Software authorization method and system, software terminal and software management party

A software authorization and software management technology, applied in the computer field, can solve problems such as single function and inability to improve the flexibility of software authorization management

Active Publication Date: 2015-12-16
INSPUR COMMON SOFTWARE
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that the current software authorization method has a single function and cannot improve the flexibility of software authorization management.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software authorization method and system, software terminal and software management party
  • Software authorization method and system, software terminal and software management party
  • Software authorization method and system, software terminal and software management party

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0101] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0102] An embodiment of the present invention proposes a software authorization method, which is applied to a software terminal, see figure 1 , the method includes:

[0103] Step 101: Save the first public key and the second private key in the software terminal.

[0104] Step 102: the software terminal collects current user information.

[0105] Step 103: The software terminal encrypts the user information with the first public key to generate a softw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a software authorization method and system, a software terminal and a software management party. The software authorization method is applied to the software terminal and comprises: storing a first public key and a second private key; collecting current user information; utilizing the first public key to encrypt the user information, and generating a software authorization application code; sending the software authorization application code to the software management party; receiving an activation code from the software management party and utilizing the second private key to decrypt the activation code; analyzing the decrypted activation code and obtaining a software authorization use policy corresponding to the current user from the activation code; and according to the obtained software authorization use policy, performing software initialization. According to the scheme, the flexibility of software authorization management can be improved.

Description

technical field [0001] The invention relates to computer technology, in particular to a software authorization method and system, a software terminal and a software management party. Background technique [0002] With the development of computer technology, there are more and more types of computer software, and the functions are more and more powerful. On a computer, after the software product is installed, the software needs to be authorized by the software management party when logging in or upgrading for the first time. After the authorization is successful, the software can run normally on the computer to complete the corresponding software functions. [0003] The current software authorization method includes: the software installation terminal sends an authorization request to the software management party; the software management party authenticates the software installation terminal, and returns the authorization information to the software installation terminal aft...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12
CPCG06F21/12
Inventor 曹雪韬刘振印
Owner INSPUR COMMON SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products