of the virtual computer as independent hidden component files. The invention has high performance of safe operation environment and little response delay between open and hidden components and greatly improves the experience of users. The invention provides a method for preventing software piracy effectively for software developers, which realizes on-line software issuing and decreases the cost of software greatly.

Description

technical field [0001] The present invention relates to a software protection method, in particular to a method for protecting the software by dividing the software into public components and hidden components, and loading the hidden components into a virtual machine through certain compilation rules to run . Background technique [0002] Piracy has brought huge losses to the software industry. Taking 2004 as an example, the total value of illegally installed software in the world reached 31 billion US dollars a year. Due to software piracy, the R&D investment funds of software companies cannot be fully recovered, and the development of the entire software industry has become shrinking or deformed. Software piracy is a global problem, which seriously affects the healthy development of the entire software industry. It can be seen that the research on software protection technology has great practical significance. [0003] At present, the most effective measure to curb sof...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/22G06F9/45G06F21/53
Inventor 刘志成周伯生孙奎英
Owner 北京赛柏科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products