1. Technical Field
The present disclosure relates to software protection, and particularly to an electronic device and a software protecting system applied in the electronic device for protecting genuine software installed in the electronic device.
2. Description of Related Art
Trial software may be provided to users to give potential users the opportunity to try the program for a limited time and usage. However, if the trial software is fully functional, users may think that there is no need to buy a genuine software, and if the trial software is too limited in function, users cannot fully appreciate and recognize the software.
Therefore, what is needed is a software protecting system to make users fully aware of all the functions of genuine software and protect the genuine software being actually used by the user when the genuine software is in a trial period, to solve the above-mentioned problem.
Many aspects of the present disclosure should be better understood with reference to the following drawings. The components in the drawing are not necessarily drawn to scale, the emphasis instead being placed upon clearly illustrating the principles of the present device. Moreover, in the drawing, like reference numerals designate corresponding components throughout the views.
Embodiments of the present disclosure are described with reference to the accompanying drawings.
In this embodiment, the electronic device 100 includes a storage unit 10 and a processing unit 20. The storage unit 10 can be a smart media card, a secure digital card, or a flash card. The processing unit 20 can be, but is not limited to being, a central processing unit, a single chip, or a digital signal processor.
The storage unit 10 stores the genuine software 400. The software protecting system 300 includes a number of modules, which are a collection of software instructions executed by the processing unit 20.
Referring to
The invoking module 31 invokes the genuine software 400 according to a preset invoking request, in response to user input. In this embodiment, the invoked genuine software 400 is within a trial period and cannot be directly run by the electronic device 100.
The application environment setting module 32 sets environment parameters, which support the running of the genuine software 400, according to a hardware configuration of the electronic device 100. In this embodiment, the environment parameters include memory size, operation frequency of the central processing unit, driver size, and the like. For example, if the supporting memory to support the running of genuine software 400 to run is required to be 2 gigabytes (GB), but the actual memory size of the electronic device 100 is 1GB, the application environment setting module 32 sets a virtual memory of 2GB as the environment parameter to support the running of genuine software 400.
The input/output setting module 33 sets input/output functions of the genuine software 400 when the genuine software 400 is in a running state. In detail, the input/output setting module 33 set the input/output functions as preventing users from inputting parameters to a parameter input area of the genuine software 400, the parameters being inputted to the parameter input area are only the default parameters set by the input/output setting module 33 itself, and a printing and saving functions of the genuine software 400 may be set as enabled or disabled. The input/output setting module 33 may also set the input/output function as allowing users to input some parameters to the parameter input area but, for example, preventing the printing and saving functions when the genuine software 400 is in a running state. In this embodiment, the input/output setting module 33 inputs default parameters to the parameter input area by setting the parameter input area as a non-editable area, and when the input/output setting module 33 determines that the non-editable area has been clicked by the user, the input/output setting module 33 automatically loads the default parameters into the parameter input area.
When the genuine software 400 is run by the software protecting system 300, the user either cannot input any parameters at all to the parameter input area, or the user cannot input parameters to parameter input area and cannot print and save any result of data processing which is generated from the default parameters set by the input/output setting module 33. or the user can input certain parameters to the parameter input area, but cannot print and save any result of data processing which is generated from the user input parameters.
The control module 34 detects whether a software crack exists on the computer or not, and deletes one or more installation files of the genuine software 400 to prevent the running of the genuine software 400 if a software crack is detected by the control module 34. In this embodiment, the control module 34 may also determine that a software crack exists if the software protecting system 300 is frequently started and closed down by the user.
The control module 34 further deletes one or more installation files of the genuine software 400 to prevent the running of the genuine software 400 if the number of times that the genuine software 400 has been invoked by the software protecting system 300 reaches a predetermined value, or the time period for starting and running the genuine software 400 expires.
The control module 34 prompts the user to input registration information of the genuine software 400 when the genuine software 400 is invoked by the invoking module 31, and if the user inputs the registration information of the genuine software 400, the control module 34 adds the inputted registration information to the genuine software 400. The use-limitations of the input/output function are then removed, and the user can directly use the genuine software 400 in full and the software protecting system 300 is not required.
The software protecting system 300 in the present disclosure makes the user fully appreciate all the functions of genuine software 400 and protects the genuine software 400 from being misused when the genuine software 400 is in the trial period.
Although the present disclosure has been specifically described on the basis of exemplary embodiments thereof, the disclosure is not to be construed as being limited thereto. Various changes or modifications may be made to the embodiments without departing from the scope and spirit of the disclosure.
| Number | Date | Country | Kind |
|---|---|---|---|
| 2013101985754 | May 2013 | CN | national |