Unlock instant, AI-driven research and patent intelligence for your innovation.

Stand-alone software verification method

A software verification, stand-alone technology, applied in computer security devices, program/content distribution protection, instruments, etc., can solve the problems of multiple registrations, cannot guarantee unique installation, affect the interests of developers, etc., to achieve the effect of protecting interests

Pending Publication Date: 2019-08-09
NANJING AOTO ELECTRONICS CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Software with verification codes cannot be guaranteed to be uniquely installed when not connected to the Internet, and may be registered multiple times or used for profit.
Affect the interests of developers
[0004] Software that does not have a verification code and needs to be verified online cannot be used without a network, and the user must be very painful

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Stand-alone software verification method
  • Stand-alone software verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The present invention will be further described in detail below in conjunction with the drawings and specific embodiments.

[0015] Such as figure 1 , figure 2 Shown are the verification code generation method and verification method of the stand-alone software verification method of the embodiment of the present invention.

[0016] First of all, the generation method, as the name suggests, is a method of generating a serial number based on hardware information. The collected hardware information can be easily obtained through the existing technology. The order of obfuscation depends on the person using this method, which is equivalent to a first-level password. The DES encryption method will add a password again, which is equivalent to secondary encryption. The final MD5 encryption method is currently a very reliable encryption method, which is equivalent to three-level encryption. Therefore, the generated serial number is almost impossible to be cracked without knowin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a stand-alone software verification method. When software is installed, information which cannot be modified by a computer such as a CPU serial number, a hard disk serial numberand a network card hardware address of the computer is collected through a built-in method of a windows system. An order is confused and disordered through a certain algorithm. The information is encrypted into a text composed of a set of numbers and letters through a Des returnable encryption mode. After the user obtains encrypted information, the encrypted information is sent to a developer through a short message or other computers with networks. After the developer obtains the encrypted information, the encryption mode is reversed to decrypt the encrypted information to obtain hardware information of the user. After the hardware information is mixed again, the hardware information is encrypted into a string of characters composed of numbers and letters through an MD5 non-returnable encryption mode, and the characters at different positions are selected to be combined into a verification code. When the user uses software, only machine information needs to be collected again for encryption and comparison, and a network does not need to be connected.

Description

Technical field [0001] The invention relates to a verification method for stand-alone software in a non-network environment. Background technique [0002] The general stand-alone software has an attached verification code when it is not connected to the Internet to verify the activation of the software. [0003] The software with verification code cannot be guaranteed to be installed only when it is not connected to the Internet, and it may be registered multiple times or used for profit. Affect the interests of developers. [0004] Software that requires network verification without a verification code cannot be used without a network, and the user must be very painful. Summary of the invention [0005] Aiming at the problems in the prior art, this patent designs a stand-alone software verification method, which can realize verification even when it is not connected to the Internet, which not only protects the interests of developers but also facilitates users without a network. [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/12G06F21/10
CPCG06F21/123G06F21/105G06F21/1011G06F21/107
Inventor 戴雪松王晓岩陈文孙信中矫人全
Owner NANJING AOTO ELECTRONICS CO LTD