Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software copyright protection and management method based on combined public key identity authentication technology

A technology of identification authentication and management method, which is applied in the field of software copyright protection management based on CPK identification authentication technology, and can solve the problems of insufficient processing capacity, limited running speed of protected software, weak communication part, etc.

Inactive Publication Date: 2015-09-09
成都腾甲数据服务有限公司
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The commonly used software copyright protection methods based on dongles are mainly implemented based on the query-response method. Although the software copyright protection can be realized in this method, there are the following problems: first, the dongle is limited by the size and Cost and other limitations, the processing power is far less than the computer where the protected software is located, thus limiting the running speed of the protected software; second, due to the openness of the operating system, the communication part between the protected software and the dongle is a weak In this link, pirates can obtain the communication data between the protected software and the dongle through the dongle’s API, driver, or even monitor the physical bus, analyze the protected data and functions inside the dongle, and then crack the data transplanted in the dongle. part of code in dog

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software copyright protection and management method based on combined public key identity authentication technology
  • Software copyright protection and management method based on combined public key identity authentication technology
  • Software copyright protection and management method based on combined public key identity authentication technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings in the embodiments.

[0027] refer to figure 1 As shown, a kind of software copyright protection management method based on CPK identification authentication technology that the present invention proposes, the steps that this method comprises are as follows:

[0028] 1) When the user needs to use the protected software, open the protected software; the protected software detects whether the CPK Key device is inserted, if not inserted, prompts an error message and waits for the user to insert the CPK Key device; if inserted, prompts the user to enter the CPK Key device password and log in to the protected software;

[0029] 2) The CPK Key device performs local verification on the startup password entered by the user. If the verification fails, an error message is pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a software copyright protection and management method based on a combined public key identity authentication technology. The method comprises: CPK Key equipment is inserted while protected software is started, and a starting password of the CPK Key equipment is input and the protected software is logged; the protected software verifies a user identifier and signature data in signature information from the CPK Key equipment, and the protected software verifies key data decoded and passed back by the CPY Key equipment after the signature information verification is passed; if the verification is passed, the protected software normally starts and operates; and when the protected software operates to a key protection point, an encrypted random number is sent to the CPK Key equipment, and the data returned by the CPY Key equipment is verified to determine whether to continuously operate the protected software. The introduced CPK Key equipment can solve the protected software copyright protection problem, and has a management function in the software use at the same time, so as to provide convenience and safety to a software user.

Description

technical field [0001] The invention relates to a software copyright protection method, in particular to a software copyright protection management method based on CPK identification authentication technology. Background technique [0002] With the development of computer technology and network information technology, software can be copied and used at will due to its digital characteristics. The problem of software copyright protection has always been an important problem that software developers need to face, and the use of dongles is one of the ways to realize software copyright protection. main means. A dongle is a hardware device connected to a computer interface (parallel port or serial port). Before the protected software is released, the software developer transplants part of the code corresponding to a certain thread in the software into the dongle, so that the protected software is During operation, the dongle connected to the computer must be invoked, and as a ha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/12
Inventor 陈谦孟俊邱银娟
Owner 成都腾甲数据服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products