Software authorization method

A technology of software authorization and software, applied in the direction of program/content distribution protection, etc., can solve the problems of low production efficiency of software production line programs and the inability to solve multiple software software authorization problems at one time

Inactive Publication Date: 2017-06-20
湖南长城银河科技有限公司
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the existing software authorization methods cannot solve the problem of software authorization for multiple software copies at one time, resulting in low production efficiency of some software (such as production line programs)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software authorization method
  • Software authorization method
  • Software authorization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0040] As mentioned in the background technology section, for some software, specifically the production line program as an example, its authorization protection should not only protect the software copyright of the software developer, but also not affect the production efficiency of the production line process. Therefore, it is necessary to solve the authorization protection problem of the production line program in the stage of mastering, and only verify the validity of the production line program in the use stage of the production line program. The idea of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a software authorization method. Software is activated through a password when being used for the first time, a license file is generated after software activation succeeds, and the valid period or residual effective day number of the software is recorded in the license file; in the valid period or when the residual effective day number is greater than 0, all the copies of successively activated software can be started run normally in an activation-free mode; after the valid period or when the residual effective day number is equal to 0, the software is needed to be activated. By adopting the technical scheme, the valid period of the software is prolonged through the password at a mother disk manufacturing stage, the valid period or residual effective day number of the software is limited through the license file at a software testing stage, authorization protection of the software is achieved, and the production efficiency of the software is also not affected. The method especially adapts to the production characteristic of the production line testing process based on general software authorization protection, and it is achieved that activation-free running of any copy can be achieved in the valid period after primary activation.

Description

technical field [0001] The present invention relates to the field of computer software, more specifically, to a software authorization method, especially to an authorization method suitable for production line programs. Background technique [0002] With the development of computer technology, there are more and more types of computer software, and the functions are more and more powerful. In order to protect the software developed by themselves, they can only be used normally under the premise of authorization, and usually use stand-alone authentication, hardware binding or network activation to authorize. [0003] Specifically, stand-alone authentication means that the user is required to enter the correct user password when using it for the first time. The user password is related to the user name. As long as the user keeps the purchased user name and user password, the software can be used without restriction. Hardware binding means that when using it for the first time...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12
CPCG06F21/12
Inventor 顾剑水超曾喜芳张玉芬彭爽崔美
Owner 湖南长城银河科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products