[go: up one dir, main page]

CN1448842A - Software copyright protecting method based on network database - Google Patents

Software copyright protecting method based on network database Download PDF

Info

Publication number
CN1448842A
CN1448842A CN 02113550 CN02113550A CN1448842A CN 1448842 A CN1448842 A CN 1448842A CN 02113550 CN02113550 CN 02113550 CN 02113550 A CN02113550 A CN 02113550A CN 1448842 A CN1448842 A CN 1448842A
Authority
CN
China
Prior art keywords
software
database
communicated
numbering
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 02113550
Other languages
Chinese (zh)
Inventor
任东海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 02113550 priority Critical patent/CN1448842A/en
Publication of CN1448842A publication Critical patent/CN1448842A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to the computer software copyright protection and is especially software copyright protecting method based on network data base to confirm software uniqueness. The basic principle of the present invention is that network data base is utilized to record the use time of one software, and in case that there are over one set of software in the same number is run in the same time, there must be some illegal software version and the number will be set as illegal and the software will be inoperative.

Description

The software copyright protecting method of database Network Based
The present invention relates to the computer software method for preventing piracy, particularly a kind of software copyright protecting method of database identification software uniqueness Network Based.
Computer software is carried out encryption, to prevent carrying out illegal copies, is the effective ways of protection software copyright.At present, software cryptography mainly contains following method: floppy disk encryption method, plug-in card enciphered method, dongle enciphered method, password encryption method and hidden code method.What generally use now is the password encryption method, numbers sn by user's Input Software when the steps include: the software installation, by the enciphered data q in the algorithm F comparison software, if coincide then successful installation.Yet this method has a deadly defect, and no matter algorithm F designs how complicatedly, as long as pirate user obtains a legal sn, just can install and use a cover software normally.
The purpose of this invention is to provide a kind of Cipher Strength height, cost is low, can guarantee the encryption method of a cover software uniqueness.
Basic principle of the present invention is the service time of utilizing network data base record one cover software, if same software numbering sn has the above software of a cover to move simultaneously, the software that this software numbering is described has piracy, then this numbering is changed to illegally, and after this this cover software can't use.
The solution of the present invention realizes according to the following steps:
Every part of software all left a record in the database of software company before selling, wherein should comprise software numbering sn at least, used concluding time t, copyright marking r.
After software is installed beginning, user's Input Software numbering sn.
Software is formal use after, each startup will check all whether network is communicated with, if be communicated with then be that index is obtained from software company's database and used concluding time t last time, copyright marking r with sn.If copyright marking is illegal, the termination routine operation is also notified the user, if copyright marking is legal, then preserves t with a variable tn1.
And each running software will check also whether network is communicated with when finishing, if be communicated with then obtain current system time tn2, and from database, obtain once more and used concluding time t last time, if t=tn1 from software company's server, tn2 is write t in the database, normally withdraw from; If etc., copyright marking r is not changed to illegally.
Its effect is as shown in Figure 1: A, B are for using the two cover softwares of identical sn, two use periods that bracket is A, B.Drawn among figure A, B uses 4 kinds of situations that the period overlaps.Use above-mentioned algorithm computation as can be known, which kind of situation no matter, always the cover software that finishes of back is changed to r illegally.
(the best form encapsulation of above operation with control or class.)
As improvement of the present invention, the control that encapsulates this method for preventing piracy can also adopt following method to confirm self existence and legitimacy, is destroyed or changes to prevent control itself.
The publicly-owned function of one checking self existence and legitimacy is set in the control.In other any one processes of software, call this function,, illustrate that control itself is illegal, stop running if rreturn value return is illegal.
As improvement of the present invention, if the checking function finds that when the existence of confirming self and legitimacy tn1 is empty, network was not communicated with when software startup was described, should attempt to carry out the operation when starting this moment once more.
More than two improved process flow diagrams such as Fig. 2.
As improvement of the present invention, the sn that is used for Network Transmission should be through the encryption of encryption algorithm F.Simultaneously, the sn that preserves in software company's database also is the process encryption.

Claims (4)

1, a kind of computer anti-theft version method of database Network Based; it is characterized in that: utilize network data base to write down the service time of next cover software; if same software numbering sn has the above software of a cover to move simultaneously; the software that this software numbering representative is described has piracy; then this numbering is changed to illegally; after this this cover software can't use, and realize anti-piracy protection to software with this, and described software copyright confirms that process is as follows:
Every part of software all left a record in the database of software company before selling, wherein should comprise software numbering sn at least, used concluding time t, copyright marking r.
After software is installed beginning, user's Input Software numbering sn.
Software is formal use after, each startup will check all whether network is communicated with, if be communicated with then be that index is obtained from software company's database and used concluding time t last time, copyright marking r with sn.If copyright marking is illegal, the termination routine operation is also notified the user, if copyright marking is legal, then preserves t with variable tn1.
When finishing, each running software to check also whether network is communicated with, if be communicated with then obtain current system time tn2, and from database, obtain once more and used concluding time t last time, if t=tn1 from software company's server, tn2 is write t in the database, normally withdraw from; If etc., copyright marking r is not changed to illegally.
(the best form encapsulation of above operation with control or class.)
2, method according to claim 1 is characterized in that: the control that encapsulates this method for preventing piracy adopts following method to confirm self existence and legitimacy, is destroyed or changes to prevent control itself.
The publicly-owned function of one checking self existence and legitimacy is set in the control.In other any one processes of software, call this function,, illustrate that control itself is illegal, stop running if rreturn value is illegal.
3, as method as described in claim 1 and 2, it is characterized in that: if the checking function is found tn1 for empty in the existence of confirming self during with legitimacy, network was not communicated with when software startup be described, the operation in the time of should attempting once more at this moment to carry out startup.
4, as method as described in the claim 1,2 and 3, it is characterized in that: the sn that is used for Network Transmission should be through the encryption of encryption algorithm F.Simultaneously, the sn that preserves in software company's database also is the process encryption.
CN 02113550 2002-03-31 2002-03-31 Software copyright protecting method based on network database Pending CN1448842A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 02113550 CN1448842A (en) 2002-03-31 2002-03-31 Software copyright protecting method based on network database

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 02113550 CN1448842A (en) 2002-03-31 2002-03-31 Software copyright protecting method based on network database

Publications (1)

Publication Number Publication Date
CN1448842A true CN1448842A (en) 2003-10-15

Family

ID=28680580

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 02113550 Pending CN1448842A (en) 2002-03-31 2002-03-31 Software copyright protecting method based on network database

Country Status (1)

Country Link
CN (1) CN1448842A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1315017C (en) * 2004-12-20 2007-05-09 四川大学 A method of software copyright protection
CN1322387C (en) * 2004-03-31 2007-06-20 佳能株式会社 Method for firming legitimate of software and device for executing software
CN100380273C (en) * 2004-06-21 2008-04-09 佳能株式会社 Image forming apparatus, license managing method for applications program
CN100437616C (en) * 2006-04-27 2008-11-26 张文 Software anti-pirate device 8 h
CN100461064C (en) * 2004-04-30 2009-02-11 微软公司 Method and system for limiting software updates

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1322387C (en) * 2004-03-31 2007-06-20 佳能株式会社 Method for firming legitimate of software and device for executing software
CN100461064C (en) * 2004-04-30 2009-02-11 微软公司 Method and system for limiting software updates
CN100380273C (en) * 2004-06-21 2008-04-09 佳能株式会社 Image forming apparatus, license managing method for applications program
CN1315017C (en) * 2004-12-20 2007-05-09 四川大学 A method of software copyright protection
CN100437616C (en) * 2006-04-27 2008-11-26 张文 Software anti-pirate device 8 h

Similar Documents

Publication Publication Date Title
US9298893B2 (en) Activation code system and method for preventing software piracy
US11704389B2 (en) Controlling access to digital assets
US6226747B1 (en) Method for preventing software piracy during installation from a read only storage medium
US6134659A (en) Controlled usage software
US6070171A (en) Method and system for copy-tracking distributed software featuring tokens containing a key field and a usage field
AU767286B2 (en) Methods and apparatus for protecting information
CN100473087C (en) System and method for licensing applications on wireless devices over a wireless network
US20010034712A1 (en) System and method for monitoring software
US20040117664A1 (en) Apparatus for establishing a connectivity platform for digital rights management
US20040117644A1 (en) Method for reducing unauthorized use of software/digital content including self-activating/self-authenticating software/digital content
US20040225894A1 (en) Hardware based method for digital rights management including self activating/self authentication software
US20040117628A1 (en) Computer readable storage medium for enhancing license compliance of software/digital content including self-activating/self-authenticating software/digital content
US20040117631A1 (en) Method for digital rights management including user/publisher connectivity interface
CN1910845A (en) Method of allocating optimal payload space
CN100452908C (en) System and method for preventing software and hardware with communication condition / function from being embezzled
CN101183468A (en) Terminal login system and method
CN1448842A (en) Software copyright protecting method based on network database
CN1398401A (en) Computer-readable medium with microprocessor to control reading and computer arranged to communicate with such method
CN102708310A (en) Registration code anti-piracy encryption method for computer software in batch production
WO2006101765A2 (en) Method for preventing unauthorized installation of a software product
CN1369809A (en) Anti-piracy encryption method for register code of computer software
CN116167020A (en) Software authorization method and system
WO1998053384A1 (en) Method and apparatus for activating programs/features in a computer
US7711957B2 (en) Granting access to a computer-based object
US20090031430A1 (en) Software activation control method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication