A software authorization license implementing method and apparatus

A software authorization and implementation method technology, applied in computer security devices, program code conversion, instruments, etc., can solve problems such as unusable software, inability to connect the client to the server, failure to start the server, etc., to avoid reuse of license , to achieve security control, increase the effect of difficulty

Active Publication Date: 2019-01-29
WUHAN DAMENG DATABASE
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Specifically: the software is divided into two parts: the client and the server. When the server starts, it needs to obtain the information bound by the license to match the local information of the terminal. If the match is successful, the server starts successfully, and the client successfully connects to the server. The software Normal use; if the matching is unsuccessful, the server will fail to start, the client cannot connect to the server, and the software cannot be used
However, the license analysis module is developed in java language, and java class files are easy to be decompiled, and stealers can easily obtain license file information by decompiling class files, so that the security protection of license files cannot be effectively guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A software authorization license implementing method and apparatus
  • A software authorization license implementing method and apparatus
  • A software authorization license implementing method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] The embodiment of the present invention provides a method for implementing software authorization. First, when the software is packaged as an installation file, the license analysis module is encrypted by the license encryption module, and the license file itself is encrypted during the license production process. The encryption algorithm Both are DES algorithms; the difficulty of directly decompiling java class files is increased through double encryption, and a certain degree of security control over license files is achieved. Second, when making a license, bind terminal-related information to the license. The terminal is the end that runs the software, that is, the user side that buys the license. The terminal can be a server or a PC, and the end that sells the license is recorded as the remote server.

[0050] In the embodiment of the present invention, the terminal-related information includes product type, product version, operating system, expiration date, and ph...

Embodiment 2

[0078] On the basis of the above-mentioned embodiment 1, the embodiment of the present invention also provides a system for implementing a software authorization license, which is used to implement the method for implementing a software authorization license described in Embodiment 1, such as image 3 As shown, the system includes:

[0079] The license parsing module 1 is used to read the information of the license file.

[0080] The license encryption module 2 is used to encrypt the license analysis module 1 during the software production process, and the encryption algorithm is the DES algorithm.

[0081] The information binding module 3 is used to bind the license and terminal related information when making a license; in the embodiment of the present invention, the terminal related information includes product type, product version, operating system, expiration date and physical network card address, Bind the above information separately when making the license. On the b...

Embodiment 3

[0092] On the basis of the software authorization implementation method provided in Embodiment 1 and the software authorization implementation system provided in Embodiment 2, the present invention also provides a software authorization implementation device, which can be used to implement the software authorization license implementation described in the embodiment. The software authorization license implements the functions of the terminal described in the method. Such as Figure 5 As shown in FIG. 2 , it is a schematic diagram of the architecture of the device for implementing software authorization in the embodiment of the present invention. The apparatus for implementing software authorization in this embodiment includes one or more processors 21 and memory 22 . in, Figure 5 A processor 21 is taken as an example.

[0093] The processor 21 and the memory 22 may be connected via a bus or in other ways, Figure 5 Take connection via bus as an example.

[0094] The memory...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of software authorization, in particular to a software authorization license implementing method and device. When the software is encapsulated as an installation file, the license analysis module and the license file themselves are double encrypted. When making a license, terminal-related information is bound to the license; the method comprises the following steps: before the software starts and enters the normal service loading, decrypting the license parsing module and the license file itself; read the license file by using the decrypted licenseparsing module, and then obtain the terminal-related information of license binding; the terminal-related information bound by license is matched with the relevant information local to the terminal. If it matches, the service of the software is loaded successfully. In a software licensing implementation method and apparatus provided by the present invention. The license encryption module is used to encrypt the license parsing module, and the license file is encrypted at the same time. The difficulty of directly decompiling the java class file is increased by double encryption, and the securitycontrol of the license file is realized to some extent.

Description

【Technical field】 [0001] The invention relates to the technical field of software authorization, in particular to a method and device for realizing software authorization. 【Background technique】 [0002] In today's era of rapid development of the Internet and big data applications, software products have become the core tools in the computer field. In the world of dazzling software products, software protection ideas have gradually attracted the attention of software publishers. The full implementation of software protection is conducive to the development of the software industry. Healthy development is conducive to promoting informatization construction. [0003] At present, a commonly used method for software protection is the license binding method. When making software, the license is bound to terminal information. When the software is started, the license information is obtained through the license analysis module for matching verification. Specifically: the software ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/14G06F21/60G06F21/62G06F8/53
CPCG06F8/53G06F21/121G06F21/14G06F21/602G06F21/6209G06F2221/2107
Inventor 付晨玺付铨梅纲
Owner WUHAN DAMENG DATABASE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products