Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software protecting, authorizing and registering method

A technology for software protection and authorization information, applied in the computer field, it can solve problems such as insufficient security, dependence on hardware devices and operating systems, and achieve the effects of preventing piracy, efficient and low-cost software distribution and delivery, and avoiding business losses.

Active Publication Date: 2015-06-10
航天信息软件技术有限公司
View PDF7 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The advantage is safety, and the disadvantage is the dependence on hardware devices and operating systems, and additional production, initialization, logistics, installation and maintenance costs
[0005] Soft encryption has no hardware on the client side, which can realize the electronic distribution of software, saving a lot of software protection and distribution costs for developers. The disadvantage is that the security is not high enough. Some popular soft encryption tools and manufacturers in the market basically have corresponding keygen crack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software protecting, authorizing and registering method
  • Software protecting, authorizing and registering method
  • Software protecting, authorizing and registering method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0025] figure 1 It is a flowchart of a method for software protection, authorization and registration according to an embodiment of the present invention; as shown in the figure, the method includes the following steps:

[0026] S110, receiving and verifying the verification information sent by the user during registration;

[0027] Wherein, the verification information may include product serial number, CDKEY (product password) and verification code.

[002...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a software protecting, authorizing and registering method. The software protecting, authorizing and registering method comprises the following steps: receiving verification information sent out during user registration and verifying; if the verification is successful, obtaining client key information and hardware feature codes of a user; carrying out integrated coding in accordance with custom arithmetic and according to the client key information and the hardware feature codes, product ID, product authorization and MD5 check codes, generating authorization information by obtained codes through asymmetric cryptographic algorithm and sending the authorization information to a corresponding user side. The method provided by the invention can protect product intellectual property, limit unauthorized use of software products, can effectively prevent piracy and avoid business loss, further can support rich and flexible authorized packaging and pricing mechanisms, can achieve high efficiency and low cost software distributing and delivering, and further can be used for comprehensive analysis to software product selling, marketing and customer conditions.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a method for software protection, authorization and registration. Background technique [0002] For software suppliers, if they want to develop their business quickly in the increasingly severe competition, they need an effective means to protect market revenue and core technology to ensure their own competitive advantages. At the same time, they also need to use flexible software licensing and delivery models to obtain Highest market profit and customer satisfaction. Allow customers to pay according to their own needs, and which functions and product features they really need can be purchased. At the same time, it can convert potential trial customers into new customers. [0003] Common software protection technologies are mainly divided into two categories: hard encryption and soft encryption. [0004] Hard encryption technology, that is, dongle or dongle. The advantage i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/12
Inventor 李南熹李长山
Owner 航天信息软件技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products