Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software Product Security Verification System

A software product and security verification technology, applied in transmission systems, electrical components, etc., can solve the problems of inconvenient centralized management, low security, and inconvenient distributed deployment and authorization of product verification procedures and applications, and achieves a high level of verification methods. , high security, unified verification method

Active Publication Date: 2017-12-12
重庆森鑫炬科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] 1) Product verification programs and applications are not convenient for distributed deployment and authorization;
[0010] 2) When multiple products are authorized, they need to be registered or authorized separately, which is not convenient for centralized management;
[0011] 3) Some products have low security and only verify whether they are registered or authorized. Once it is determined that the authorization has been authorized, other business processes can be performed without restriction. Therefore, some tracking and debugging programs can bypass the judgment link through the Jump command and bypass the software product verification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software Product Security Verification System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Below in conjunction with accompanying drawing and embodiment the present invention will be further described:

[0024] like figure 1 As shown, a software product security verification system is characterized by including a product verification center 1, a software registration center 2, a product verification component 3, a client verification control 4 and a license issuance center 5.

[0025] The product verification center 1 is used to provide specific implementations of the software registration center 2, product verification component 3, client verification control 4 and client verification request, and runs as a Windows service.

[0026] The software registration center 2 is used to provide acquisition of customer server hardware fingerprint information, registration of authorized licenses, authorized product status inquiry, review of client registration applications and certificate issuance, client authorization cancellation, and client online security authentic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security verification system for a software product, and belongs to the field of verification of the software products. The system comprises a product verification center, a software registration center, a product verification assembly, a client verification control and a permission issuing center. The system is extremely high in security, extremely high in expansibility, and highly consistent in verification modes, allows centralized or distributive deployment, and is separated from the development of the software product, and therefore, the product development can be focused.

Description

technical field [0001] The invention belongs to the field of software product verification, in particular to a software product safety verification system. Background technique [0002] At present, software products on the market more or less protect the security of their own products to prevent unauthorized use such as piracy and decompilation, reduce the risk of software product piracy, and improve the company's core competitiveness and economic benefits. [0003] Most of these software adopt soft protection technology, and currently there are roughly the following types: [0004] 1) In the early stage, the easiest way is to limit the use of products by date, and update customers with the latest product protection components before the expiration date. Non-customers will encounter obstacles or cannot continue to use the components because they cannot update the components in time. [0005] 2) A certain algorithm is added to the software product, and the algorithm is compa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0823H04L63/0861
Inventor 税诗成
Owner 重庆森鑫炬科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products