Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for preventing unauthorized use of software, equipment and storage medium

A non-authorized, hardware device technology, applied in the field of information security, can solve the problem of not being able to determine whether the software has the right to run

Inactive Publication Date: 2020-05-15
核芯互联科技(青岛)有限公司
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] To this end, the embodiment of the present invention provides a method, device, and device for preventing unauthorized use of software to solve the problem in the prior art that it is impossible to determine whether the software is authorized to run due to the inability to connect to the extranet.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for preventing unauthorized use of software, equipment and storage medium
  • Method and device for preventing unauthorized use of software, equipment and storage medium
  • Method and device for preventing unauthorized use of software, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The implementation mode of the present invention is illustrated by specific specific examples below, and those who are familiar with this technology can easily understand other advantages and effects of the present invention from the contents disclosed in this description. Obviously, the described embodiments are a part of the present invention. , but not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0046] This application proposes a method for preventing unauthorized use of software, see attached figure 1 A flow chart of a method for preventing unauthorized use of software is shown; the method is applied to a hardware device to be installed with software, and the method includes:

[0047] Step S101, obtaining the relevant authorization file of the software;

[0048] Wherein, the authoriza...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to the technical field of information safety, in particular to a method and device for preventing software from being used in an unauthorized mode, equipment and a storage medium. The invention discloses a method capable of preventing unauthorized use of software. The method comprises the following steps: acquiring a related authorization file of the software; obtaining the deadline and the effective equipment recognition information of the software from the authorization file; acquiring current time and hardware recognition information of hardware equipment to be operated by software; identifying information according to the current time and hardware; and judging whether the software is allowed to run or not according to the deadline of the softwareand the effective equipment information. Whether the software is allowed to run or not can be judged according to the current time, the hardware recognition information of the hardware equipment to be run by the software, the deadline and the effective equipment information; according to the method and the device, networking is not needed, authorization verification of the software can be completed locally, and the problem that in the prior art, if equipment cannot be networked, the software cannot be authenticated is solved.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of information security, and in particular to a method, device, device and storage medium for preventing unauthorized use of software. Background technique [0002] In order to realize the authorized use of software, there are two methods in the prior art: one is the online registration method: after the user installs the software, the user registers and authorizes through the network. The supplier of the software system has registered the user's information in advance, and when the user registers online, the supplier's registration system will verify the user's information. Disadvantages When the user identity is valid, the registration system generates a credential information, and the software system completes authorization based on the credential information. The second is the activation code method: after the user installs the software, the software system will generate a regi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12
CPCG06F21/121
Inventor 张华胡康桥
Owner 核芯互联科技(青岛)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products