Offline authorization method for distributed software product

A software product, distributed technology, applied in the direction of program/content distribution protection, instruments, electrical digital data processing, etc., can solve problems such as inability to achieve, and achieve the effect of preventing tampering

Pending Publication Date: 2021-02-09
浙江百应科技有限公司
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the authentication maintenance stage, it is also necessary to rely on the network for authorization verification. If the customer requires the software to run offline, this mode will not be realized.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Offline authorization method for distributed software product
  • Offline authorization method for distributed software product
  • Offline authorization method for distributed software product

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0083] Embodiment 2 adds the verification steps of the authorization result on the basis of Embodiment 1, such as Figure 5 As shown, the inspection steps include:

[0084] S601: Obtain an authorization code file corresponding to the product;

[0085] S602: Obtain the software serial number;

[0086] S603: Verify the authorization result by using the authorization code file and the software serial number.

[0087] Such as Figure 6 As shown, the verification of the authorization result by using the authorization code file and the software serial number includes:

[0088] S6031: Judging whether the authorized product information in the authorization code file is the same as the authorized product information of the current software running, if the authorized product information is different, the authorization result check is failed;

[0089] S6032: If the authorized product information is the same, determine whether the machine cluster list in the authorization code file ov...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of software, in particular to an offline authorization method for a distributed software product, which comprises the following steps that: a client actively generates a product authorization application file and sends the product authorization application file to an authorization server in an offline mode; the authorization server generates an authorization code file according to the product authorization application file and sends the authorization code file to the client; and the client performs authorization operation on the software by using the authorization code file. The invention has the following beneficial effects: the method supports a distributed software system, the deployment number of the software system does not influence authorization operation, dynamic capacity expansion of the software system and offline authentication of some nodes of the system do not influence authentication, and re-authorization operation is not needed; the client and the authorization server communicate and are decoupled and are spatially independent, and the authorization operation is completely offline and does not depend on the network.

Description

technical field [0001] The invention relates to the technical field of software, in particular to an off-line authorization method for distributed software products. Background technique [0002] At present, most of the authorization means are for stand-alone software systems, that is, one software system is installed on one machine, and the authorized operation is only for the current machine operation. The authorization method is single-machine authorization. In the scenario of multiple machines, the authorization operation needs to be performed repeatedly, and the degree of automation is low. Second, authorized communication relies on the network. During the authorization process, it is necessary to collect the customer's software serial number. Usually, the software itself sends the serial number to the server for authorization through the network. In the authentication maintenance phase, it is also necessary to rely on the network for authorization verification. If ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/10G06F21/12
CPCG06F21/105G06F21/12
Inventor 曾子戈
Owner 浙江百应科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products