[go: up one dir, main page]

CN102915413A - Intelligent protection method of computer software - Google Patents

Intelligent protection method of computer software Download PDF

Info

Publication number
CN102915413A
CN102915413A CN 201210358158 CN201210358158A CN102915413A CN 102915413 A CN102915413 A CN 102915413A CN 201210358158 CN201210358158 CN 201210358158 CN 201210358158 A CN201210358158 A CN 201210358158A CN 102915413 A CN102915413 A CN 102915413A
Authority
CN
China
Prior art keywords
pattern data
intelligent
fingerprint
computer
fingerprint pattern
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 201210358158
Other languages
Chinese (zh)
Inventor
张飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NINGXIA XINHANG INFORMATION TECHNOLOGY Co Ltd
Original Assignee
NINGXIA XINHANG INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NINGXIA XINHANG INFORMATION TECHNOLOGY Co Ltd filed Critical NINGXIA XINHANG INFORMATION TECHNOLOGY Co Ltd
Priority to CN 201210358158 priority Critical patent/CN102915413A/en
Publication of CN102915413A publication Critical patent/CN102915413A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention aims to provide an intelligent protection method of computer software. The method includes: detecting whether a computer owner uses a computer or not in such way that client computer software transmits fingerprint pattern data encrypted by an intelligent fingerprint encryption device to compare with fingerprint pattern data of a server computer, so that protected software is used to run only by the computer owner, the software in the computer is only accessible by the owner, and safety of the client software is improved.

Description

The intelligent protection method of computer software
Technical field
The invention belongs to software development and resist technology field, relate to the intelligent protection method of computer software.
Background technology
In Information technology day by day flourishing today; more and more comprising data message moves in computing machine with the software that relates to individual privacy and secret of the trade; and the software that moves in the computing machine is easily by artificial illegally distorting or bootlegging; bring huge loss to software users, this has become the problem of the sternness that protecting computer software faces.Existing guard method is to use relevant antivirus software that it is scanned detection mostly, and according to feature identification and the removing virus of known viruse, but there is obvious defective in above-mentioned guard method, is difficult to implement in full because of the variation of system environments.The general considerations of software protection is to prevent that software is tampered, and except the distorting of virus, also has such as artificial distorting such as update routine codes, and all runs counter to copyright owner's wish and needs be stoped.
Summary of the invention
The intelligent protection method that the purpose of this invention is to provide computer software is in order to stop computer software to be tampered, a kind of effective guard method to be provided.
The technical solution adopted in the present invention is that the intelligent protection method of computer software is characterized in that described method comprises the following steps:
Step 1:A intelligent fingerprint device is connected in the Computer Service end, and B intelligent fingerprint device is connected in computer client;
Step 2: client computer starts the in house software of its installation, and the fingerprint pattern data of described software transmission after B intelligent fingerprint device is encrypted are to described computer server-side;
Step 3: the A intelligent fingerprint device of described computer server-side receives B fingerprint pattern data, and the B fingerprint pattern data of obtaining are decrypted, and obtains the B fingerprint pattern data of described computer client.
Step 4: the B fingerprint pattern data after the A intelligent fingerprint device analysis deciphering of Computer Service end, if the B fingerprint pattern data after the deciphering are identical symmetrical fingerprint pattern data with A fingerprint pattern data, then the A intelligent fingerprint device of Computer Service end sends a signal to B intelligent fingerprint device, then described client computer is in conjunction with B intelligent fingerprint device operation in house software, if the B fingerprint pattern data after the deciphering are not identical symmetrical fingerprint pattern data with A fingerprint pattern data, then the A intelligent fingerprint device of Computer Service end sends a signal to B intelligent fingerprint device, and described client computer software is automatically out of service.
Be provided with A fingerprint pattern data sequence in the described A intelligent fingerprint device, and B fingerprint pattern data can be encrypted and decipher, be provided with B fingerprint pattern data sequence in the described B intelligent fingerprint device, and the A finger print information can be encrypted and decipher.
Described client computer starts the in house software of its installation, and software sends is fingerprint pattern data after the deciphering of B intelligent fingerprint device.
Described A fingerprint pattern data sequence is identical symmetrical fingerprint pattern data sequence with B fingerprint pattern data sequence.
Computer software intelligent protection method provided by the present invention; realized client computer software detects by the fingerprint pattern data that send the fingerprint pattern geodata and services end computing machine after the intelligent fingerprint encryption device is encrypted are consistent whether computing machine is in practicality; so that the software of protecting can only in the situation that computing machine use and to move; not that I then can not use the software in this computing machine, the security that has improved client software.
Description of drawings
The process flow diagram of Fig. 1 computer software intelligent protection provided by the invention method.
The process flow diagram of the computer software intelligent protection method that Fig. 2 embodiment of the invention one provides.
Embodiment
Below in conjunction with accompanying drawing, preferential embodiment is elaborated.Should be noted that following explanation only is exemplary, rather than in order to limit the scope of the invention and to use.
Embodiment one
Computer software intelligent protection method, wherein, running software is in client computer, and client computer and service end computing machine all are connected with the intelligent fingerprint device, transmit the fingerprint pattern data by the intelligent fingerprint device, and as shown in Figure 1, concrete steps comprise:
Step 101:A intelligent fingerprint device is connected in the Computer Service end, and B intelligent fingerprint device is connected in computer client;
Wherein be provided with A fingerprint pattern data sequence in the A intelligent fingerprint device, and B fingerprint pattern data can be encrypted and decipher, be provided with B fingerprint pattern data sequence in the described B intelligent fingerprint device, and A fingerprint pattern data can be encrypted and decipher.A finger print information wherein is identical symmetrical fingerprint pattern data sequence with the B finger print information.
Step 102: client computer starts the in house software of its installation, and the fingerprint pattern data after the deciphering of described software transmission B intelligent fingerprint device are to described computer server-side;
Client computer wherein starts the in house software of its installation, and software sends is fingerprint pattern data after the deciphering of B intelligent fingerprint device.
Step 103: the B fingerprint pattern data that the A intelligent fingerprint device deciphering of described computer server-side receives, and analyze the B fingerprint pattern data of obtaining, obtain the finger print information of described computer client
Step 104: the B fingerprint pattern data after the A intelligent fingerprint device analysis deciphering of Computer Service end, if the B fingerprint pattern data after the deciphering are identical symmetrical fingerprint pattern data with A fingerprint pattern data, then the A intelligent fingerprint device of Computer Service end sends a signal to B intelligent fingerprint device, then execution in step 105, if if the B fingerprint pattern data after the deciphering are not identical symmetrical fingerprint pattern data with A fingerprint pattern data, then the A intelligent fingerprint device of Computer Service end sends a signal to B intelligent fingerprint device, execution in step 106.
Step 105: client computer is in conjunction with B intelligent fingerprint device operation in house software.
Step 106:B intelligent fingerprint device is unavailable, and client computer software can not move, and software is out of service.
Above-mentioned only is the implementation of the present embodiment, not as the restriction to the present embodiment.

Claims (4)

1. computer software intelligent protection method is characterized in that, described method comprises the following steps:
Step 1:A intelligent fingerprint device is connected in the Computer Service end, and B intelligent fingerprint device is connected in computer client;
Step 2: client computer starts the in house software of its installation, and the fingerprint pattern data after the deciphering of described software transmission B intelligent fingerprint device are to described computer server-side;
Step 3: the A intelligent fingerprint device of described computer server-side receives B fingerprint pattern data, to the B fingerprint pattern data analysis that obtains, obtains the B fingerprint pattern data of described computer client.
Step 4: the B fingerprint pattern data after the A intelligent fingerprint device analysis deciphering of Computer Service end, if the B fingerprint pattern data after the deciphering are identical symmetrical fingerprint pattern data with A fingerprint pattern data, then the A intelligent fingerprint device of Computer Service end sends a signal to B intelligent fingerprint device, then described client computer software can use under non-other people security context, if if the B fingerprint pattern data after the deciphering are not identical symmetrical fingerprint pattern data with A fingerprint pattern data, then the A intelligent fingerprint device of Computer Service end sends a signal to B intelligent fingerprint device, and described client computer software is automatically out of service.
2. according to claims 1 described computer software intelligent protection method; it is characterized in that being provided with A fingerprint pattern data sequence in the described A intelligent fingerprint device; and B fingerprint pattern data can be encrypted and decipher; be provided with B fingerprint pattern data sequence in the described B intelligent fingerprint device, and the A finger print information can be encrypted and decipher.
3. according to claims 1 described computer software intelligent protection method, it is characterized in that described client computer starts the in house software of its installation, software sends is fingerprint pattern data after the deciphering of B intelligent fingerprint device.
4. according to claims 1 described computer software intelligent protection method, it is characterized in that described A fingerprint pattern data sequence and B fingerprint pattern data sequence are identical symmetrical fingerprint pattern data sequences.
CN 201210358158 2012-09-25 2012-09-25 Intelligent protection method of computer software Pending CN102915413A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201210358158 CN102915413A (en) 2012-09-25 2012-09-25 Intelligent protection method of computer software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201210358158 CN102915413A (en) 2012-09-25 2012-09-25 Intelligent protection method of computer software

Publications (1)

Publication Number Publication Date
CN102915413A true CN102915413A (en) 2013-02-06

Family

ID=47613776

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201210358158 Pending CN102915413A (en) 2012-09-25 2012-09-25 Intelligent protection method of computer software

Country Status (1)

Country Link
CN (1) CN102915413A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113254904A (en) * 2021-07-06 2021-08-13 浙江宇视科技有限公司 Intelligent processing method, device, equipment and medium for multi-dimensional information acquisition and identification

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113254904A (en) * 2021-07-06 2021-08-13 浙江宇视科技有限公司 Intelligent processing method, device, equipment and medium for multi-dimensional information acquisition and identification
CN113254904B (en) * 2021-07-06 2021-10-22 浙江宇视科技有限公司 Intelligent processing method, device, equipment and medium for multi-dimensional information acquisition and identification

Similar Documents

Publication Publication Date Title
CN102136048B (en) Mobile phone Bluetooth-based ambient intelligent computer protection device and method
CN105099705B (en) A secure communication method and system based on USB protocol
CN101008972A (en) Security control methods for date transmission process of software protection device and device thereof
CN112597462A (en) Industrial network safety system
CN104778423B (en) The webpage integrity assurance of watermark contrast based on file driving
CN107169368A (en) A kind of computer system ensured information security
CN114095228A (en) IoT data security access method, system, device and storage medium based on blockchain and edge computing
CN109033784A (en) Identity identifying method and device in a communication network
CN108388812A (en) A kind of webpage tamper detection method
Nehra et al. A robust approach to prevent software piracy
CN103226676A (en) Mixed method for measuring creditability of application software
CN102915413A (en) Intelligent protection method of computer software
CN107666420B (en) Method for production control and identity authentication of intelligent home gateway
CN101807276B (en) Security management and supervision system of traffic management software and application method thereof
CN101136048A (en) Software identification method
CN104579684A (en) SM2 checking algorithm suitable for data of power distribution network
CN106778102B (en) Android system-based application program encryption method and device
CN2886687Y (en) Software protection device with data transmission process security control
KR102211846B1 (en) Ransomware detection system and operating method thereof
CN102737189B (en) Control method for enhancing using security of cryptographic machine by adopting dual-factor mandatory certification technology
CN104091099A (en) Program encryption transmission method and system for single chip microcomputer
CN209785060U (en) Internet of things safety payment platform
CN205029678U (en) Secure communication system based on USB agreement
CN108229111A (en) A kind of method of intelligent protection computer software
CN105303081A (en) Method and system of host for identifying ID of USB (Universal Serial Bus) main control chip reliably

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130206