Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for protecting software authorization

A software authorization, software technology, applied in the direction of program/content distribution protection, digital data authentication, instruments, etc., can solve problems such as negative impact

Inactive Publication Date: 2013-09-18
WISTRON CORP
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, it will definitely have a great negative impact on the programmers who work hard to develop application software

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting software authorization
  • Method and system for protecting software authorization
  • Method and system for protecting software authorization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Please refer to figure 1 , figure 1 It is a schematic diagram of a computer system 10 that can protect a software license according to the present invention. Such as figure 1 As shown, the computer system 10 includes a CPU 100 , a timer 102 , a storage device 104 and an output module 106 . The timer 102 is used to generate a system time, and the system time is synchronized with the GMT in different regions, and correspondingly input to the CPU 100 . The storage device 104 correspondingly stores at least one software SF and one program code CE according to different requirements of users. The program code CE is used to instruct the central processing unit 100 to execute various operations of the computer system 10, which includes a software authorization process for executing the protection software SF, as for the software SF, a timeout detection process is performed under the protection of the software authorization process, and The operations of the software SF and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method and a system for protecting a software authorization. The method for protecting a software authorization comprises a software including a plurality of functions. When the software is installed in a hardware device, he method includes setting an authorized time, an accumulated authorization time, an accumulated running time and a last recorded time when the software is initially installed in the hardware device, operating a time-out check for determining whether the software authorization is expired or not according to the system time, the authorized time, the accumulated authorization time, the accumulated running time and the last recorded time generated by the hardware device when the software is initiated or the plurality of functions are initiated or terminated, and stopping the software from running in the hardware device when the software authorization is expired.

Description

technical field [0001] The present invention relates to a method and system for protecting a software authorization, in particular to a method and system for protecting a software authorization by using multiple parameters and an overtime detection. Background technique [0002] With the development of information, different types of application software have been developed rapidly to meet different needs of users or system equipment. At the same time, with the rapid upgrade of hardware equipment, or the application software is updated with additional functions from time to time, users can It is expected that new versions of application software on the market will continue to be introduced, and must be equipped with an anti-cracking key to authorize users to legally use the application software, thereby protecting the intellectual property rights of the application software. However, in the process of replacing the old and replacing the old with the new, in addition to purch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/30
CPCG06F21/121
Inventor 黄启洲
Owner WISTRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products