Unlock instant, AI-driven research and patent intelligence for your innovation.

Software authorization method, excitation method and authorization transaction method based on block chain

A software authorization and blockchain technology, applied in the field of blockchain-based software authorization and authorization transactions, can solve problems such as infringement of software developers' rights, waste, and limited functions, and improve operational security and attractiveness. , the effect of reducing operating costs

Pending Publication Date: 2021-04-23
无锡井通网络科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] For hardware authorization, additional external encryption devices need to be purchased, which not only causes waste, but also has many usage scenarios that cannot access external devices, such as software using cloud deployment;
[0010] For software authorization, once one of the software is cracked, the cracked software can usually be copied unlimitedly, and it is often difficult to take measures to control this behavior, which seriously violates the rights and interests of software developers;
[0011] In addition, there are still bigger essential problems in the above two traditional authorization methods. For example, the functions that can be realized are severely limited, and users cannot be effectively motivated to use them, and they cannot support efficient rights transfer. Build a vibrant ecosystem with products as the core

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software authorization method, excitation method and authorization transaction method based on block chain
  • Software authorization method, excitation method and authorization transaction method based on block chain
  • Software authorization method, excitation method and authorization transaction method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to more clearly understand the above objects, features and advantages of the present invention, the present invention will be further described below in conjunction with the accompanying drawings and embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0048] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways than described here. Therefore, the present invention is not limited to the specific embodiments disclosed below. limit.

[0049] Such as Figure 1-3 As shown, the present invention provides a blockchain-based software authentication method, including a blockchain interface module and a smart contract calling module. When the software system is not authorized to apply for authorization, the blockc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a software authorization method, an excitation method and an authorization transaction method based on a block chain, and relates to the technical field of software authorization management. Authentication of software authorization, use excitation and transaction matching are realized through the blockchain smart contract, the operation cost of the copyright protection industry is reduced, the operation security is improved, and meanwhile, a complete ecological system can be constructed by exciting users and providing a convenient transaction matching mechanism, and the attraction to the user can be greatly improved.

Description

technical field [0001] The present invention relates to the technical field of software authorization management, in particular to a blockchain-based software authorization method, incentive method and authorization transaction method. Background technique [0002] Blockchain (Block Chain) technology is a distributed data system based on peer-to-peer network. Through cryptography technology and incentive mechanism, the data coherence and consistency of distributed nodes can be realized, and the quasi-real-time verification, traceability and difficulty of information can be achieved. Tampering and other characteristics, thus creating a novel, safe and credible distributed trust system. [0003] A smart contract is a computer protocol designed to disseminate, verify or enforce contracts in an informational manner. Smart contracts allow for trusted transactions without third parties, which are traceable and irreversible. The purpose of smart contracts is to provide a method o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/64
CPCG06F21/121G06F21/64
Inventor 苗光胜闫之楠黄晏清
Owner 无锡井通网络科技有限公司