Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing software authorization by using dual power supply system device independent of host computer in real time

A software authorization and power supply system technology, applied in computer security devices, electrical digital data processing, instruments, etc., can solve problems that cannot be solved fundamentally, wrong time information of software protection devices, and inability to obtain software usage time, etc. Achieve the effect of timely and reliable system time

Inactive Publication Date: 2012-04-04
邹芬
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method brings the following problems: first, when the user modifies the time of the host computer, the software protection device will obtain wrong time information; secondly, when the software protection device is powered off, it will not be possible to obtain the actual use of the software. time
To sum up, the existing solutions for limiting software use time have more or less problems in terms of reliability, and cannot fundamentally solve the problem in the actual application process, which ultimately affects the use effect and scope

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing software authorization by using dual power supply system device independent of host computer in real time
  • Method for realizing software authorization by using dual power supply system device independent of host computer in real time
  • Method for realizing software authorization by using dual power supply system device independent of host computer in real time

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail by giving examples below.

[0030] figure 1 It is a schematic structural diagram of the software authorization device of the present invention, such as figure 1 As shown, the software authorization device (101) involved in the present invention includes an access controller (102), a clock module (104), a power supply module (105), and a built-in power supply system (106). in:

[0031] The access controller (102) includes an access control module (103) for realizing the dialogue between the PC client and the software protection device: specifically: parsing the instructions from the PC client, and realizing the software developer setting the permission for the software to be accessed .

[0032] The clock module (104), which is the timing function of the software authorization device, keeps timing continuously, and t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of computer information safety, in particular to a method for realizing software authorization by using a dual power supply system device independent of a host computer in real time. In the method, the utilization of software is controlled by controlling an access control module in a software protection device. The method specifically comprises the steps of: making the clock information in a software authorization device independent of the clock information of a host computer, further, and comparing the actual access time of a user with the allowable access time preset by a developer by the software authorization device to judge whether the user is a legal user; then, when the software authorization device is inserted into the host computer through a USB (Universal Serial Bus) port, automatically switching the software authorization device to be powered by the host computer; and when the software authorization device is pulled out from the host computer through the USB port, supplying power to the software authorization device through the built-in power supply system of the software authorization device. The method disclosed by the invention does not depend on external system time, so that the software security problem brought by modification of the host computer clock of the user can be completely solved; due to the dual power supply system, the service life of the software authorization device is prolonged, the legal rights of the software developers are protected to a greater extent, and a solution with stronger practicability is provided for software protection.

Description

technical field [0001] The invention relates to the field of software protection, in particular to a method and system for limiting software use time, which provides a highly practical protection scheme for the software industry. Background technique [0002] With the development of the economy, software as an auxiliary tool has penetrated into all walks of life; further, flexible software distribution methods have become a powerful tool to promote software sales, and are increasingly favored by software developers. Among them, software trials, For distribution methods such as software lease and installment payment, how to control the use time of software has become an important technical requirement. Among the many software protection product strategies that software developers have, most of them adopt the following method: use a timer to accumulate the actual use time of the software, and calibrate it with the time of the host computer to obtain the total use time length....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F21/12
Inventor 邹芬
Owner 邹芬
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products