Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Piracy preventing method of system

A technology of anti-piracy and encryption algorithm, applied in the direction of instrument, program loading/starting, electronic digital data processing, etc., can solve the problem of limited anti-piracy function and high cost, and achieve good anti-piracy effect, low cost and small data volume Effect

Inactive Publication Date: 2010-02-10
XIAMEN STELCOM INFORMATION & TECH
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The invention provides a system anti-piracy method, which overcomes the disadvantages of high cost and limited anti-piracy functions in the anti-piracy method of the background technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Piracy preventing method of system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Please check figure 1 , which is a schematic flow chart of an anti-piracy method in a preferred embodiment of the present invention. The anti-piracy method, which includes:

[0027] Step S100, the step of making a fingerprint, which is executed when installing the software. Generally, the software is installed by a designated user, such as installed by an operator. The step of making a fingerprint includes:

[0028] Step S110, read the feature code MAC of the hardware device from the MAC address of the network card, the MAC is inserted when the hardware device leaves the factory, and has unchangeable and unique characteristics;

[0029] Step S121, using the feature code MAC as the plaintext of the encryption algorithm, and the encryption algorithm calculates a calculation data;

[0030] Step S122, compressing the calculation data to obtain and save the cryptographic fingerprint, the cryptographic fingerprint data can be compressed into a single byte;

[0031] Step S1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a piracy preventing method of a system, comprising a step S100 of a fingerprint manufacturing step which is executed when software is installed, and a step S200 of a fingerprint verification step which is executed when the software is executed. The fingerprint manufacturing step comprises a step S110 of reading a feature code MAC built-in by hardware equipment and a step S120 of calculating a storage password fingerprint according to the feature code MAC of the hardware equipment and storing the storage password fingerprint on the hardware equipment. The fingerprint verification step comprises a step S210 of reading the feature code MAC built-in by the hardware equipment and the storage password fingerprint, a step S220 of calculating a verification password fingerprint according to the feature code MAC of the hardware equipment, and a step S230 of judging whether the verification password fingerprint and the storage password fingerprint are equal or not, wherein, the calculation method is the same as that in the fingerprint manufacturing step; if the verification password fingerprint and the storage password fingerprint are equal, the software is continuously executed; and if the verification password fingerprint and the storage password fingerprint are not equal, the software is stopped executing. Because the piracy preventing method judges whether a rights exists or not before the software is executed, a condition that the software is embezzled after the software is copied is effectively avoided, and the piracy preventing function is powerful.

Description

Technical field [0001] The invention relates to a system anti-piracy method. Background technique [0002] At present, embedded software is usually installed on a common storage device, such as a flash disk. Because this type of storage device is versatile, and embedded hardware systems are becoming more and more common, such as systems using X86 and ARM, it will cause the content stored in the storage device to be directly copied to another same storage device. And applied to other hardware systems. In order to prevent the system from being pirated, many solutions have been proposed, mainly including the following two. [0003] The first is to use the network confirmation method. When installing the software, you need to obtain the registration number through the network, and you can only register after obtaining the registration number. This method has the following deficiencies: 1. Because the existing anti-piracy method only judges whether it is authorized to install ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/22G06F9/445G06F21/12
Inventor 李巧霞
Owner XIAMEN STELCOM INFORMATION & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products