Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software authorization verification method

A technology of software authorization and verification method, which is applied in the field of software authorization verification, can solve the problems that software authorization verification methods cannot be widely used, and cannot identify whether the system time has been artificially modified, so as to prevent modification of system time, save hardware equipment investment, Realize the effect of lifespan

Inactive Publication Date: 2021-01-15
POTEVIO INFORMATION TECH
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the prior art, for computer equipment in special application scenarios such as the military field and the security field, the use of external hardware interfaces is prohibited. Therefore, the method of software authorization verification in the form of hardware is limited by the hardware environment requirements of the equipment and cannot used widely
At the same time, in the existing technology, whether it is hardware authorization or software authorization, it is necessary to obtain the time of the device installed by the software. Often, after the system time of the device is manually modified, the existing software authorization verification methods cannot identify the system time. Whether it has been artificially modified, resulting in the use of the software beyond the authorized use time
In the existing software authorization verification method based on the Internet or satellite positioning and timing to obtain time information, although the problems caused by man-made modification of the time can be avoided, for equipment that cannot rely on the Internet and satellite positioning and timing systems, such as the military industry , Computer equipment in the confidential field, still unable to identify whether the system time has been artificially modified

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software authorization verification method
  • Software authorization verification method
  • Software authorization verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the purpose, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0055] like figure 1 As shown, the software authorization verification method of the embodiment of the present invention includes the following steps before starting the software each time:

[0056] Process the hardware information of the device where the software is located to obtain a verification code, and compare the verification code with the authorization code stored in the authorization file to obtain the comparison result of the verification authorization code to determine whether the software can run on the device;

[0057] Comparing the software authorization time information stored in the authorization file with the corresponding time information recorded in the device system to obtain the time information comparison result;

[0058] Whe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a software authorization verification method. The method comprises the following steps of before software is started each time, processing hardware information of equipment inwhich the software is positioned to obtain a verification code, and comparing the verification code with an authorization code stored in an authorization file to obtain a verification authorization code comparison result; comparing the software authorization time information stored in the authorization file with corresponding time information recorded in a system of the equipment to obtain a timeinformation comparison result; and when the verification authorization code comparison result and the time information comparison result both meet the authorization condition, allowing the software torun in the equipment. According to the method, the authorization verification of the software is realized without depending on external pluggable encryption hardware equipment, a far-end authorization server, the Internet and a satellite positioning time service system, the content of the authorization file can be effectively prevented from being modified by a user, and the service life of the software is effectively controlled.

Description

technical field [0001] The invention relates to the technical field of software use protection, in particular to a method for verifying software authorization. Background technique [0002] With the development of computer technology, there are more and more types of application software and more complete functions, which leads to increasingly prominent security problems such as software piracy and disrupts the software market. [0003] In order to maintain the intellectual property rights of software developers, software developers need to invest a lot of manpower and material resources in the development of software authorization management. However, due to the different models and operating systems of various authorized devices, especially for some Under normal circumstances, it is difficult for software developers to control the lifespan of the software, and these are the difficulties of software authorization. [0004] In the prior art, there are mainly two ways of sof...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/60
CPCG06F21/121G06F21/602G06F2221/2137G06F21/1011
Inventor 王歌
Owner POTEVIO INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products