CN101414342B - Software dog and method for implementing software protection - Google Patents

Software dog and method for implementing software protection Download PDF

Info

Publication number
CN101414342B
CN101414342B CN2007101633092A CN200710163309A CN101414342B CN 101414342 B CN101414342 B CN 101414342B CN 2007101633092 A CN2007101633092 A CN 2007101633092A CN 200710163309 A CN200710163309 A CN 200710163309A CN 101414342 B CN101414342 B CN 101414342B
Authority
CN
China
Prior art keywords
user
authentication
protected software
dongle
legitimacy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2007101633092A
Other languages
Chinese (zh)
Other versions
CN101414342A (en
Inventor
李明柱
胡建钧
唐文
隋爱芬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens Ltd China
Original Assignee
Siemens Ltd China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens Ltd China filed Critical Siemens Ltd China
Priority to CN2007101633092A priority Critical patent/CN101414342B/en
Publication of CN101414342A publication Critical patent/CN101414342A/en
Application granted granted Critical
Publication of CN101414342B publication Critical patent/CN101414342B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a softdog and a method for realizing software protection thereof. The softdog adopts a wireless communication mode and does not occupy the external interfaces of a device which runs the protected software, such as a parallel interface, a serial interface or a USB interface of a computer; the softdog is not be frequently inserted and pulled out on the device, thus enhancing the self reliability of the softdog in one aspect, and in another aspect, causing no damage on a connection interface between the softdog and the device and simultaneously ensuring the working reliability of the softdog. Besides, the invention realizes one softdog supports different protected software by memorizing the validity authentication parameters corresponding to a plurality of sets of protected software in the softdog.

Description

The method of dongle and realization software protection thereof
Technical field
The present invention relates to Software Protection Technique, particularly relate to the method for a kind of dongle and realization software protection thereof.
Background technology
Dongle is the hardware product that is used for software protection that uses at present on computers.When protected software moves on computers; dongle must be by computer parallel interface such as printer interface; or serial line interface such as RS232 interface; or USB (universal serial bus) (USB) interface and computing machine maintenance wired connection; the frequent plug of dongle on computer external interface; can reduce the reliability of dongle itself on the one hand, also can the connecting interface between dongle and the computing machine be caused damage on the other hand.
At present; the only corresponding protected software of one cover dongle; owing to be connected by wired mode between dongle and the computing machine; when a plurality of protected software of operation on same computing machine; will inevitably take Peripheral Interface limited on the computing machine; this has limited the usage quantity of different protected softwares on same computing machine on the one hand, has also limited other computer peripheral on the other hand, as the use of USB keyboard, mouse or printer.
Summary of the invention
The object of the present invention is to provide a kind of dongle, can guarantee the reliable use of dongle.
Another object of the present invention is to provide a kind of dongle to realize the method for software protection, can guarantee the reliable use of dongle.
The objective of the invention is to be achieved through the following technical solutions:
A kind of dongle comprises control module, protection storage unit, authentication ' unit, comprises the communication unit of wireless network interface modules and is used to each component units in the dongle that the power supply unit of working power is provided, wherein,
Described control module is used to receive the use instruction that sends by wireless network interface modules from protected software user, to authentication ' unit transmission legitimacy authentication notification; And behind the legitimacy authentication success, send startup key message notice to the protection storage unit;
Described authentication ' unit is used to store the legitimacy parameters for authentication, and when the legitimacy authentication notification that receives from control module, notifies protected software user to start the legitimacy verification process by wireless network interface modules; And be used for carrying out the legitimacy authentication from protected software user's the authentication request information and the legitimacy parameters for authentication of self storage, and return the legitimacy authentication response to control module according to what receive by wireless network interface modules;
Described protection storage unit is used to store the key message of protected software and carries out the required functional parameter of key message, and when receiving when notifying from the startup key message of control module, notifies protected software user to start protected software; And be used for when receiving the key message call instruction that protected software user sends by wireless network interface modules; utilize the functional parameter of self storing to call the key message of protected software; returning key message to control module calls and finishes instruction; and under the control of control module, key message is called the result return to protected software user via wireless network interface modules.
Wherein, described communication unit further comprises the wireless proxy module when above when described user is two, is used for coordinating the visit of each user to dongle by the timesharing visit or the access mode of interlocking.
Wherein, described authentication ' unit is used to store one group of above legitimacy parameters for authentication, and each combined method parameters for authentication is corresponding to the different users of different protected software; Described communication unit further comprises the wireless proxy module, is used to coordinate the legitimacy verification process at the protected software of difference.
In addition, described wireless proxy module also is used for the information that sends to the user by described wireless network interface modules is encrypted, and/or the information that the user sent that receives by wireless network interface modules is decrypted.
A kind of method according to dongle realization software protection of the present invention is stored the key message of protected software in advance and is carried out the required functional parameter of key message in dongle, this method also comprises:
When the user need use protected software, dongle carried out the legitimacy authentication by communication to the user of protected software;
Described user is by after authenticating, and the key message that calls protected software by communication from dongle is to start protected software.
Wherein, store the legitimacy parameters for authentication in advance in the described dongle; Described verification process is specially:
Described dongle receives the use instruction from the user, startup is to user's legitimacy verification process, by the authentication request information of wireless network reception from the user, whether the legitimacy parameters for authentication that the authentication request information that judgement receives has been stored with self is consistent, if consistent, then judge the legitimacy authentication success; Otherwise, judge the legitimacy authentification failure.
Wherein, described user is user and/or protected software runtime environment; When the user was the user, described legitimacy parameters for authentication comprised user ID and authorized user message; When the user was protected software runtime environment, described legitimacy parameters for authentication comprised medium access control MAC Address, CPU sign, hard disk sign and the protected software mark and the version information of creditable calculation modules TPM sign, hardware device.
Wherein, described key message is the key function or the operation of protected software.
When described user is two when above, this method also comprises: dongle adopts the timesharing visit or the access mode of interlocking to coordinate the visit of each user to it.
In addition, this method also comprises: described dongle is encrypted the information that sends to the user.
In order to guarantee the reliable use of dongle, dongle of the present invention has adopted communication, dongle does not take the Peripheral Interface of the equipment of the protected software of operation, parallel interface, serial line interface or USB interface as computing machine, dongle can frequently not plug on described equipment, strengthened the reliability of dongle itself like this, on the one hand; Also can not cause the infringement to the connecting line between dongle and the computing machine on the other hand, this has also guaranteed the functional reliability of dongle simultaneously.
In addition, the present invention passes through the legitimacy parameters for authentication at the protected software of the corresponding many covers of dongle storage, has realized the different protected software of available same dongle support.
Description of drawings
Describe exemplary embodiment of the present invention below with reference to accompanying drawings in detail, make clearer above-mentioned and other feature and advantage of the present invention of those of ordinary skill in the art, in the accompanying drawing:
Fig. 1 is the composition structural representation of dongle of the present invention;
Fig. 2 is the process flow diagram that dongle of the present invention is realized the method for software protection;
Fig. 3 a is an Application Scenarios-Example of supporting a plurality of dongles on same computing machine of the present invention;
Fig. 3 b is the Application Scenarios-Example that the same dongle of the present invention uses for many computing machines;
Fig. 3 c is the Application Scenarios-Example that the same dongle support of the present invention operates in same the different protected softwares on the computing machine;
Fig. 4 is a composition structural representation of supporting the embodiment of a plurality of dongles in the same software runtime environment of the present invention.
Embodiment
In order to make purpose of the present invention, technical scheme and advantage clearer,, the present invention is further elaborated below in conjunction with drawings and Examples.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
Fig. 1 is the composition structural representation of dongle of the present invention; as shown in Figure 1, can comprise according to dongle of the present invention: control module 100, protection storage unit 101, authentication ' unit 102, comprise the communication unit 103 of wireless network interface modules 1031 and be used to each component units in the dongle that the power supply unit 104 of working power is provided.
Wherein, control module 100 is used for the work of each component units of coordination software dog.The user is when using protected software; can send the use instruction that carries user ID and protected software mark to control module 100 via the wireless network interface modules 1031 of communication unit 103 by wireless network; control module 100 is used for sending the legitimacy authentication notification to authentication ' unit 102 after receiving this use instruction.Need to prove that to be the interface that provides of the identification module by protected software to dongle send the user that to use instruction, the realization of the identification module of protected software be prior art and irrelevant with the realization of dongle of the present invention, is not described in detail here.Control module 100 also is used to receive the legitimacy authentication response from authentication ' unit 102, if the response of legitimacy authentication success, then control module 100 can send to the user by wireless network interface modules 1031 and start protected software notice; If the legitimacy authentication failure response then can send to the user by wireless network interface modules 1031 and withdraw from protected software notice.
The user is after receiving the protected software notice of described startup; can send enabled instruction to control module 100 by the wireless network interface modules 1031 of dongle of the present invention; control module 100 is used for after receiving this enabled instruction, sends to protection storage unit 101 to start the key message notice.
In addition, control module 100 also is used to receive the key message of self-shield storage unit 101 to call to finish instruction, and control protection storage unit 101 is called the result with key message and returned to the user via wireless network interface modules 1031.
The key message that protection storage unit 101 is used to store protected software is a usability of program fragments; be stored in key function or operation in the dongle in advance such as protected software supplier, and the prescription, input parameter etc. of carrying out required correlation function parameter of key message such as key manufacturing technology.When receiving from the startup key message of control module 100 notice; protection storage unit 101 is used for notifying the user to start key message by wireless network interface modules 1031; and behind the key message call instruction that receives user's key message sign corresponding by carrying of wireless network interface modules 1031 transmissions with protected software mark; utilize the correlation function parameter of self storing; call the key function or the operation of the corresponding protected software of key message sign; returning key message to control module 100 calls and finishes instruction; and key message called the control of result by control module 100, return to the user via wireless network interface modules 1031.Need to prove; the user is that the interface that the key message calling module by protected software provides sends the key message call instruction to dongle; the realization of the key message calling module of protected software is a prior art and irrelevant with the realization of dongle of the present invention, is not described in detail here.
The key message of storage is that protected software supplier is stored in the protection storage unit 101 in advance in the protection storage unit 101; other entity outside this dongle can not read the key message of these protected softwares, and can only read and carry out by 100 controls of the control module in the dongle.Can store the key message of a plurality of protected softwares in the protection storage unit 101; promptly store one or more key function or operation; different key functions or the corresponding different protected software of operation; the key message of each protected software adopts different signs to distinguish; different key message signs is with different key functions or operate corresponding stored in protection storage unit 101; so that when protection storage unit 101 receives the key message call instruction, carry out the key message of corresponding protected software correspondence.
Authentication ' unit 102 is used to realize the legitimacy authentication to the user of protected software.Store the legitimacy parameters for authentication in the authentication ' unit 102; such as; combined method parameters for authentication at certain described user can comprise user ID (USERID) and authorized user message, and wherein authorized user message comprises authentication password, PIN number, protected software mark and version information etc.When the legitimacy authentication notification that receives from control module 100, authentication ' unit 102 is used to notify the user to start the legitimacy verification process.When receiving the authentication request information that the user sends by wireless network interface modules 1031, authentication ' unit 102 is used to judge whether the authentication request information that receives is consistent with the legitimacy parameters for authentication of self storing, if consistent, then return the response of legitimacy authentication success to control module 100; Otherwise, return the legitimacy authentication failure response to control module 100.
Can also store a group or more legitimacy parameters for authentication in the described authentication ' unit 102; each combined method parameters for authentication is corresponding to the different users of the protected software of difference; when the legitimacy parameters for authentication comprises many groups; also can further comprise wireless proxy module 1032 in the communication unit 103, be used to coordinate legitimacy verification process at the different users of the protected software of difference.
Above-mentioned authentication to the user can be just carried out in 102 couples of protected software users' of authentication ' unit authentication; also can be just authenticating the equipment that moves protected software; when the equipment that moves protected software was authenticated, the legitimacy parameters for authentication can comprise medium access control (MAC) address, CPU ID, hard disk ID, protected software mark and the version information etc. of creditable calculation modules (TPM) sign, described equipment.In addition, 102 couples of protected software users' of authentication ' unit authentication can also be the double authentication at the equipment of protected software users and the protected software of operation.
Need to prove that the legitimacy verification process belongs to and well known to a person skilled in the art technological means, the specific implementation method of legitimacy authentication is also a lot, here and be not used in the scope of the present invention that limits.
Communication unit 103 is used for the radio communication that realizes between dongle and the user by wireless network interface modules 1031.
Power supply unit 104 can use powered battery, wireless power or other power supply mode easily.
The concrete form of dongle can be the smart card that possesses radio function, biological information equipment, badge etc.; Or mobile device such as mobile phone, PDA(Personal Digital Assistant), radio-frequency (RF) identification (RFID, Radio Frequency Identification) module etc.; Also comprise the equipment such as PC that contain the TPM module.
In order further to protect the communication security between dongle and the user; also can further comprise wireless proxy module 1032 in the communication unit 103; be used for the information that sends to the user by wireless network interface modules 1031 is encrypted, and/or the information that the user sent that receives by wireless network interface modules 1031 is decrypted.
Fig. 2 is the process flow diagram that dongle of the present invention is realized the method for software protection, and in conjunction with Fig. 1, dongle of the present invention realizes that the method for software protection may further comprise the steps:
Step 200: in dongle, store the key message of protected software in advance and carry out the required functional parameter of key message.
Step 201: when the user need use protected software, dongle carried out the legitimacy authentication by communication to the user.
In this step, store the legitimacy parameters for authentication in the dongle, and by the authentication request information of wireless network reception from the user, whether the legitimacy parameters for authentication that the authentication request information that judgement receives has been stored with self is consistent, if consistent, then judge the legitimacy authentication success; Otherwise, judge the legitimacy authentification failure.Need to prove that the legitimacy verification process belongs to and well known to a person skilled in the art technological means, the specific implementation method of legitimacy authentication is also a lot, not delimit the scope of the invention here.
Above-mentioned legitimacy verification process can be just to the user's of protected software authentication, also can be just to the authentication of the equipment that moves protected software, can also be double authentication to the equipment of user and the protected software of operation.When the user was authenticated, a combined method parameters for authentication can comprise user ID (USER ID), authorization message such as authentication password, PIN number, protected software mark and version information etc.; To the authenticating of equipment that protected software moved the time, a combined method parameters for authentication can comprise CPU ID, hard disk ID and the protected software mark and the version information etc. of TPM sign, MAC Address, equipment.
Step 202: the user calls key message to start protected software by communication from dongle after authenticating by legitimacy.
After the user is by the legitimacy authentication; start protected software; and call required key message from dongle; dongle utilizes prescription, input parameter of the correlation function parameter of self storing in advance such as key manufacturing technology etc.; the key message that calls protected software is a program segment; such as key function or operation, and key message is called the result return to the user by communication.
The communication that dongle of the present invention adopted can be based on any wireless communication technology, such as bluetooth (Bluetooth), ZigBee, 802.11, honeycomb (cellular) etc.
In order further to protect the communication security between dongle and the user, in step 201 and the step 202, can encrypt the wireless communication procedure between dongle and the user.
Because dongle of the present invention is to adopt communication, dongle does not take the Peripheral Interface of the equipment of the protected software of operation, parallel interface, serial line interface or USB interface as computing machine, dongle can frequently not plug on described equipment, strengthened the reliability of dongle itself like this, on the one hand; Also can not cause the infringement to the connecting line between dongle and the computing machine on the other hand, this has also guaranteed the functional reliability of dongle simultaneously
Fig. 3 a is an Application Scenarios-Example of supporting a plurality of dongles on same computing machine of the present invention, and each dongle works alone each other.When the software of operating software dog on the computing machine 1 protection, computing machine if with dongle 1 between finish verification process, and get final product legal startup protected software from the key message that dongle 1 calls the software of dongle 1 protection; Equally, when the software of operating software dog 2 on the computing machine or 3 protections, computing machine as long as with dongle 2 or 3 between finish verification process, and get final product legal startup protected software from the key message that dongle 2 or 3 calls the softwares of dongle 2 or 3 protections.And, since dongle 1,2 and 3 all be adopt communication realize with computing machine between communicate by letter, can not take Peripheral Interface such as parallel interface, serial line interface or the USB interface of computing machine, guaranteed the use of required other peripheral hardware of computing machine.
Fig. 4 is a composition structural representation of supporting the embodiment of a plurality of dongles in the same software runtime environment of the present invention; software runtime environment can be that same computing machine or other move the hardware device or the software platform of protected software among Fig. 4; the operation of protected software 1 provides protection by dongle 1; the operation of protected software 2 provides protection by dongle 2; comprise aforesaid key message calling module and identification module in the protected software; software runtime environment provides wireless proxy module and wireless network interface modules, is used for cooperating with the corresponding module of dongle realizing radio communication.
Dongle component units among Fig. 4 only illustrates protection storage unit 101, authentication ' unit 102, wireless proxy module 1032 and wireless network interface modules 1031, and connecting line is only represented the mutual signal of signal, does not represent the annexation of actual each intermodule.As shown in Figure 4, realize between the identification module of protected software and the authentication ' unit of corresponding dongle that perhaps to the verification process of user and software runtime environment, detailed process repeats no more as depicted in figs. 1 and 2 to the user or to software runtime environment here.In order further to protect the communication security between dongle and the protected software user; can encrypt the wireless communication procedure between dongle and the protected software user; at this moment; by the wireless proxy module in dongle and the software runtime environment cooperatively interact finish describedly add, decrypt communication; specifically add, the realization of decrypt communication process belongs to and well known to a person skilled in the art and technological means repeat no more here.Finish the invoked procedure that key message is the program segment of protected software between the protection storage unit of dongle and the key message calling module of protected software, detailed process repeats no more as depicted in figs. 1 and 2 here.
In addition; can adopt different described key message signs to different protected software; the wireless proxy module of software runtime environment can be further according to different key message signs like this; to send to corresponding dongle from the key message call instruction of the protected software of difference, will call the result from the key message of different software dog and send to corresponding protected software to guarantee the normal operation of protected software.
Fig. 3 b is the Application Scenarios-Example that dongle of the present invention uses simultaneously for many computing machines, in Fig. 3 b example shown, has realized flexible being connected between dongle of the present invention and many computing machines, works alone between each computing machine.At this moment, need the wireless proxy module 1032 of dongle to coordinate between each computing machine visit, such as adopting modes such as timesharing visit, staggered visit to dongle.As adopt the timesharing access mode, then as computing machine such as computing machine 1 when using dongle, other computing machine such as computing machine 3 could use dongle after can only waiting for that computing machine 1 is used to complete; When employing interlocks access mode; suppose that computing machine 1 is using the software of dongle protection and is being in verification process or during the key message invoked procedure; computing machine 2 temporarily can not the access software dog; the wireless proxy module 1032 of dongle can be waited for instruction by sending to computing machine 2; after computing machine 1 is finished verification process or key message invoked procedure; dongle can send work order to computing machine 2, and this computer-chronograph 2 starts the implementation to the software of dongle protection.The specific implementation of the coordination function of above-mentioned wireless proxy module 1032 belongs to and well known to a person skilled in the art and technological means be not described in detail here.
Can support different protected software and different users in order to realize same dongle; can further store the different users's of the protected software of corresponding many covers legitimacy parameters for authentication in the authentication ' unit 102; and coordination by wireless proxy module 1032; such as the legitimacy verification process that adopts the control of timesharing access mode at the different users of the protected software of difference, make the operations of the protected software of the many covers of a dongle support.Fig. 3 c is the Application Scenarios-Example that the same dongle support of the present invention operates in the different protected software on the computing machine,
The above only is preferred embodiment of the present invention, not in order to restriction the present invention, all any modifications of being done within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. dongle; it is characterized in that; comprise control module (100), protection storage unit (101), authentication ' unit (102), comprise the communication unit (103) of wireless network interface modules (1031) and be used to each component units in the dongle that the power supply unit (104) of working power is provided; wherein
Described control module (100) is used for receiving the use instruction that sends by wireless network interface modules (1031) from protected software user, to authentication ' unit (102) transmission legitimacy authentication notification; And behind the legitimacy authentication success, send startup key message notice to protection storage unit (101);
Described authentication ' unit (102) is used to store the legitimacy parameters for authentication, and when the legitimacy authentication notification that receives from control module (100), notifies protected software user to start the legitimacy verification process by wireless network interface modules (1031); And be used for carrying out the legitimacy authentication from protected software user's the authentication request information and the legitimacy parameters for authentication of self storage, and return the legitimacy authentication response to control module (100) according to what receive by wireless network interface modules (1031);
Described protection storage unit (101) is used to store the key message of protected software and carries out the required functional parameter of key message, and when receiving, notify protected software user to start protected software from the startup key message of control module (100) notice; And be used for when receiving the key message call instruction that protected software user sends by wireless network interface modules (1031); utilize the functional parameter of self storing to call the key message of protected software; returning key message to control module (100) calls and finishes instruction; and under the control of control module (100), key message is called the result return to protected software user via wireless network interface modules (1031).
2. dongle according to claim 1, it is characterized in that, described communication unit (103) further comprises wireless proxy module (1032) when above when described user is two, is used for coordinating the visit of each user to dongle by the timesharing visit or the access mode of interlocking.
3. dongle according to claim 1 is characterized in that, described authentication ' unit (102) is used to store one group of above legitimacy parameters for authentication, and each combined method parameters for authentication is corresponding to the different users of different protected software;
Described communication unit (103) further comprises wireless proxy module (1032), is used to coordinate the legitimacy verification process at the protected software of difference.
4. according to claim 2 or 3 described dongles, it is characterized in that, described wireless proxy module (1032) also is used for the information that sends to the user by described wireless network interface modules (1031) is encrypted, and/or the information that the user sent that receives by wireless network interface modules (1031) is decrypted.
5. the method for a dongle realization software protection according to claim 1 is characterized in that, stores the key message of protected software in advance and carry out the required functional parameter of key message in dongle, and this method also comprises:
When the user need use protected software, dongle carried out the legitimacy authentication by communication to the user of protected software;
Described user is by after authenticating, and the key message that calls protected software by communication from dongle is to start protected software.
6. method according to claim 5 is characterized in that, stores the legitimacy parameters for authentication in the described dongle in advance; Described verification process is specially:
Described dongle receives the use instruction from the user, startup is to user's legitimacy verification process, by the authentication request information of wireless network reception from the user, whether the legitimacy parameters for authentication that the authentication request information that judgement receives has been stored with self is consistent, if consistent, then judge the legitimacy authentication success; Otherwise, judge the legitimacy authentification failure.
7. method according to claim 6 is characterized in that, described user is user and/or protected software runtime environment;
When the user was the user, described legitimacy parameters for authentication comprised user ID and authorized user message;
When the user was protected software runtime environment, described legitimacy parameters for authentication comprised medium access control MAC Address, CPU sign, hard disk sign and the protected software mark and the version information of creditable calculation modules TPM sign, hardware device.
8. method according to claim 5 is characterized in that, described key message is the key function or the operation of protected software.
9. method according to claim 5 is characterized in that, when described user is two when above, this method also comprises: dongle adopts the timesharing visit or the access mode of interlocking to coordinate the visit of each user to it.
10. according to the arbitrary described method of claim 5 to 9, it is characterized in that this method also comprises: described dongle is encrypted the information that sends to the user.
CN2007101633092A 2007-10-19 2007-10-19 Software dog and method for implementing software protection Active CN101414342B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2007101633092A CN101414342B (en) 2007-10-19 2007-10-19 Software dog and method for implementing software protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2007101633092A CN101414342B (en) 2007-10-19 2007-10-19 Software dog and method for implementing software protection

Publications (2)

Publication Number Publication Date
CN101414342A CN101414342A (en) 2009-04-22
CN101414342B true CN101414342B (en) 2010-06-02

Family

ID=40594874

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007101633092A Active CN101414342B (en) 2007-10-19 2007-10-19 Software dog and method for implementing software protection

Country Status (1)

Country Link
CN (1) CN101414342B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102480724A (en) * 2010-11-30 2012-05-30 国民技术股份有限公司 Software authentication data card, software authentication system and software authentication method
CN102685122B (en) * 2012-05-06 2016-05-04 北京深思数盾科技股份有限公司 The method of the software protection based on cloud server
CN104252585A (en) * 2013-06-27 2014-12-31 镇江雅迅软件有限责任公司 Method for implementing authority control based on encryption lock
WO2021136216A1 (en) * 2019-12-31 2021-07-08 华为技术有限公司 Anti-cracking method and apparatus
CN113127815A (en) * 2019-12-31 2021-07-16 华为技术有限公司 Anti-cracking method and device
CN113094109B (en) * 2021-03-30 2023-02-21 联想(北京)有限公司 Electronic device and control method
CN113360857A (en) * 2021-08-10 2021-09-07 支付宝(杭州)信息技术有限公司 Code starting method and system for software

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6697948B1 (en) * 1999-05-05 2004-02-24 Michael O. Rabin Methods and apparatus for protecting information
CN1749906A (en) * 2005-10-28 2006-03-22 武汉理工大学 Virtual software dog enciphering method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6697948B1 (en) * 1999-05-05 2004-02-24 Michael O. Rabin Methods and apparatus for protecting information
CN1749906A (en) * 2005-10-28 2006-03-22 武汉理工大学 Virtual software dog enciphering method

Also Published As

Publication number Publication date
CN101414342A (en) 2009-04-22

Similar Documents

Publication Publication Date Title
CN101414342B (en) Software dog and method for implementing software protection
CN102315942B (en) Security terminal with Bluetooth and communication method thereof of security terminal and client end
EP1703406B1 (en) Data communicating apparatus and method for managing memory of data communicating apparatus
CN100485726C (en) A mobile payment system based on distributed cipher key
EP2068535A1 (en) Portable telephone and access control method
RU2009126606A (en) METHOD AND DEVICE FOR CREATING LICENSES IN MOBILE DIGITAL RIGHTS MANAGEMENT NETWORK
CN101517593A (en) Method, system and smart card reader for management of access to a smart card
CN101923746A (en) Communication system, reader/writer and verification method
KR101509043B1 (en) Implementing method, system of universal card system and smart card
CN101243452A (en) System provided with several electronic devices and a security module
CN101827155B (en) Multi-application realization method and system of intelligent cards based on mobile communication
CN102646075A (en) Storage card locking method and system
CN102609641A (en) DRM (digital rights management) system based on distributed keys
CN102292731A (en) Password protected secure device
GB2434661A (en) Portable communication device with smart card functionality
CN102480724A (en) Software authentication data card, software authentication system and software authentication method
EP1860605A1 (en) Electronic money system, information storage medium, and mobile terminal device
US20140298024A1 (en) Method for granting access to a network and device for implementing this method
CN101236674A (en) Intelligent cipher key equipment and method for information exchange with external apparatus
KR101495884B1 (en) Apparatus and method for managing asset using one-chip using including wifi module, bluetooth moduel and nfc tag
CN110636491A (en) Service-oriented trusted execution module and communication method
KR101040577B1 (en) Method and System for issuing of Mobile Application
CN101303720B (en) Built-in equipment, method and system for protecting encipherment of built-in equipment software
US20080272187A1 (en) Electronic Money System, Information Storage Medium, and Mobile Terminal Device
CN113971562A (en) Object weight transfer method, block chain system and first terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant