Disclosure of Invention
The object of the invention is: in order to solve the problems in the prior art, the invention aims to provide a software copyright protection system and a software copyright protection method based on a Ubuntu operating system, which integrate multiple protection mechanisms, have better protection effect and greatly increase the cracking difficulty.
The technical scheme is as follows: in order to solve the above technical problem, the present technical solution provides a software copyright protection method based on a Ubuntu operating system, which is applied to a software copyright protection system, and includes the following steps:
step one, a setting unit sets a virtual machine in an operating system, and target protection software is installed in the virtual machine;
secondly, the permission modification module of the copyright protection unit carries out system setting;
thirdly, the system protection module of the copyright protection unit copies the modification monitoring module of the copyright protection unit at different positions of an operating system;
step four, the copyright protection unit monitors whether the running time of the software service is overtime;
and fifthly, restarting the virtual machine by the duration monitoring module, and popping up an authorization expiration prompt.
The software copyright protection method based on the Ubuntu operating system is characterized in that the second step comprises the following steps,
step 21, the permission modification module of the copyright protection unit sets the login shell of the virtual machine, so that the virtual machine user only has the permission to configure the ip;
and step 22, the authority modification module of the copyright protection unit modifies the configuration file of the starting manager, and sets a user name and a password for single-user mode login and the user name and the password for virtual machine operating system login.
The software copyright protection method based on the Ubuntu operating system is characterized in that the step 21 further comprises the step of testing the configuration authority of the virtual machine by an authority modification module.
And after the setting in the second step is finished, inputting a user name and a password when the user logs in the virtual machine to verify the login, and starting the target protection software.
The method for protecting the software copyright based on the Ubuntu operating system is characterized in that the fourth step comprises the following steps,
step 41, the modification monitoring module of the copyright protection unit monitors whether the startup manager file is modified, and when the startup manager file is modified, step 42 is executed; if not, go to step 43;
step 42, modifying the monitoring module to stop the service process of the software and deleting the code;
step 43, the time length monitoring unit of the copyright protection unit monitors the running time length of the software service; when the authorization period is not reached, executing step 41; and when the authorization period is reached, executing the fifth step.
In the method for protecting the software copyright based on the Ubuntu operating system, the code deletion in step 42 includes overwriting the code again by using a random number and 0, and completely deleting the target protection software and the auxiliary data file.
The software copyright protection method based on the Ubuntu operating system is characterized in that the copy number of the modification monitoring module in the third step is more than or equal to two.
The software copyright protection system based on the Ubuntu operating system comprises a setting unit and a copyright protection unit, wherein the copyright protection unit comprises a permission modification module, a system protection module, a modification monitoring module and a duration monitoring module;
the setting unit sets a virtual machine in an operating system, and target protection software is installed in the virtual machine;
the permission modification module carries out system setting;
the system protection module copies the modification monitoring module of the copyright protection unit at different positions of an operating system;
the copyright protection unit monitors whether the running time of the software service is overtime or not;
and the duration monitoring module restarts the system and pops up an authorization expiration prompt.
The software copyright protection system based on the Ubuntu operating system is characterized in that the permission modification module sets the login shell of the virtual machine, so that a virtual machine user only has the permission to configure the ip; and the permission modification module modifies the configuration file of the starting manager, and sets a user name and a password for single-user mode login and the user name and the password for virtual machine operating system login.
The software copyright protection system based on the Ubuntu operating system is characterized in that the modification monitoring module monitors whether the startup manager file is modified; when the software is modified, the modification monitoring module stops the service process of the software and deletes the code; the time length monitoring unit monitors the running time length of the software service; and when the authorization expiration is reached, the time length monitoring unit restarts the virtual machine and pops up an authorization expiration prompt.
(III) the beneficial effects are as follows: the software copyright protection system and method based on the Ubuntu operating system realize multiple protection of the server software of the Ubuntu operating system, increase the difficulty of cracking by illegal users and further protect the copyright of the software.
Detailed Description
The present invention will be described in further detail with reference to preferred embodiments, and more details are set forth in the following description in order to provide a thorough understanding of the present invention, but it is apparent that the present invention can be embodied in many other forms different from the description herein and can be similarly generalized and deduced by those skilled in the art based on the practical application without departing from the spirit of the present invention, and therefore, the scope of the present invention should not be limited by the contents of this detailed embodiment.
The drawings are schematic representations of embodiments of the invention, and it is noted that the drawings are intended only as examples and are not drawn to scale and should not be construed as limiting the true scope of the invention.
The software copyright protection method based on the Ubuntu operating system is applied to the software copyright protection system based on the Ubuntu operating system. As shown in fig. 2, the software copyright protection system includes a setting unit and a copyright protection unit, and the copyright protection unit includes a permission modification module, a system protection module, a modification monitoring module, and a duration monitoring module.
The setting unit sets a virtual machine in an operating system, and target protection software is installed in the virtual machine.
And the permission modification module sets the login shell of the virtual machine, so that the virtual machine user only has the permission of configuring the ip. The permission modification module can also test the configuration permission of the virtual machine, and ensures that a virtual machine user only has the permission to configure the ip.
The permission modification module modifies the configuration file of the start manager, sets a user name and a password for single-user mode login and the user name and the password for virtual machine operating system login, realizes single-user mode login, prevents a user from logging in the operating system by using the single-user mode, and acquires a code or increases the permission of a trial user. And the starting manager configuration file modified by the permission modification module is a grub configuration file.
And after the permission modification module completes the setting of the shell setting and the setting of the configuration file of the starting manager, the target protection software is started after a user inputs a user name and a password to verify the login when logging in the virtual machine.
The following description is given by taking an example of a user name and a password for login in a single-user mode, and a user name and a password for login of an operating system of a virtual machine.
The virtual machine comprises a Wuban graph system, and the permission modification module sets a user name and a password of a single-user login mode of the server operating system to prevent a user from entering the server operating system through the single-user mode and modifying the configuration permission of the virtual machine.
The permission modification module sets a user name and a password for logging in the Uban image system, when a user enters the Uban image system, the user is prompted to input IP related information after entering the Uban image system through the set user name and password, and after the user inputs the IP related information, the protected software is started. The user name and password of the Wuban image system are used for limiting that only authorized persons can log in to use the protected software.
The system protection module copies the modification monitoring module of the copyright protection unit at different positions of an operating system, and the copy number of the modification monitoring module by the system protection module is more than or equal to two. Therefore, the difficulty of deleting the software copyright protection system by a user through a third-party tool is increased, and the multiple modification monitoring modules simultaneously monitor whether the grub file is modified or not, so that when one modification monitoring module is deleted, other modification monitoring modules can find cracking behaviors in time.
The modification monitoring module monitors whether the startup manager file is modified; when modified, the modification monitoring module stops the service process of the software and deletes the code. The mode of deleting the code by the modification monitoring module comprises the step of using the random number and 0 to overwrite the code again so as to completely delete the target protection software and the attached data file.
The time length monitoring unit monitors the running time length of the software service; when the authorization expiration is reached, the time length monitoring unit restarts the virtual machine, and an authorization expiration prompt is popped up, so that the trial of the user is limited, and the user is prompted: the authorization expires.
As shown in fig. 1, the software copyright protection method based on the Ubuntu operating system includes the following steps:
step one, a setting unit sets a virtual machine in an operating system, and target protection software is installed in the virtual machine.
And step two, the permission modification module of the copyright protection unit carries out system setting. The method specifically comprises the following steps:
and step 21, setting the login shell of the virtual machine by the permission modification module of the copyright protection unit, so that the virtual machine user only has the permission of configuring the ip. Step 21 further includes testing the configuration authority of the virtual machine by the authority modification module, so as to ensure that the virtual machine user only has the authority to configure the ip.
And step 22, the permission modification module of the copyright protection unit modifies the configuration file of the starting manager, sets a user name and a password for single-user mode login and the user name and the password for virtual machine operating system login, and realizes single-user mode login by setting the user name and the password for single-user login, so that a user is prevented from logging in the operating system by using the single-user mode, and acquiring a code or increasing the permission of a trial user. And the starting manager configuration file modified by the permission modification module is a grub configuration file.
And after the second step is finished, inputting a user name and a password when the user logs in the virtual machine, verifying and logging in the virtual machine, and starting the target protection software. The target protection software may set a start-up self-start.
And thirdly, copying the modification monitoring module of the copyright protection unit to different positions of an operating system by the system protection module of the copyright protection unit. The copy number of the system protection module to the modification monitoring module is more than or equal to two. Therefore, the difficulty of deleting the modification monitoring modules by a user through a third-party tool is increased, and the multiple modification monitoring modules simultaneously monitor whether the grub files are modified or not, so that the modification monitoring modules can find cracking behaviors in time.
The third step can be placed at any position of the first step and the second step, and only the modification monitoring module needs to be copied and stored at different positions of the operating system.
And step four, the copyright protection unit monitors whether the running time of the software service is overtime. The method specifically comprises the following steps: step 41, the modification monitoring module of the copyright protection unit monitors whether the startup manager file is modified, and when the startup manager file is modified, step 42 is executed; if not, step 43 is performed.
The modification monitoring module stops the service process of the software and deletes the code, step 42.
The code deleting mode in step 42 includes that the code is overwritten again by using the random number and 0, and the target protection software and the attached data file are completely deleted.
Step 43, the time length monitoring unit of the copyright protection unit monitors the running time length of the software service; when the authorization period is not reached, executing step 41; and when the authorization period is reached, executing the fifth step.
And step five, the duration monitoring unit restarts the virtual machine and pops up an authorization expiration prompt, so that the purpose of prompting the user of authorization expiration is achieved.
A software copyright protection system and method based on a Ubuntu operating system provide a copyright protection system and method with multiple mechanisms aiming at application service software running in the Ubuntu system. By installing the service program into the virtual machine, a user is provided which configures the IP rights of the virtual machine, thereby protecting the server software code from direct access. The trial time of the software is limited by the running time of the server software, password verification of single-user login is increased by configuring the grub file, and therefore the fact that the login system modifies and increases the authority of the trial user in a single-user mode login mode is avoided. And a plurality of software copyright protection systems are copied in the system, and all the software copyright protection systems are used for simultaneously monitoring whether the program grub file is modified or not, so that the condition that the user name and the password are verified in a single-user login mode is ensured. The invention realizes multiple protection of server software of the Ubuntu operating system by utilizing the grub mechanism of linux, increases the difficulty of cracking by illegal users, and realizes effective protection of software in the virtual machine.
The above description is provided for the purpose of illustrating the preferred embodiments of the present invention and will assist those skilled in the art in more fully understanding the technical solutions of the present invention. However, these examples are merely illustrative, and the embodiments of the present invention are not to be considered as being limited to the description of these examples. For those skilled in the art to which the invention pertains, several simple deductions and changes can be made without departing from the inventive concept, and all should be considered as falling within the protection scope of the invention.