Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An anti-copy software protection and operation device and method

A software protection device and software protection technology, applied in the direction of program/content distribution protection, digital data authentication, etc., can solve the problems of data interception and cracking, flooding, etc., and achieve the effect of solving copyright protection and preventing wanton copying and dissemination

Active Publication Date: 2016-05-11
HANGZHOU SYNOCHIP DATA SECURITY TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. Although the PC software product is bound to the hardware with a unique serial number through USB communication, once the password is leaked, it can be used repeatedly by the borrower;
[0004] 2. The software is bound with a unique serial number, there is a risk of data being intercepted and cracked;
[0005] 3. PC software products can still be easily copied, and they can be easily cracked and spread in the following ways:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An anti-copy software protection and operation device and method
  • An anti-copy software protection and operation device and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] Embodiment 1: Application Model 1 (copyright protection):

[0067] Implementation principle:

[0068] 1. Use the software protection device 2 to generate the symmetric encrypted storage key KEY1. For the operation method, please refer to the first part of the working principle of the module "Working principle of the encrypted storage module 3";

[0069] 2. Use the software protection device 2 to generate a public / private key pair (PriKey / PubKey), and bind it to relevant data that needs to be protected by copyright, such as PC software, audio-visual products, etc. For details of the operation method, see the second part of the working principle of the module " The working principle of the software and hardware binding module 4";

[0070] 3. The software protection device 2 is connected to the PC and virtualized as an optical drive device;

[0071] 4. Convert the functional software and related data to be protected into an ISO image file, burn it in the software protect...

Embodiment 2

[0080] Example 2: Application Model 2 (multi-partition secure storage):

[0081] Implementation principle:

[0082] 1. Use the software protection device 2 to generate the symmetric encrypted storage key KEY1. For the operation method, please refer to the first part of the working principle of the module "Working principle of the encrypted storage module 3";

[0083] 2. Use the software protection device 2 to generate a public / private key pair (PriKey / PubKey), and bind the fingerprint encryption U disk management software. For the operation method, please refer to the second part of the working principle of the module "Working principle of software and hardware binding module 4" ;

[0084] 3. The software protection device 2 is connected to the PC to virtualize an optical drive device, an encrypted storage U disk device, and an ordinary device;

[0085] 4. Convert relevant functions and management software (anti-copy code, fingerprint encryption U disk management software, e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-copy software protecting and operating device and an anti-copy software protecting and operating method. The device comprises a software protecting device, wherein the software protecting device comprises a high-speed data throughput interface, a fingerprint sensor, a hitching interface for the sensor and a security chip, the security chip, a storage medium interface and a storage medium; the soft protecting device is connected with personal computer (PC) hardware through the high-speed data throughput interface; the fingerprint sensor is connected with the security chip through the hitching interface for the sensor and the security chip; the storage medium is connected with the security chip through the storage medium interface; and a fingerprint protection module, an encrypted storage module, an anti-copy module and a software hardware binding module are arranged. The device and the method have the following benefits: the problem about copyright protection of computer software products is effectively solved, so that arbitrary copying and propagation under the unauthorized condition are avoided; due to encrypted storage, the storage medium is prevented from being split and data information protected by copyright is prevented from being read; due to fingerprint identification, missing security protection is provided; and due to an asymmetrical secret key, software and hardware combined protection is performed.

Description

technical field [0001] The invention relates to the field of computer software products, more specifically, it relates to a copy-proof software protection and running device and method. Background technique [0002] Software developers are well aware of the importance of their own applications, but if they want to maximize the protection of product intellectual property rights and provide flexible and diverse licensing solutions for software users, they need a complex, flexible and easy-to-use licensing management system. Commonly used software dongles, the basic principle of encryption is: the developer’s program operates on the hardware dongle by calling the interface module of the hardware dongle, and the hardware dongle responds to the operation and returns the corresponding data to the developer’s application program through the interface module . The developer's application can judge the return value and take corresponding actions. If an invalid response is returned,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/10G06F21/32
Inventor 黄权孔凌志李昀
Owner HANGZHOU SYNOCHIP DATA SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products