Movatterモバイル変換


[0]ホーム

URL:


CN113821775B - Software copyright protection system and method based on Ubuntu operating system - Google Patents

Software copyright protection system and method based on Ubuntu operating system
Download PDF

Info

Publication number
CN113821775B
CN113821775BCN202111147919.XACN202111147919ACN113821775BCN 113821775 BCN113821775 BCN 113821775BCN 202111147919 ACN202111147919 ACN 202111147919ACN 113821775 BCN113821775 BCN 113821775B
Authority
CN
China
Prior art keywords
software
copyright protection
virtual machine
module
operating system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111147919.XA
Other languages
Chinese (zh)
Other versions
CN113821775A (en
Inventor
周书平
刘小兵
张晓东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Luoan Technology Co Ltd
Original Assignee
Beijing Luoan Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Luoan Technology Co LtdfiledCriticalBeijing Luoan Technology Co Ltd
Priority to CN202111147919.XApriorityCriticalpatent/CN113821775B/en
Publication of CN113821775ApublicationCriticalpatent/CN113821775A/en
Application grantedgrantedCritical
Publication of CN113821775BpublicationCriticalpatent/CN113821775B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

The software copyright protection method based on the Ubuntu operating system is applied to the software copyright protection system based on the Ubuntu operating system and comprises a setting unit and a copyright protection unit, wherein the copyright protection unit comprises a permission modification module, a system protection module, a modification monitoring module and a duration monitoring module; the software copyright protection method comprises the following steps: step one, a setting unit sets a virtual machine in an operating system, and target protection software is installed in the virtual machine; secondly, the permission modification module of the copyright protection unit carries out system setting; thirdly, the system protection module of the copyright protection unit copies the modification monitoring module at different positions of the operating system; step four, the copyright protection unit monitors whether the running time of the software service is overtime; and fifthly, restarting the system by the duration monitoring module, and popping up an authorization expiration prompt. The invention realizes multiple protection of software, increases the cracking difficulty and protects the copyright of the software.

Description

Software copyright protection system and method based on Ubuntu operating system
Technical Field
The invention relates to the technical field of software copyright protection, in particular to a software copyright protection system and method based on a Ubuntu operating system.
Background
With the increasing competition of the internet industry, many software companies provide trial software for users, so that the users can fully know whether the software meets the requirements of the users and then decide whether to purchase the software. However, some malicious users crack the software, so that the use right of the software is obtained free of charge, which causes great economic loss to software manufacturers.
The existing scheme judges whether the authorization is expired or the software is bound with a machine code according to the system time, and the software can only run on one machine or be protected by using a software dog or the like. However, the mode of judging the expiration of the authorization according to the system time is easy to crack if the user changes the system time; the machine code binding scheme also fails if the user changes the information of the system hardware. The mode of using the software dog needs additional software dog, so the cost is increased and the use is inconvenient.
Therefore, the problems of the prior art are to be further improved and developed.
Disclosure of Invention
The object of the invention is: in order to solve the problems in the prior art, the invention aims to provide a software copyright protection system and a software copyright protection method based on a Ubuntu operating system, which integrate multiple protection mechanisms, have better protection effect and greatly increase the cracking difficulty.
The technical scheme is as follows: in order to solve the above technical problem, the present technical solution provides a software copyright protection method based on a Ubuntu operating system, which is applied to a software copyright protection system, and includes the following steps:
step one, a setting unit sets a virtual machine in an operating system, and target protection software is installed in the virtual machine;
secondly, the permission modification module of the copyright protection unit carries out system setting;
thirdly, the system protection module of the copyright protection unit copies the modification monitoring module of the copyright protection unit at different positions of an operating system;
step four, the copyright protection unit monitors whether the running time of the software service is overtime;
and fifthly, restarting the virtual machine by the duration monitoring module, and popping up an authorization expiration prompt.
The software copyright protection method based on the Ubuntu operating system is characterized in that the second step comprises the following steps,
step 21, the permission modification module of the copyright protection unit sets the login shell of the virtual machine, so that the virtual machine user only has the permission to configure the ip;
and step 22, the authority modification module of the copyright protection unit modifies the configuration file of the starting manager, and sets a user name and a password for single-user mode login and the user name and the password for virtual machine operating system login.
The software copyright protection method based on the Ubuntu operating system is characterized in that the step 21 further comprises the step of testing the configuration authority of the virtual machine by an authority modification module.
And after the setting in the second step is finished, inputting a user name and a password when the user logs in the virtual machine to verify the login, and starting the target protection software.
The method for protecting the software copyright based on the Ubuntu operating system is characterized in that the fourth step comprises the following steps,
step 41, the modification monitoring module of the copyright protection unit monitors whether the startup manager file is modified, and when the startup manager file is modified, step 42 is executed; if not, go to step 43;
step 42, modifying the monitoring module to stop the service process of the software and deleting the code;
step 43, the time length monitoring unit of the copyright protection unit monitors the running time length of the software service; when the authorization period is not reached, executing step 41; and when the authorization period is reached, executing the fifth step.
In the method for protecting the software copyright based on the Ubuntu operating system, the code deletion in step 42 includes overwriting the code again by using a random number and 0, and completely deleting the target protection software and the auxiliary data file.
The software copyright protection method based on the Ubuntu operating system is characterized in that the copy number of the modification monitoring module in the third step is more than or equal to two.
The software copyright protection system based on the Ubuntu operating system comprises a setting unit and a copyright protection unit, wherein the copyright protection unit comprises a permission modification module, a system protection module, a modification monitoring module and a duration monitoring module;
the setting unit sets a virtual machine in an operating system, and target protection software is installed in the virtual machine;
the permission modification module carries out system setting;
the system protection module copies the modification monitoring module of the copyright protection unit at different positions of an operating system;
the copyright protection unit monitors whether the running time of the software service is overtime or not;
and the duration monitoring module restarts the system and pops up an authorization expiration prompt.
The software copyright protection system based on the Ubuntu operating system is characterized in that the permission modification module sets the login shell of the virtual machine, so that a virtual machine user only has the permission to configure the ip; and the permission modification module modifies the configuration file of the starting manager, and sets a user name and a password for single-user mode login and the user name and the password for virtual machine operating system login.
The software copyright protection system based on the Ubuntu operating system is characterized in that the modification monitoring module monitors whether the startup manager file is modified; when the software is modified, the modification monitoring module stops the service process of the software and deletes the code; the time length monitoring unit monitors the running time length of the software service; and when the authorization expiration is reached, the time length monitoring unit restarts the virtual machine and pops up an authorization expiration prompt.
(III) the beneficial effects are as follows: the software copyright protection system and method based on the Ubuntu operating system realize multiple protection of the server software of the Ubuntu operating system, increase the difficulty of cracking by illegal users and further protect the copyright of the software.
Drawings
FIG. 1 is a schematic diagram illustrating steps of a software copyright protection method based on a Ubuntu operating system according to the present invention;
fig. 2 is a schematic structural diagram of the software copyright protection system based on the Ubuntu operating system.
Detailed Description
The present invention will be described in further detail with reference to preferred embodiments, and more details are set forth in the following description in order to provide a thorough understanding of the present invention, but it is apparent that the present invention can be embodied in many other forms different from the description herein and can be similarly generalized and deduced by those skilled in the art based on the practical application without departing from the spirit of the present invention, and therefore, the scope of the present invention should not be limited by the contents of this detailed embodiment.
The drawings are schematic representations of embodiments of the invention, and it is noted that the drawings are intended only as examples and are not drawn to scale and should not be construed as limiting the true scope of the invention.
The software copyright protection method based on the Ubuntu operating system is applied to the software copyright protection system based on the Ubuntu operating system. As shown in fig. 2, the software copyright protection system includes a setting unit and a copyright protection unit, and the copyright protection unit includes a permission modification module, a system protection module, a modification monitoring module, and a duration monitoring module.
The setting unit sets a virtual machine in an operating system, and target protection software is installed in the virtual machine.
And the permission modification module sets the login shell of the virtual machine, so that the virtual machine user only has the permission of configuring the ip. The permission modification module can also test the configuration permission of the virtual machine, and ensures that a virtual machine user only has the permission to configure the ip.
The permission modification module modifies the configuration file of the start manager, sets a user name and a password for single-user mode login and the user name and the password for virtual machine operating system login, realizes single-user mode login, prevents a user from logging in the operating system by using the single-user mode, and acquires a code or increases the permission of a trial user. And the starting manager configuration file modified by the permission modification module is a grub configuration file.
And after the permission modification module completes the setting of the shell setting and the setting of the configuration file of the starting manager, the target protection software is started after a user inputs a user name and a password to verify the login when logging in the virtual machine.
The following description is given by taking an example of a user name and a password for login in a single-user mode, and a user name and a password for login of an operating system of a virtual machine.
The virtual machine comprises a Wuban graph system, and the permission modification module sets a user name and a password of a single-user login mode of the server operating system to prevent a user from entering the server operating system through the single-user mode and modifying the configuration permission of the virtual machine.
The permission modification module sets a user name and a password for logging in the Uban image system, when a user enters the Uban image system, the user is prompted to input IP related information after entering the Uban image system through the set user name and password, and after the user inputs the IP related information, the protected software is started. The user name and password of the Wuban image system are used for limiting that only authorized persons can log in to use the protected software.
The system protection module copies the modification monitoring module of the copyright protection unit at different positions of an operating system, and the copy number of the modification monitoring module by the system protection module is more than or equal to two. Therefore, the difficulty of deleting the software copyright protection system by a user through a third-party tool is increased, and the multiple modification monitoring modules simultaneously monitor whether the grub file is modified or not, so that when one modification monitoring module is deleted, other modification monitoring modules can find cracking behaviors in time.
The modification monitoring module monitors whether the startup manager file is modified; when modified, the modification monitoring module stops the service process of the software and deletes the code. The mode of deleting the code by the modification monitoring module comprises the step of using the random number and 0 to overwrite the code again so as to completely delete the target protection software and the attached data file.
The time length monitoring unit monitors the running time length of the software service; when the authorization expiration is reached, the time length monitoring unit restarts the virtual machine, and an authorization expiration prompt is popped up, so that the trial of the user is limited, and the user is prompted: the authorization expires.
As shown in fig. 1, the software copyright protection method based on the Ubuntu operating system includes the following steps:
step one, a setting unit sets a virtual machine in an operating system, and target protection software is installed in the virtual machine.
And step two, the permission modification module of the copyright protection unit carries out system setting. The method specifically comprises the following steps:
and step 21, setting the login shell of the virtual machine by the permission modification module of the copyright protection unit, so that the virtual machine user only has the permission of configuring the ip. Step 21 further includes testing the configuration authority of the virtual machine by the authority modification module, so as to ensure that the virtual machine user only has the authority to configure the ip.
And step 22, the permission modification module of the copyright protection unit modifies the configuration file of the starting manager, sets a user name and a password for single-user mode login and the user name and the password for virtual machine operating system login, and realizes single-user mode login by setting the user name and the password for single-user login, so that a user is prevented from logging in the operating system by using the single-user mode, and acquiring a code or increasing the permission of a trial user. And the starting manager configuration file modified by the permission modification module is a grub configuration file.
And after the second step is finished, inputting a user name and a password when the user logs in the virtual machine, verifying and logging in the virtual machine, and starting the target protection software. The target protection software may set a start-up self-start.
And thirdly, copying the modification monitoring module of the copyright protection unit to different positions of an operating system by the system protection module of the copyright protection unit. The copy number of the system protection module to the modification monitoring module is more than or equal to two. Therefore, the difficulty of deleting the modification monitoring modules by a user through a third-party tool is increased, and the multiple modification monitoring modules simultaneously monitor whether the grub files are modified or not, so that the modification monitoring modules can find cracking behaviors in time.
The third step can be placed at any position of the first step and the second step, and only the modification monitoring module needs to be copied and stored at different positions of the operating system.
And step four, the copyright protection unit monitors whether the running time of the software service is overtime. The method specifically comprises the following steps: step 41, the modification monitoring module of the copyright protection unit monitors whether the startup manager file is modified, and when the startup manager file is modified, step 42 is executed; if not, step 43 is performed.
The modification monitoring module stops the service process of the software and deletes the code, step 42.
The code deleting mode in step 42 includes that the code is overwritten again by using the random number and 0, and the target protection software and the attached data file are completely deleted.
Step 43, the time length monitoring unit of the copyright protection unit monitors the running time length of the software service; when the authorization period is not reached, executing step 41; and when the authorization period is reached, executing the fifth step.
And step five, the duration monitoring unit restarts the virtual machine and pops up an authorization expiration prompt, so that the purpose of prompting the user of authorization expiration is achieved.
A software copyright protection system and method based on a Ubuntu operating system provide a copyright protection system and method with multiple mechanisms aiming at application service software running in the Ubuntu system. By installing the service program into the virtual machine, a user is provided which configures the IP rights of the virtual machine, thereby protecting the server software code from direct access. The trial time of the software is limited by the running time of the server software, password verification of single-user login is increased by configuring the grub file, and therefore the fact that the login system modifies and increases the authority of the trial user in a single-user mode login mode is avoided. And a plurality of software copyright protection systems are copied in the system, and all the software copyright protection systems are used for simultaneously monitoring whether the program grub file is modified or not, so that the condition that the user name and the password are verified in a single-user login mode is ensured. The invention realizes multiple protection of server software of the Ubuntu operating system by utilizing the grub mechanism of linux, increases the difficulty of cracking by illegal users, and realizes effective protection of software in the virtual machine.
The above description is provided for the purpose of illustrating the preferred embodiments of the present invention and will assist those skilled in the art in more fully understanding the technical solutions of the present invention. However, these examples are merely illustrative, and the embodiments of the present invention are not to be considered as being limited to the description of these examples. For those skilled in the art to which the invention pertains, several simple deductions and changes can be made without departing from the inventive concept, and all should be considered as falling within the protection scope of the invention.

Claims (6)

CN202111147919.XA2021-09-292021-09-29Software copyright protection system and method based on Ubuntu operating systemActiveCN113821775B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202111147919.XACN113821775B (en)2021-09-292021-09-29Software copyright protection system and method based on Ubuntu operating system

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202111147919.XACN113821775B (en)2021-09-292021-09-29Software copyright protection system and method based on Ubuntu operating system

Publications (2)

Publication NumberPublication Date
CN113821775A CN113821775A (en)2021-12-21
CN113821775Btrue CN113821775B (en)2022-04-08

Family

ID=78915823

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202111147919.XAActiveCN113821775B (en)2021-09-292021-09-29Software copyright protection system and method based on Ubuntu operating system

Country Status (1)

CountryLink
CN (1)CN113821775B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102456111A (en)*2011-07-122012-05-16中标软件有限公司Method and system for controlling permission of Linux operating system
CN103077345A (en)*2012-12-272013-05-01深信服网络科技(深圳)有限公司Software authorization method and system based on virtual machine
CN109902490A (en)*2019-02-222019-06-18北京易讯通信息技术股份有限公司A kind of anti-tamper application method of file system of linux kernel rank

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8646098B2 (en)*2009-06-252014-02-04Flexera Software LlcMethod and system for software licensing under machine virtualization
CN106228078A (en)*2016-07-292016-12-14浪潮电子信息产业股份有限公司Safe operation method based on enhanced ROST under Linux
CN111831976A (en)*2020-06-052020-10-27郑州信大捷安信息技术股份有限公司Linux operating system-based copyright protection method and equipment
CN111966470B (en)*2020-09-082023-11-14支付宝(杭州)信息技术有限公司Loading method and device of virtual machine monitor and electronic equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102456111A (en)*2011-07-122012-05-16中标软件有限公司Method and system for controlling permission of Linux operating system
CN103077345A (en)*2012-12-272013-05-01深信服网络科技(深圳)有限公司Software authorization method and system based on virtual machine
CN109902490A (en)*2019-02-222019-06-18北京易讯通信息技术股份有限公司A kind of anti-tamper application method of file system of linux kernel rank

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《基于PKI的软件版权保护系统的设计与实现》;赵盛;《中国优秀博硕士学位论文全文数据库(硕士)信息科技辑》;20041215(第04期);全文*

Also Published As

Publication numberPublication date
CN113821775A (en)2021-12-21

Similar Documents

PublicationPublication DateTitle
US12282549B2 (en)Methods and apparatus for malware threat research
US8458673B2 (en)Computer-implemented method and system for binding digital rights management executable code to a software application
EP1443381B1 (en)System and method for secure software activation with volume licenses
JP4794217B2 (en) Method and system for single reactivation of software product licenses
US20150212842A1 (en)On-demand disposable virtual work system
US7890756B2 (en)Verification system and method for accessing resources in a computing environment
EP2754079B1 (en)Malware risk scanner
CN101414329B (en)Delete just in the method for operating virus
US11176224B2 (en)Security tool
CN113821775B (en)Software copyright protection system and method based on Ubuntu operating system
CN114510714A (en) A testing method and system for Kysec security mechanism
Miller et al.Playing inside the black box: Using dynamic instrumentation to create security holes
IglioTrustedbox: a kernel-level integrity checker
CN109753769B (en)Software authorization method and system based on block chain
CN111222122A (en)Application authority management method and device and embedded equipment
CiscoCisco Intrusion Detection System Host Sensor Quick Start
CN115879070A (en)Security reinforcement method and device, storage medium and backup server
CN113407166A (en)Safe and controllable agile software development method under controlled network environment
CN115879106A (en)Method and device for managing and controlling mobile storage equipment
CN120470603A (en) Database trial authorization management methods, equipment, media and products
CN112784223A (en)Application program protection method, device, medium and user behavior control method
WO2006021132A1 (en)Method for protecting the computer data
CN119621172A (en) A method and device for preventing data leakage by using execution permissions of enterprise browser plug-ins
Brunette et al.Securing Sun Linux Systems: Part I, Local Access and File Systems
HK1127418A (en)Method for deleting on-running virus

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp