Software protecting method and software sale method based on same

A technology of software protection and software, applied in the direction of program/content distribution protection, marketing, instruments, etc., can solve the problems of parallel imports hitting the market, waste, unusable, etc., to achieve flexible sales of software, improve security, and maximize benefits Effect

Inactive Publication Date: 2012-08-22
北京亚美科软件有限公司
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the software sales method is mainly customized by operators and centralized procurement. Due to the differences in the market prices of these different customizations, some illegal users upgrade different customized software versions to carry out cross-selling sales and illegally make profits.
The same application software is sold in different language versions in different regions, such as English version, Chinese version, etc. There are price differences between these versions. In addition, the prices of the same application software sold to different price machines are also different, which has led to some illegal businessmen Or users make profits by illegally upgrading the version, causing different operators to resell application software for price difference, and a large number of parallel imports hit the market, which greatly affects the interests of developers
Since different users have different needs for software functions, if the developer develops software with different software functions, it will increase the research and development costs. If the developer sells the software with full functions to users at a lower price, the research and development costs cannot be recovered; For users, it is bound to be a waste to buy a set of software with complete functions at a higher price, but they do not use some functions.
It can be seen that the sales methods of existing application software can no longer meet the needs of the market

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software protecting method and software sale method based on same
  • Software protecting method and software sale method based on same
  • Software protecting method and software sale method based on same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The software protection method of the present invention is described in detail below with the RIP software of ink-jet printer, and developer is when developing software, and the function of software is divided into basic function and special function, to basic function and special function encryption protection respectively, simultaneously to software The startup encryption of the software, the software starts using the hardware encryption method, such as a dongle, and the activation of the software function uses the software encryption method, such as the registration code (software serial number). When selling software, the developer will distribute the dongle containing the developer’s company ID and dongle ID to the user together with the RIP software; each set of RIP software corresponds to a dongle, and when the user gets the RIP software, install the RIP software on the computer At the same time, plug the encryption lock into the parallel interface, serial interfa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a software protecting method, which is specially characterized in that: functional decomposition is carried out on application software by a developer; the application software consists of a basic function and a plurality of special functions and is started by using an encrypted lock; the software is activated by adding a main registration code after the software is started; the activated software only has the basic function; the special functions of the software are at a non-activated state; the special functions are activated by adding a secondary registration code; and one special function corresponds to one secondary registration code. The invention provides the software protecting method which combines a hardware encryption method and a software encryption method. The functional decomposition of the software is carried out in a manner of activating through a plurality of registration codes by using an encryption lock and the registration codes which are in a combined manner, so that the difficulty of resolving the software is increased. The developer sells the application software with complete functions in a non-activated state to a user, and charges using fees of the user by controlling the quantity of the activated functions of the software and a time period of activating the software, so that the benefits of the developer and the user can be maximized.

Description

technical field [0001] The present invention relates to the field of software protection, in particular to a software protection method for encrypting software programs to prevent piracy and a software sales method based on the method, in particular to an inkjet printer RIP software protection method and a method based on the method Implemented RIP software sales method. Background technique [0002] With the rapid development of automation technology, software programs play an increasingly important role in the new product development process. However, software products are easily pirated, which greatly affects the legitimate rights and interests of developers. How to effectively protect their own software technology from plagiarism has gradually become the research focus of various software development companies. There are many software anti-piracy technologies, methods and products in the prior art, which are generally divided into two types: hardware (such as dongle) a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06Q30/02G06F21/12
Inventor 张原
Owner 北京亚美科软件有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products