CN1300697C - Software pretection method and system - Google Patents

Software pretection method and system Download PDF

Info

Publication number
CN1300697C
CN1300697C CNB031569285A CN03156928A CN1300697C CN 1300697 C CN1300697 C CN 1300697C CN B031569285 A CNB031569285 A CN B031569285A CN 03156928 A CN03156928 A CN 03156928A CN 1300697 C CN1300697 C CN 1300697C
Authority
CN
China
Prior art keywords
software
application program
information
key point
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB031569285A
Other languages
Chinese (zh)
Other versions
CN1598781A (en
Inventor
林光信
赵镝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inventec Corp
Original Assignee
Inventec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Corp filed Critical Inventec Corp
Priority to CNB031569285A priority Critical patent/CN1300697C/en
Publication of CN1598781A publication Critical patent/CN1598781A/en
Application granted granted Critical
Publication of CN1300697C publication Critical patent/CN1300697C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Abstract

The present invention relates to a software protecting method and a system thereof, which is suitable for software used for information devices to avoid the optional copy and use of the software. Firstly, a confirm password is arranged on a key point position of an application program, and a monitoring process module is added in a device; when a program is operated, the program can be continually operated only after the version number of the device is firstly confirmed without fault, when the program is operated to a key point position, password information is requested from the process module to confirm after the password information is received, and the operation is continued after the password information is confirmed; afterwards, when the program is operated to each key point position, the provide password information needs to be requested from the monitoring process module, and the operation can be continued after the password information is confirmed. Thus, each key point position can be detected, and the application program only can be completely operated an information device after all confirm passwords are detected and confirmed. The present invention has the advantages of simplicity and low cost, and can complete password confirmation under the condition that users do no know.

Description

Method for protecting software and system
Technical field
The invention relates to a kind of Software Protection Technique, particularly utilize version detection and install many places affirmation password software is carried out the method and system of encipherment protection at the program key point about a kind of.
Background technology
Software is used for commander and the operation of control information device hardware, till the extremely formal commercialization of software development initial stage, the software developer must drop into a large amount of exploitation manpower and cost, can just the software listing can be sold after stable operation on the information equipment until the software of being developed.At this moment, input huge cost when software supplier develops for regaining as early as possible, make the software price high, can't in most information equipments, popularize, moreover, all be stored in because of software in the storing medias such as CD or floppy disk, be easy to circulation and propagate, so increased by the probability of duplicating by various data processing techniques.Therefore, software cryptography becomes a kind of necessary means of protection software, and the software major part of selling is taked certain encryption method at present, and its purpose is to protect software developer's interests and prevents that software from being duplicated arbitrarily, piracy.The used software enciphering method of software developer is broadly divided into two classes at present: hardware encipher and software cryptography.
Hardware encipher is that combination of hardware with software and information equipment is to carry out encipherment protection to software; the software that adopts hardware encipher is when carrying out; need and the relevant hardware swap date; if there is not relevant hardware to cooperate; software after the encryption can't move; though this method has the Cipher Strength height; advantages such as encryption performance is good; but need specific hardware supported ability entire run; this inconvenience is one of its shortcoming; therefore, this method is used for software developer that Cipher Strength, compatibility, stability are had higher requirements more.
Software cryptography is with the pure software method software to be encrypted, and its cipher mode mainly contains pin mode, software self-checking mode, license management mode and key floppy disc mode etc.
Pin mode is meant the important local inquiry password of information equipment in software execute process, and the user must be according to the input password of password epiphase correspondence, and program could continue to carry out.The advantage of this mode be implement simple, hardly must input cost, but exist defectives such as destroying normal man-machine conversation, password and pass point relative fixed, therefore be mainly used in the lower software of price, as Games Software etc.
When software self-checking mode refers to that the software developer packs software into user used hard disk, the information such as track location that the parity check sum software of installation procedure automatic logger computer hardware of meeting in installation process is installed, perhaps at special track, CMOS (the Complementary Metal-Oxide Semiconductor of hard disk, complementary metal oxide semiconductor (CMOS), be a kind of storer on the computer main frame panel) in do a mark, and rewrite installation procedure automatically, when after this software was carried out, the information or the mark of record carried out verification when promptly these being installed.If software is copied to by the user on other the information equipment, because of running environment changes, software can't normally move.Make and to make the user in this way when legal use software; the existence of imperceptible encryption; and information equipment is relatively also more stable; so many software developers have adopted this mode to protect the software of being developed; but also there is certain defective in this cipher mode; for example; when user increase and decrease or when changing computer hardware, compressed drive or situation such as CMOS power down occurring; the capital causes software normally to carry out; need reinstall software and just can address the above problem, for just inconvenience more of user.
The license management mode is meant that software is in installation process, information equipment to legal user detects, special finger print information so as to the acquired information device hardware, and the computation process (the installation sequence number of finger print information and this software self is carried out computing) by algorithm, obtain representing a string data of this software, and require the user that this data is registered by modes such as Internet, Email, telefacsimile, mails, if legal user can obtain a registration code (or confirmation code) there the software developer.After legal user wants installed software to this registration code input; this software can normally move; this cipher mode is actually software and information specific device hardware is carried out " binding "; making the user software can't be copied on the out of Memory equipment uses; because of the hardware fingerprint of every station information equipment all inequality; so; this mode is to the implementation of software and have no effect; its shortcoming is; software developer's services amount will be increased; it is reported that using special register machine to produce registration code will become following main flow, promptly adopted this cipher mode to carry out software protection as the Office2000 of Microsoft (Microsoft).
The key floppy disc mode is that the special track at floppy disk writes a customizing messages, software is this customizing messages of palpus verification in operational process, this floppy disk resembles a key, thereby be called key floppy disc by people custom, adopt the software cryptography instrument of this cipher mode a lot, wherein, advanced software cryptography instrument also provides interface function, the software developer only needs disposable purchase one cover Encryption Tool, get final product many key floppy discs of self manufacture, come the verification key floppy disc whether to exist and in software, read magnetic track special on the key floppy disc.This software cryptography mode is easy, cost is low, encryption is reliable; but also there is defective simultaneously; must in floppy disk, insert floppy disk during as user's executive software; cause the user in floppy disk, to carry out the inconvenience of data access; and floppy disk is a kind of consumables; through regular meeting because of lose, scratch, magnetization and reason such as cold and hot cause to damage data can't be read; and software that floppy disk stores and data still are available for users to backup; key floppy disc then can not, so the user often has the awkward situation that causes software normally to use because of reasons such as key floppy disc damages.
Summary of the invention
For overcoming the shortcoming of above-mentioned prior art; fundamental purpose of the present invention is to provide a kind of method for protecting software and system; it can increase the Cipher Strength of protected software, after guaranteeing that software is by people's bootlegging, can't entire run on unwarranted information equipment.
Another object of the present invention is to provide a kind of method for protecting software and system, its modus operandi is simple and with low cost, need not expend extra cost of software developer and manpower expenditure.
Another purpose of the present invention is to provide a kind of method for protecting software and system, and it is can be the user legal and when normally using software, the imperceptible defence program that has software cryptography, and unlikely destruction man-machine conversation.
For reaching above-mentioned purpose, method for protecting software of the present invention comprises: (1) different key point position in the application program implementation is set different affirmation passwords respectively; (2) but in information equipment, set up monitor application operation and receive the monitoring process module of the Query Information that application program sends; (3) make this application program when operation at first to information equipment authentication query information, if the authentication information mistake of information equipment response, application program just can't normally be moved, as application program detect authentication information errorless after, can carry out initialization and continue moving; When (4) application program moves to a certain key point position, provide and this corresponding encrypted message in key point position to the request of monitoring process module immediately; And (5) make application program that the encrypted message that the monitoring process module is provided is confirmed, if confirm to pass through, then application program can continue operation, and as not, application program will be out of service immediately; Then, when if application program is reruned to other key point position, repeat step (4) to step (5), carry out verification with affirmation password to a plurality of key points position, and after the affirmation password of all key point positions was all confirmed to pass through, what application program just can be normal and complete operated in the information equipment.
As mentioned above, method for protecting software of the present invention be earlier by the software developer in the application program operational process, confirm password in key point set positions such as the contents of program of required execution and instructions, just the software developer is in the different key points position of application program, set a plurality of application programs numberings that need respectively, the affirmation password that identification projects such as key point position and password are carried out verification, when application program operates in the information equipment, make it at first obtain authentication information to this information equipment, device version number just, and only after confirming that version number is errorless, application program just can continue operation, when application program moves to the key point position, promptly require the monitoring process module to provide and contain application reference number, the encrypted message of contents such as key point position and password, when the contained content of this encrypted message all meets the identification project of confirming the password confirmation request, application program just can continue operation, otherwise, then make this application program withdraw from the execution operation of information equipment immediately; Make application program can finish the certification work of all being confirmed passwords, and after having only whole passwords all to detect to pass through, application program just can be normally and complete operating in the information equipment.
Security system for software of the present invention comprises: (a) can external civil power and the power supply device of the required power supply of all device work of internal system is provided; (b) the software input interface that can supply storing media to insert; (c) be used to deposit the storage device of install software; (d) processing unit electrically connects with software input interface and storage device, is used for software is mounted to storage device from storing media, and can and carries out its contained application program from the storage device load software; And (e) monitoring process module, be used to safeguard the key point password table of all application programs, and simultaneously monitoring application program operation and wait for that application program sends Query Information.
In sum, security system for software of the present invention can cooperate the execution program of method for protecting software, by version detection and many places are set confirm multi-enciphering protections such as password, increase the intensity of software protection, the software of guaranteeing bootlegging can't move on unwarranted information equipment, its modus operandi is simple and with low cost, need not expend extra cost of software developer and manpower expenditure; All be in information equipment, to move voluntarily also by the application program of protected software because of method for protecting software provided by the invention; need not make the user of legal authorization carry out steps such as password confirming or network access authentication; save the time that the user carries out the required consumption of password confirming; and can keep the continuity of user's state of mind, do not destroy interactive complete.
Description of drawings
Fig. 1 is a process flow diagram, illustrates that the present invention is in application program every administration step of carrying out the software protection measure in service;
Fig. 2 is a calcspar, and the inside structure of security system for software of the present invention is described; And
Fig. 3 is a block connection layout, and application program and the monitoring process intermodule communication relation when sending request signal and replying encrypted message is described.
Embodiment
Embodiment
In following examples; method for protecting software of the present invention and system applies are in computer equipment; so as to setting up the relations of dependence of contained application program of software and computer equipment hardware; just make application program first when the inner execution of computer equipment; at first with the version number of this computer equipment; hardware informations such as installation magnetic track load to be deposited; whether supply is differentiated with program in the future and provided between the computer equipment of execution environment has the relations of dependence; the software user can't be replicated in software on other computer equipment use, thereby reach the purpose that application programs is protected.
Fig. 1 is a process flow diagram, and method for protecting software of the present invention is described, carries out every execution program of software encryption and protection on computer equipment; In step S1, be earlier by the software developer in the application program operational process, the different affirmation password of key point set positions in the instruction that must carry out, the related function that needs calling and subroutine support, just, set a plurality of affirmation passwords at the diverse location of application program, then proceed to step S2.
In step S2; in security system for software of the present invention, set up the monitoring process module; make this monitoring process module safeguard all Application Password tables, and operation of monitor application simultaneously and the Query Information that the wait application program is sent, then proceed to step S3.
In step S3, if application program desires to operate in computer equipment when inner, make this application program at first inquire about its device version number to the computer equipment that its running environment is provided, then proceed to step S4.
In step S4, make application program differentiate device version that computer equipment provides number, whether there are the relations of dependence with it, if have the relations of dependence between application program and computer equipment, promptly then carry out step S5, do not have the relations of dependence, then directly proceed to step S9 as both.
In step S5, make application initialization and operate in the computer equipment, if application program is in operational process, move to the software developer and set the palpus verification, confirm the key point position of password, even this application program is sent solicited message to the monitoring process module, make the monitoring process module provide and contain application reference number, the encrypted message of key point position, when the monitoring process module is receiving after this request provides the information of encrypted message, just in its contained Application Password table, inquire about, and the encrypted message that will conform to returns to application program, then proceeds to step S6.
In step S6, make application program confirm at the encrypted message that the monitoring process module provides, if after this encrypted message is confirmed to pass through, carry out step S7 immediately, make application program continue operation, wrong as this keying material, then directly proceed to step S9.
In step S7, make application program in operational process, continue to judge whether to move to the key point position that other need ask the verification encrypted message, if application program is reruned to the key point position, even it re-executes step S5 to step S7, so that detection is inquired about in a plurality of key point positions that are set with encrypted message, the encrypted message that sets until whole key points position has all been confirmed to pass through, then proceeds to step S8.
In step S8, make application program entire run and function of providing the user to use in the computer equipment that has the relations of dependence with it.
In step S9, make this application program withdraw from the running environment that computer equipment provides, so as to stopping to carry out its contained contents of program.
Fig. 2 is a calcspar, be used to show the framework of security system for software of the present invention, as shown in the figure, security system for software 2 of the present invention be arranged on through mandate can this software of legal use A computer equipment 1 inside, the affirmation password that is used to cooperate the inner a plurality of key points of software A position to set provides corresponding encrypted message, make software A can operate in the computer equipment 1, and guarantee that software A after suffering bootlegging, can't operate on the unwarranted data processing equipment; This security system for software 2 comprises: power supply device 20, software input interface 21, processing unit 22, storage device 23 and monitoring process module 24; The software developer is at first in the implementation of the contained application program of software A, make a plurality of key points position that this application program can complete execution setting check password respectively, just this application program is set a plurality of affirmation passwords at diverse location by the software developer, the storing media of wanting to store software A as the user 3 is installed in the computer equipment 1 via the software input interface and when carrying out, must at first in computer equipment 1, increase by a monitoring process module 24, make this monitoring process module 24 and software input interface 21, processing unit 22, storage device 23 and power supply device 20 interconnect, and can prevent the security system for software 2 that software A moves so as to constituting on unwarranted data processing equipment; When the user opens the switch (figure is mark not) of computer equipment 1, external civil power is inputed in the computer equipment 1 via power supply device 20, required electric power so that inner contained each function element running of computer equipment 1 to be provided, wherein, monitoring process module 24 also brings into operation when computer equipment 1 activates, to safeguard the password table of all application programs, the operation of monitor application simultaneously, and the affirmation cipher inquiry information that application programs is sent is (as application reference number, projects such as key point position and password) handle accordingly and reply, when instructing the power-off of computer equipment 1, monitoring process module 24 is just out of service, to deposit the storage interface 3 of software A as the user and insert software input interface 21, so that software A is mounted to computer equipment 1, processing unit 22 read immediately and executive software A content in contained installation procedure, with the required application program of software 3 entire runs, link orders etc. are loaded in the storage device and deposit.In installation process, software A also collects information such as the hardware setting of computer equipment 1 and device version number simultaneously, as confirming in the future whether software A runs on the foundation of authorization computer equipment, after the installation procedure of software A is finished, the user gets final product the application program of executive software A and carries out data processing operation, when application program is moved, at first by the version number of processing unit 22 to computer equipment 1 query facility, if number being employed by the device version of computer equipment 1 response that program differentiates is mistake, then application program withdraws from the work of computer equipment 1 operation immediately, version number as computer equipment 1 passback confirms errorless after application program is differentiated, the hardware information of promptly representing computer equipment 1 conforms to the information that application program is collected in installation process, and application program can be at computer equipment 1 relaying reforwarding row.
Treat device version number be employed program detect pass through after, application program is carried out initialization immediately and is brought into operation, when application program moves to before key point 1 position of being set by the software developer, after this position needs verification to confirm that password is errorless, just can make processing unit 22 continue to carry out this application program, at this moment, the communication relation that application program as shown in Figure 3 and monitoring process module are 24, processing unit 22 sends the encrypted message that a request provides key point 1 position to monitoring process module 24, monitoring process module 24 is after receiving this request signal, to recording application program number, inquiry in the key point password table 241 of key point position and key point password, and return corresponding encrypted message and give processing unit 22, after application program confirms that this encrypted message meets the set affirmation password in key point 1 position, make processing unit continue to carry out its contents of program, encrypted message as passback is not the affirmation password that key point 1 position sets, then application program is out of service immediately, can't make processing unit 22 continue to carry out its contents of program; Then, when application program moves to other key point position, only need be by said procedure, and according to shown in Figure 3, at first provide corresponding encrypted message to 24 requests of monitoring process module, and confirming the correct follow-up reforwarding row of encrypted message, if encrypted message mistake, then withdraw from out of service immediately, inquire about and detect the affirmation password of a plurality of key points position whereby, all detect until the affirmation password of whole key points position and to pass through, application program could normal and complete operating in the computer equipment 1.
By method for protecting software of the present invention and system; confirm and set the multiple detection modes such as affirmation password of key point position by comprising device version; can improve the intensity of software protection; order is used software of the present invention and can't be moved on unwarranted data processing equipment; in addition; also can confirm password to change by regularly software being upgraded; and then guarantee the reliability of software encryption and protection; moreover; in response to the software protection measure of carrying out in operational process with program all is to be implemented voluntarily by application program; and need not make the user in the application program operational process, import product serial number or authentication code; so the authorized user is when using software; imperceptible application program is carried out the program of software encryption and protection; can remove the time of user's required consumption when Input Software is confirmed data (as product serial number and authorization code etc.) from, also can keep interactive smooth and easy.

Claims (10)

1. a method for protecting software is used for limiting the contained application program of software and only can moves in information specific equipment, it is characterized in that this method comprises:
(1) different key point positions is set different encrypted messages respectively in the application program implementation;
(2) but in information equipment, set up monitor application operation, and can receive the monitoring process module of the Query Information that application program sends;
(3) make application program to information equipment authentication query information, if information equipment can't respond correct authentication information, application program is out of service immediately, determines that as application program authentication information is errorless, can carry out initialization and continue operation;
(4) etc. when application program moves to a certain key point position, promptly provide and the corresponding encrypted message of the set affirmation password in this key point position to the request of monitoring process module; And
(5) make application program that the identification data that the monitoring process module is provided is confirmed, pass through if confirm, application program can continue operation, and is as not, then out of service immediately, subsequently, when application program was reruned to other key point position, promptly repeating step (4) carried out verification to step (5) with the affirmation password to a plurality of key points position, and all confirm when errorless at the affirmation password of all key point positions, application program could entire run in information equipment.
2. method for protecting software as claimed in claim 1 is characterized in that, the information equipment that collected hardware information was consistent when this customizing messages equipment was meant and installs with software.
3. method for protecting software as claimed in claim 1; it is characterized in that; this information equipment is meant the equipment that can handle electronic bits of data, and this information equipment is a kind of in personal computer, notebook computer, laptop computer, palmtop computer and the server.
4. method for protecting software as claimed in claim 1 is characterized in that, this key point position is meant application program in operational process, normally moves a kind of in the contents of program of required execution and the instruction institute cohort group.
5. method for protecting software as claimed in claim 1 is characterized in that, this encrypted message is a kind of in application reference number, key point position and the password institute cohort group; Authentication information then is meant the device version number of information equipment.
6. method for protecting software as claimed in claim 1; it is characterized in that; this monitoring process module is to bring into operation when information equipment activates; and close the back at information equipment and finish; it is used to safeguard the key point password table of all application programs, and the content of this password table comprises application program number, crucial period and key point password.
7. security system for software can be according to the execution program of method for protecting software, prevents that the contained application program of depositing in the storing media of software from being duplicated by the user, moves on unspecific information equipment, it is characterized in that this system comprises:
Power supply device provides all device work of internal system required power supply;
The software input interface is inserted the storing media of depositing software content;
Storage device is deposited user institute installed software;
Processing unit electrically connects with software input interface and storage device, is used for software is mounted to storage device from storing media, and can and carries out its contained application program from the storage device load software; And
The monitoring process module electrically connects with processing unit and storage device, is used to safeguard the key point password table of all application programs, and operation of monitoring application program simultaneously and the Query Information that the wait application program sends encrypted message.
8. security system for software as claimed in claim 7 is characterized in that, this security system for software group is located at the information specific device interior.
9. security system for software as claimed in claim 8 is characterized in that, this information specific equipment is meant by software vendor licenses software/and its device version number information equipment that can be passed through by software certification.
10. security system for software as claimed in claim 7 is characterized in that, this encrypted message is a kind of of application reference number, key point position and password institute cohort group.
CNB031569285A 2003-09-15 2003-09-15 Software pretection method and system Expired - Fee Related CN1300697C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB031569285A CN1300697C (en) 2003-09-15 2003-09-15 Software pretection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB031569285A CN1300697C (en) 2003-09-15 2003-09-15 Software pretection method and system

Publications (2)

Publication Number Publication Date
CN1598781A CN1598781A (en) 2005-03-23
CN1300697C true CN1300697C (en) 2007-02-14

Family

ID=34660141

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB031569285A Expired - Fee Related CN1300697C (en) 2003-09-15 2003-09-15 Software pretection method and system

Country Status (1)

Country Link
CN (1) CN1300697C (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635726B (en) * 2009-08-26 2012-07-04 中兴通讯股份有限公司 Service end of C/S architecture and service executing method and service executing system of client
CN102708310A (en) * 2012-01-12 2012-10-03 苏州百正信息科技有限公司 Registration code anti-piracy encryption method for computer software in batch production
CN103377332B (en) * 2012-04-26 2016-04-20 腾讯科技(深圳)有限公司 The method of access application and device
CN108206741A (en) * 2016-12-16 2018-06-26 北京国双科技有限公司 Verification method, the apparatus and system of service
CN107180169A (en) * 2017-06-12 2017-09-19 郑州云海信息技术有限公司 A kind of software activation method and device
US11321466B2 (en) * 2018-03-09 2022-05-03 Qualcomm Incorporated Integrated circuit data protection

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1121215A (en) * 1994-10-20 1996-04-24 联华电子股份有限公司 Software protecting method and device
CN1131992A (en) * 1994-07-05 1996-09-25 株式会社前进 Security system for software
US5568550A (en) * 1994-10-05 1996-10-22 Shmuel Ur Method and system for identifying documents generated by an unauthorized software copy
US5935246A (en) * 1996-04-26 1999-08-10 International Computers Limited Electronic copy protection mechanism using challenge and response to prevent unauthorized execution of software
US6070171A (en) * 1998-05-15 2000-05-30 Palantir Software, Inc. Method and system for copy-tracking distributed software featuring tokens containing a key field and a usage field

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1131992A (en) * 1994-07-05 1996-09-25 株式会社前进 Security system for software
US5568550A (en) * 1994-10-05 1996-10-22 Shmuel Ur Method and system for identifying documents generated by an unauthorized software copy
CN1121215A (en) * 1994-10-20 1996-04-24 联华电子股份有限公司 Software protecting method and device
US5935246A (en) * 1996-04-26 1999-08-10 International Computers Limited Electronic copy protection mechanism using challenge and response to prevent unauthorized execution of software
US6070171A (en) * 1998-05-15 2000-05-30 Palantir Software, Inc. Method and system for copy-tracking distributed software featuring tokens containing a key field and a usage field

Also Published As

Publication number Publication date
CN1598781A (en) 2005-03-23

Similar Documents

Publication Publication Date Title
CN101952809B (en) Computer storage device having separate read-only space and read-write space, removable media component, system management interface, and network interface
EP1443381B1 (en) System and method for secure software activation with volume licenses
Swanson et al. Generally accepted principles and practices for securing information technology systems
RU2321055C2 (en) Device for protecting information from unsanctioned access for computers of informational and computing systems
US7681241B2 (en) Apparatus and method for managing digital rights with arbitration
CN100524333C (en) Method for preventing illegal using software
CN101493869B (en) Password protection for backed-up file
US7134016B1 (en) Software system with a biometric dongle function
CN100405249C (en) Information processing apparatus, information processing method, and program storage medium
EP1055990A1 (en) Event logging in a computing platform
US20020029347A1 (en) System and method for preventing unauthorized access to electronic data
CN103597489A (en) Data custodian and curation system
CN101246530A (en) System and method of storage device data encryption and data access via a hardware key
US20040039705A1 (en) Distributing a software product activation key
JP2003500722A (en) Information protection method and device
CN102948114A (en) Single-use authentication methods for accessing encrypted data
CN1954297A (en) Isolated multiplexed multi-dimensional processing in a virtual processing space having virus, spyware, and hacker protection features
US20040243734A1 (en) Information processing apparatus, method of controlling the same, control program, and storage medium
CN1782941A (en) Software authorizing and protecting device and method
GB2522032A (en) Controlling the configuration of computer systems
CN1300697C (en) Software pretection method and system
US8694434B1 (en) Techniques for unregistering and transferring software licenses
CN101243469A (en) Digital license migration from first platform to second platform
KR20010044823A (en) Method and System for Protecting Data Requiring User's Authentication at Computer
US20040105547A1 (en) Software protection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20070214

Termination date: 20100915