Software copyright protection method based on asymmetric public key password system
A public key cryptography and copyright protection technology, applied in the direction of program/content distribution protection, user identity/authority verification, etc., can solve problems such as difficult to protect software and correctly identify identities, easy to pirate, easy to crack, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0055] Such as figure 1 As shown, the method is roughly divided into two stages. Phase I is mainly the state change of the installation package before the software is deployed to the client, and Phase II is mainly the state change of the key files specified in the protection policy formulated by the software manufacturer after the software is deployed to the client. Wherein, file 1, file 2, ..., file n are n files after the installation package is deployed.
[0056] Phase I: Deployment
[0057] In the first stage, the software manufacturer completes the production of the software in terms of logical functions and enters the release state. If the user wants to use the software, he must know the situation of the software through the use of the platform (such as the number of times that can be used without purchasing, the time that can be used, and the functions that can be used, etc.). Once the user has made a corresponding selection (or decision), the server can be notified ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 