Authorization verification method, apparatus and device, and computer readable medium

A technology of authorization code and user authorization code, which is applied in computer security devices, computing, program/content distribution protection, etc., and can solve problems such as the inability to restrict illegal use of software

Pending Publication Date: 2021-01-05
CHINA CONSTRUCTION BANK
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the process of realizing the present invention, the inventor found that there are at least the following problems in the prior art: the authorization information is generated based on the characteristics of the server, and the illegal use of the software cannot be restricted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization verification method, apparatus and device, and computer readable medium
  • Authorization verification method, apparatus and device, and computer readable medium
  • Authorization verification method, apparatus and device, and computer readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] Exemplary embodiments of the present invention are described below with reference to the accompanying drawings, which include various details of the embodiments of the present invention to facilitate understanding and should be considered as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted from the following description for clarity and conciseness.

[0071] The software can provide both cloud and localized deployment solutions, so software authorization can be divided into online authorization and offline authorization. Cloud-deployed services generally provide online authorization. For locally deployed software, offline authorization is generally provided.

[0072] Software with intellectual property rights is generally...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authorization verification method, apparatus and device, and a computer readable medium, and relates to the technical field of computers. One specific embodiment of the method comprises the following steps: decrypting a user authorization code by using a public key to obtain an encrypted authorization code; decrypting an original authorization code in the encrypted authorization code based on a user secret key obtained from the encrypted authorization code to obtain a user identifier, an authorization code validity period and an authorized use day number; and if thedecrypted user identifier is consistent with the actual user identifier and the current date does not exceed the validity period of the authorization code, updating the actual use days of the softwarethrough the authorized use days. According to the embodiment, illegal use of software can be limited.

Description

technical field [0001] The present invention relates to the field of computer technology, and in particular, to a method, apparatus, device and computer-readable medium for authorization verification. Background technique [0002] The concept of software protection is from the developer's point of view. It emphasizes the use of encryption-based technical means to protect software from being cracked and to protect software from illegal or excessive use by customers. In theory, all software protection techniques can be cracked with sufficient resources and time. However, if the security strength of a protection technology is such that the cracker pays more than the cost of purchasing the software, the protection technology is successful and worth using. [0003] To protect the rights and interests of software developers and prevent the software from being copied, stolen or illegally used without certification, the software is generally authenticated and activated by means of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/10G06F21/60
CPCG06F21/105G06F21/12G06F21/602
Inventor 付和萍谢仁伟徐禄春卢慧杰沈小玲
Owner CHINA CONSTRUCTION BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products