Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software authentication method and system

An authentication method and software technology, applied in the direction of instruments, electrical digital data processing, computer security devices, etc., can solve the problems of loss of commercial software sellers, prolonging the validity period of commercial software, etc., and achieve good user experience, low cost, and high-efficiency software The effect of certification

Inactive Publication Date: 2012-11-14
SUZHOU CODYY NETWORK SCI & TECH
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, when a commercial software runs on a closed server, the user can modify the server time and other related system parameters to achieve the purpose of extending the validity period of the commercial software, which will cause losses to commercial software sellers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software authentication method and system
  • Software authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0011] figure 1 Shown is a flow chart of the software authentication method provided according to the preferred embodiment of the present invention. Such as figure 1 As shown, the software authentication method provided by the preferred embodiment of the present invention includes steps 101-102.

[0012] In step 101, an initial date and an expiry date of the software are set in the software, wherein the validity period of the software is from the initial date to the expiry date. Specifically, when the software producer compiles the software on the software setting client, he sets the initial date and the expiration date in the software, encrypts the initial date and the expiration date, generates ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a software authentication method and system. The method comprises the following steps of: setting an initial date and a deadline date of software in the software, wherein a utilization validity period range of the software ranges from the initial date to the deadline date; after the software is mounted on a server, recording utilization time of the software by starting an internally-arranged clock through the software when the software is operated by the server; dynamically adjusting the utilization validity period range of the software according to the utilization time; and comparing the current time of the system with the adjusted utilization validity period range to authenticate whether the utilization of the software exceeds the time limit or not.

Description

technical field [0001] The invention belongs to the field of software protection, in particular to a software authentication method and system. Background technique [0002] In commercial software, it is usually necessary to determine the usage time of the software used by the user, so as to charge according to the usage time or provide a free trial period for a certain period of time. However, at present, based on security considerations, users not only allow the software to run on the Internet, but also allow the software to run on an independent local area network. In this way, when a commercial software runs on a closed server, the user can modify the server time and other related system parameters to achieve the purpose of extending the validity period of the commercial software, which will cause losses to the commercial software seller. Contents of the invention [0003] The present invention provides a software authentication method and system to solve the above pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00
Inventor 胡加明
Owner SUZHOU CODYY NETWORK SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products