Method for verifying legality of software use right

A technology of right to use and legality, applied in the fields of instruments, computing, electrical digital data processing, etc., can solve the problems of heavy losses of the licensor, illegal use of software, illegal authorized use of software, etc.

Pending Publication Date: 2019-10-18
GUANGDONG JINGAO INFORMATION TECH CO LTD
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The main reason for the illegal use of software is that the software authorization information between the licensor and the client is cracked, resulting in the software being illegally authorized to use, resulting in heavy losses for the licensor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for verifying legality of software use right
  • Method for verifying legality of software use right

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and through specific implementation methods.

[0030] A method for verifying the validity of the right to use software in this embodiment, such as figure 1 As shown, the specific steps are as follows:

[0031] Step A: Obtain the unique identifier of the device, and encrypt the unique identifier of the device to generate machine code ciphertext;

[0032] Such as figure 2 As shown, including the specific steps to generate the unique identifier of the device:

[0033] Step a1: Obtain the CPUID and network card address of the device;

[0034] Step a2: Concatenate the CPUID and network card address obtained in step a1 to obtain plaintext information;

[0035] Step a3: Generate the first public key A and the first private key A', and use the first public key A to encrypt the plaintext information to form ciphertext, which is the unique identifier...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for verifying the legality of the software use right comprises the following steps: acquiring a unique identifier of equipment, and encrypting the unique identifier of the equipment to generate a machine code ciphertext; the authorization party decrypting the machine code ciphertext to obtain a unique identifier of the equipment, organizing authorization information of the decrypted unique identifier, and encrypting again to generate an activation code; the client decrypting the activation code to obtain authorization information, and writing the authorization information into a localmemory to form an authorization file; and when the software runs, the client recording the software running information, encrypting the software running information and storing the software running information in the authorization file in real time, and the authorization file decrypting the encrypted software running information and verifying the authorization information of the software. According to the method for verifying the legality of the software use right, the authorization information is obtained through multiple times of encryption and decryption, the authorization information is written into the local, the encrypted software operation information is stored into the local in real time, the authorization information is verified, and the purpose of controlling the software is achieved.

Description

technical field [0001] The invention relates to the technical field of software, in particular to a method for verifying the legality of the right to use software. Background technique [0002] In today's era of rapid development of the Internet and big data applications, software products have become the core tools in the computer field. In the world of dazzling software products, software protection ideas have gradually attracted the attention of software publishers. The full implementation of software protection is conducive to the development of the software industry. Healthy development is conducive to promoting informatization construction. The main reason for the illegal use of software is that the software authorization information between the licensor and the client is cracked, resulting in the illegal use of the software and causing heavy losses to the licensor. Contents of the invention [0003] The purpose of the present invention is to address the defects in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/60
CPCG06F21/121G06F21/602
Inventor 谷帅梁家达何威
Owner GUANGDONG JINGAO INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products