Software protection method and system

A software and protected technology, applied in software testing/debugging, program/content distribution protection, instruments, etc., can solve problems such as passiveness, inability to ensure that software ownership is not infringed, and the cost of rights protection rising.

Active Publication Date: 2018-12-25
BEIJING SENSESHIELD TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. Increase the development cost of software developers, and need to have special personnel to handle the corresponding work, so the overall cost of rights protection has increased;
[0006] 2. Since the above-mentioned security-related processing methods have little to do with the logic of the software itself, ordinary software developers are usually not good at it, and cannot handle it well enough to achieve the expected effect of ensuring that software ownership is not infringed;
[0007] 3. Whenever piracy is encountered, the software version needs to be re-released, and it is relatively passive to deal with this problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software protection method and system
  • Software protection method and system
  • Software protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Such as figure 1 Shown is a software protection method according to an embodiment of the present invention, the method mainly uses a security component bound to the protected software to protect the protected software, wherein the security component can be an anti-hacking engine, for example, and the protected software The binding of software and security components can be understood as binding the functions of the two, so that when the user uses the protected software, the security component must be run at the same time, and it can also be understood that the protected software uses the security component as the "interface" for communication with the outside world , making it impossible for pirates to separate the security component from the protected software without affecting the function of the protected software. This protection method includes:

[0052] S1. During the operation of the protected software, the security component detects each software according to t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a software protecting method and system. According to the method, software to be protected is protected by adopting a security component bound with the software to be protected. The method comprises the steps that when the software to be protected is operated, the security component detects all pieces of software according to preset pirate patch features and / or cracking analysis tool features in a security database; if the security component detects that at least one piece of software comprises the pirate patch features and / or cracking analysis tool features, the security component adopts preset measures on the software to be protected. According to the protecting method, the software to be monitored is protected by adopting the security component bound with the software to be monitored.

Description

technical field [0001] The present application relates to software protection, in particular to a software protection method and system. Background technique [0002] After software developers release their software, they are often troubled by piracy. Piracy (also known as "copying") refers to the act of duplicating and redistributing works and publications without the consent of the owner, as well as the infringing products made by such acts. Although in many countries and regions, this behavior of pirates is defined as an illegal act of infringement of intellectual property rights, or even a criminal act, and will be punished by the country where it is located. [0003] In the field of software, so-called pirated software is usually processed by pirates, such as adding additional files as pirated patches, so that consumers can use the functions of the software without the relevant verification of the software owner. Usually, pirated software cannot Provide legal right ce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12G06F11/36
CPCG06F11/3668G06F21/121
Inventor 孙吉平张伟双
Owner BEIJING SENSESHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products