CN1448842A - Software copyright protecting method based on network database - Google Patents
Software copyright protecting method based on network database Download PDFInfo
- Publication number
- CN1448842A CN1448842A CN 02113550 CN02113550A CN1448842A CN 1448842 A CN1448842 A CN 1448842A CN 02113550 CN02113550 CN 02113550 CN 02113550 A CN02113550 A CN 02113550A CN 1448842 A CN1448842 A CN 1448842A
- Authority
- CN
- China
- Prior art keywords
- software
- database
- communicated
- numbering
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 230000005540 biological transmission Effects 0.000 claims description 2
- 238000005538 encapsulation Methods 0.000 claims description 2
- 230000002498 deadly effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
Images
Landscapes
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to the computer software copyright protection and is especially software copyright protecting method based on network data base to confirm software uniqueness. The basic principle of the present invention is that network data base is utilized to record the use time of one software, and in case that there are over one set of software in the same number is run in the same time, there must be some illegal software version and the number will be set as illegal and the software will be inoperative.
Description
The present invention relates to the computer software method for preventing piracy, particularly a kind of software copyright protecting method of database identification software uniqueness Network Based.
Computer software is carried out encryption, to prevent carrying out illegal copies, is the effective ways of protection software copyright.At present, software cryptography mainly contains following method: floppy disk encryption method, plug-in card enciphered method, dongle enciphered method, password encryption method and hidden code method.What generally use now is the password encryption method, numbers sn by user's Input Software when the steps include: the software installation, by the enciphered data q in the algorithm F comparison software, if coincide then successful installation.Yet this method has a deadly defect, and no matter algorithm F designs how complicatedly, as long as pirate user obtains a legal sn, just can install and use a cover software normally.
The purpose of this invention is to provide a kind of Cipher Strength height, cost is low, can guarantee the encryption method of a cover software uniqueness.
Basic principle of the present invention is the service time of utilizing network data base record one cover software, if same software numbering sn has the above software of a cover to move simultaneously, the software that this software numbering is described has piracy, then this numbering is changed to illegally, and after this this cover software can't use.
The solution of the present invention realizes according to the following steps:
Every part of software all left a record in the database of software company before selling, wherein should comprise software numbering sn at least, used concluding time t, copyright marking r.
After software is installed beginning, user's Input Software numbering sn.
Software is formal use after, each startup will check all whether network is communicated with, if be communicated with then be that index is obtained from software company's database and used concluding time t last time, copyright marking r with sn.If copyright marking is illegal, the termination routine operation is also notified the user, if copyright marking is legal, then preserves t with a variable tn1.
And each running software will check also whether network is communicated with when finishing, if be communicated with then obtain current system time tn2, and from database, obtain once more and used concluding time t last time, if t=tn1 from software company's server, tn2 is write t in the database, normally withdraw from; If etc., copyright marking r is not changed to illegally.
Its effect is as shown in Figure 1: A, B are for using the two cover softwares of identical sn, two use periods that bracket is A, B.Drawn among figure A, B uses 4 kinds of situations that the period overlaps.Use above-mentioned algorithm computation as can be known, which kind of situation no matter, always the cover software that finishes of back is changed to r illegally.
(the best form encapsulation of above operation with control or class.)
As improvement of the present invention, the control that encapsulates this method for preventing piracy can also adopt following method to confirm self existence and legitimacy, is destroyed or changes to prevent control itself.
The publicly-owned function of one checking self existence and legitimacy is set in the control.In other any one processes of software, call this function,, illustrate that control itself is illegal, stop running if rreturn value return is illegal.
As improvement of the present invention, if the checking function finds that when the existence of confirming self and legitimacy tn1 is empty, network was not communicated with when software startup was described, should attempt to carry out the operation when starting this moment once more.
More than two improved process flow diagrams such as Fig. 2.
As improvement of the present invention, the sn that is used for Network Transmission should be through the encryption of encryption algorithm F.Simultaneously, the sn that preserves in software company's database also is the process encryption.
Claims (4)
1, a kind of computer anti-theft version method of database Network Based; it is characterized in that: utilize network data base to write down the service time of next cover software; if same software numbering sn has the above software of a cover to move simultaneously; the software that this software numbering representative is described has piracy; then this numbering is changed to illegally; after this this cover software can't use, and realize anti-piracy protection to software with this, and described software copyright confirms that process is as follows:
Every part of software all left a record in the database of software company before selling, wherein should comprise software numbering sn at least, used concluding time t, copyright marking r.
After software is installed beginning, user's Input Software numbering sn.
Software is formal use after, each startup will check all whether network is communicated with, if be communicated with then be that index is obtained from software company's database and used concluding time t last time, copyright marking r with sn.If copyright marking is illegal, the termination routine operation is also notified the user, if copyright marking is legal, then preserves t with variable tn1.
When finishing, each running software to check also whether network is communicated with, if be communicated with then obtain current system time tn2, and from database, obtain once more and used concluding time t last time, if t=tn1 from software company's server, tn2 is write t in the database, normally withdraw from; If etc., copyright marking r is not changed to illegally.
(the best form encapsulation of above operation with control or class.)
2, method according to claim 1 is characterized in that: the control that encapsulates this method for preventing piracy adopts following method to confirm self existence and legitimacy, is destroyed or changes to prevent control itself.
The publicly-owned function of one checking self existence and legitimacy is set in the control.In other any one processes of software, call this function,, illustrate that control itself is illegal, stop running if rreturn value is illegal.
3, as method as described in claim 1 and 2, it is characterized in that: if the checking function is found tn1 for empty in the existence of confirming self during with legitimacy, network was not communicated with when software startup be described, the operation in the time of should attempting once more at this moment to carry out startup.
4, as method as described in the claim 1,2 and 3, it is characterized in that: the sn that is used for Network Transmission should be through the encryption of encryption algorithm F.Simultaneously, the sn that preserves in software company's database also is the process encryption.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 02113550 CN1448842A (en) | 2002-03-31 | 2002-03-31 | Software copyright protecting method based on network database |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 02113550 CN1448842A (en) | 2002-03-31 | 2002-03-31 | Software copyright protecting method based on network database |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1448842A true CN1448842A (en) | 2003-10-15 |
Family
ID=28680580
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 02113550 Pending CN1448842A (en) | 2002-03-31 | 2002-03-31 | Software copyright protecting method based on network database |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1448842A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1315017C (en) * | 2004-12-20 | 2007-05-09 | 四川大学 | A method of software copyright protection |
CN1322387C (en) * | 2004-03-31 | 2007-06-20 | 佳能株式会社 | Method for firming legitimate of software and device for executing software |
CN100380273C (en) * | 2004-06-21 | 2008-04-09 | 佳能株式会社 | Image forming apparatus, license managing method for applications program |
CN100437616C (en) * | 2006-04-27 | 2008-11-26 | 张文 | Software anti-pirate device 8 h |
CN100461064C (en) * | 2004-04-30 | 2009-02-11 | 微软公司 | Method and system for limiting software updates |
-
2002
- 2002-03-31 CN CN 02113550 patent/CN1448842A/en active Pending
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1322387C (en) * | 2004-03-31 | 2007-06-20 | 佳能株式会社 | Method for firming legitimate of software and device for executing software |
CN100461064C (en) * | 2004-04-30 | 2009-02-11 | 微软公司 | Method and system for limiting software updates |
CN100380273C (en) * | 2004-06-21 | 2008-04-09 | 佳能株式会社 | Image forming apparatus, license managing method for applications program |
CN1315017C (en) * | 2004-12-20 | 2007-05-09 | 四川大学 | A method of software copyright protection |
CN100437616C (en) * | 2006-04-27 | 2008-11-26 | 张文 | Software anti-pirate device 8 h |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9298893B2 (en) | Activation code system and method for preventing software piracy | |
US11704389B2 (en) | Controlling access to digital assets | |
US6226747B1 (en) | Method for preventing software piracy during installation from a read only storage medium | |
US6134659A (en) | Controlled usage software | |
US6070171A (en) | Method and system for copy-tracking distributed software featuring tokens containing a key field and a usage field | |
AU767286B2 (en) | Methods and apparatus for protecting information | |
CN100473087C (en) | System and method for licensing applications on wireless devices over a wireless network | |
US20010034712A1 (en) | System and method for monitoring software | |
US20040117664A1 (en) | Apparatus for establishing a connectivity platform for digital rights management | |
US20040117644A1 (en) | Method for reducing unauthorized use of software/digital content including self-activating/self-authenticating software/digital content | |
US20040225894A1 (en) | Hardware based method for digital rights management including self activating/self authentication software | |
US20040117628A1 (en) | Computer readable storage medium for enhancing license compliance of software/digital content including self-activating/self-authenticating software/digital content | |
US20040117631A1 (en) | Method for digital rights management including user/publisher connectivity interface | |
CN1910845A (en) | Method of allocating optimal payload space | |
CN100452908C (en) | System and method for preventing software and hardware with communication condition / function from being embezzled | |
CN101183468A (en) | Terminal login system and method | |
CN1448842A (en) | Software copyright protecting method based on network database | |
CN1398401A (en) | Computer-readable medium with microprocessor to control reading and computer arranged to communicate with such method | |
CN102708310A (en) | Registration code anti-piracy encryption method for computer software in batch production | |
WO2006101765A2 (en) | Method for preventing unauthorized installation of a software product | |
CN1369809A (en) | Anti-piracy encryption method for register code of computer software | |
CN116167020A (en) | Software authorization method and system | |
WO1998053384A1 (en) | Method and apparatus for activating programs/features in a computer | |
US7711957B2 (en) | Granting access to a computer-based object | |
US20090031430A1 (en) | Software activation control method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |