Software authorization control method

A control method and software authorization technology, applied in the direction of electrical components, program/content distribution protection, instruments, etc., can solve problems such as misappropriation of company copyrights

Active Publication Date: 2014-04-23
G CLOUD TECH
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because after a company purchases a piece of software, if it can be sold to other users, it will cause direct theft of the company's copyright

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software authorization control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] As shown in the figure, the present invention deploys a monitoring system that can be accessed from the external network; when deploying an application platform, it is necessary to configure the external network access IP for the server of the platform. When the platform is started, it sends the platform server’s MAC address, external network IP address, and internal network IP address to the monitoring platform through the interface; the monitoring platform generates a certain Record made es. The platform can connect with the monitoring system every day through the timer, and send the internal IP, external IP and MAC address of the server to the monitoring platform. The monitoring platform can obtain the es record based on the internal IP and MAC address, and then Access the registration interface of the platform through the external network IP, and send the registration information to the platform. The platform can judge whether the software has been registered by an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of software development, in particular to a software authorization control method. Operating platforms of other servers are monitored by deploying a monitoring system. When the platforms are firstly started, internal network IP (internet protocol), external network IP and MAC (media access control) addresses of the servers with the platforms are transmitted to a monitoring platform. When the monitoring platform acquires server information of the servers, an authentication code is generated through IP addresses, the external network IP, the MAC addresses and a temporal timestamp and stored in the monitoring system, and the platforms are marked unregistered until the platforms are registered. By the method, registration information is generated according to the internal network IP, the external network IP and the MAC addresses of the servers and the timestamp of the monitoring platform, users can be effectively prevented from obtaining software registration by the aid of fake server information, a software system is prevented from being embezzled, and the method can be used for software authorization control.

Description

technical field [0001] The invention relates to the technical field of software development, in particular to a software authorization control method. Background technique [0002] At present, in the research and development process of the computer software platform, after a set of software is successfully developed, it will be sold to users. How to protect software copyright and company interests has become a major issue for software companies. Because after a company purchases a piece of software, if it can be sold to other users, it will cause direct theft of the company's copyright. Contents of the invention [0003] The technical problem solved by the invention is to provide a method for software authorization and control. [0004] The technical scheme that the present invention solves the problems of the technologies described above is: [0005] First deploy a monitoring system that can be accessed from the external network; when deploying an application platform,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12H04L29/08
CPCG06F21/121H04L67/025
Inventor 关班记曾崇海张宗仁季统凯
Owner G CLOUD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products