发明名称 Computing device and method for protecting software of the computing device
摘要 In a method for protecting software of a computing device, a hypertext preprocessor (PHP) software program of the computing device is encrypted using an encryption rule to obtain an encrypted file. When the encrypted file needs to be decrypted, the method determines whether a predetermined hardware lock is connected to the computing device. When the predetermined hardware lock is not connected to the computing device, the method displays a prompt that indicates the predetermined hardware lock is not connected to the computing device. When the predetermined hardware lock is connected to the computing device, the method decrypts the encrypted file with a decryption rule corresponding to the encryption rule.
申请公布号 US9003184(B2) 申请公布日期 2015.04.07
申请号 US201313860297 申请日期 2013.04.10
申请人 Hon Hai Precision Industry Co., Ltd. 发明人 Chiu Chui-Wen;Liang Chen-Liang
分类号 G06F21/00;G06F21/62;G06F21/10 主分类号 G06F21/00
代理机构 Novak Druce Connolly Bove + Quigg LLP 代理人 Novak Druce Connolly Bove + Quigg LLP
主权项 1. A computerized-method for protecting software of a computing device, the method comprising: encrypting a hypertext preprocessor (PHP) software program of the computing device using an encryption rule to obtain an encrypted file; generating a decryption rule corresponding to the encryption rule to decrypt the encrypted file; storing the decryption rule corresponding to the encryption rule to a storage system of the computing device; determining whether a predetermined hardware lock is connected to the computing device when the encrypted file is decrypted; displaying a prompt that indicates the predetermined hardware lock is not connected to the computing device when the predetermined hardware lock is not connected to the computing device; searching the decryption rule corresponding to the encryption rule from the storage system when the predetermined hardware lock is connected to the computing device; and decrypting the encrypted file with the decryption rule corresponding to the encryption rule; wherein the encrypted file comprises the encrypted PHP software program, a hardware identification number of the predetermined hardware lock, and a software identification code of the PHP software program.
地址 New Taipei TW