Software content use authorization method

A software and content technology, applied in the field of information security, can solve problems such as inability to achieve self-service authorization, cracking, inaccurate machine identification, etc., to reduce the risk of interception analysis, improve ease of use, and improve the effect of recognition rate

Active Publication Date: 2019-08-23
北京比特安索信息技术有限公司
View PDF5 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the authorization file is encrypted by the fingerprint of the machine, it cannot be opened when copied to other machines, and the copy is invalid
[0013] However, in actual use, it is much more complicated to consider security and usability solutions, and various problems need to be solved
For example, ① the existing soft encryption schemes are difficult to obtain a stable, reliable and secure globally unique identification code, which has caused certain obstacles to correctly identify the user's computer; ② these soft encryption schemes do not have databases, and are only under development The commercial terminal provides a simple tool that does not store the identification information of the machine, resulting in inaccurate machine identification, poor usability, inability to realize self-service authorization, and low security strength.
[0014] Another example is that some solutions are only bound to the logical serial number of the hard disk. There are two serious problems here. First, the logical serial number can be modified, and other users can modify it to the same serial number, which causes cracking; second. , Formatting the hard disk will cause the serial number to change. From the user's point of view, the user's authorization cannot be used normally, and the developer must be contacted to obtain the authorization again; Changed the machine, or changed a machine
If the user changes the machine, he can only reissue a new authorization, and the original authorization cannot be recovered
What if the user intends to install one software in the office and at home, but only uses one software at the same time? If it is an enterprise user, it is a very cumbersome thing to authorize each machine, and it is inconvenient to manage, so what should I do? How to manage the authorizations that have been issued? At present, the authorization files of these schemes are stored locally and can be easily cloned and copied

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software content use authorization method
  • Software content use authorization method
  • Software content use authorization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0081] An embodiment of the present invention provides a method for authorizing the use of software content, the method may include:

[0082] 101. The Bitcloud server receives a protection instruction associated with software content triggered by the first user through the software content provider client.

[0083] 102. The bitcloud server generates an authorization code for the second user to use the software content based on any device according to the protection instruction.

[0084] The authorization code in this embodiment is sent to the second user along with the software, so that the second user can activate, upgrade or use the software based on the authorization code.

[0085] In practical applications, before step 101, in this embodiment, the bit cloud server also responds to the operation of the first user to obtain the SDK corresponding to the software content, and the SDK is embedded in the software sent by the second user.

[0086] 103. The BitCloud server receiv...

Embodiment 2

[0114] An embodiment of the present invention provides a method for authorizing the use of software content, the method may include:

[0115] 201. The Bitcloud server receives an authentication request sent by a software client in any device, and the authentication request includes authentication information carrying an authorization code of the software content to be used.

[0116] Wherein, the authorization code can be understood as a code generated by the Bitcloud server for the second user to use the software on any device after receiving the protection instruction associated with the software content triggered by the first user through the client of the software content provider. The authorization code for the content.

[0117] For example, the authentication information in this step may also include: the authorization information of the software content generated by the bit cloud server according to the protection instruction;

[0118] The authorization information incl...

Embodiment 3

[0148] combine figure 1 As shown, the authorization scheme of the present embodiment includes the following parts: database, authentication service module, management system, client library (i.e. figure 1 Bit cloud library) and some tool software. For a diagram of the relationship between each part, see figure 1 software use case diagram.

[0149] The database is used to store various data such as product information, user information, authorization information and authentication information.

[0150] The authentication service module mainly provides authentication services for customers and completes the generation, activation and upgrading of authorization codes, which is the core of the whole system.

[0151] The management system mainly manages authorization and user information, and is the developer's operation interface; at the same time, it provides a WebService interface for the client program (that is, the client library of Bitcloud) and the management platform, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a software content use authorization method. The method comprises the steps that 101, a bit cloud server receives a protection instruction which is triggered by a first user through a software content provider client and is associated with software content; 102, the bit cloud server generates an authorization code for a second user to use the software content based on any device according to the protection instruction; 103, the bit cloud server receives an authentication request sent by a software client in any device; and 104, the bit cloud server carries out authentication processing on the authentication request according to a pre-defined authentication strategy, and if the authentication is qualified, a secure communication channel for data interaction between the software client and the bit cloud server is established. According to the method, the defects of inaccurate machine identification, poor usability, incapability of realizing self-service authorization, low safety intensity, easiness in cloning and copying and the like in the prior art are overcome.

Description

technical field [0001] The invention belongs to information security technology, and in particular relates to a method for authorizing the use of software content. Background technique [0002] With the increasing development of Internet technology, digital content such as software, audio, video, books, and pictures are widely disseminated on the Internet, and the copying and dissemination of the above-mentioned digital content is also becoming easier and easier, which leads to widespread illegal piracy, resulting in The interests of content providers are seriously damaged, so the protection of digital content becomes very important. [0003] In response to the above problems, various software and digital content protection methods are currently available on the market, classified according to whether they rely on third-party hardware, including traditional hard encryption methods and soft encryption methods that do not rely on third-party hardware. The hard encryption meth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/10G06F21/12
CPCG06F21/105G06F21/121
Inventor 褚庆东孟雄晖
Owner 北京比特安索信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products