Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal software authorization system and method based on machine fingerprint and USBkey

A machine fingerprint and terminal software technology, applied in the direction of instruments, computer security devices, program/content distribution protection, etc., can solve the problems of manual activation of software, complicated authorization process, hardware conflicts, etc., and achieve easy-to-use and adaptable authorization process High performance and flexibility, and the effect of ensuring safety

Pending Publication Date: 2022-01-07
EAST CHINA INST OF COMPUTING TECH
View PDF1 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, whether it is soft encryption or hard encryption, there are inevitable disadvantages
The disadvantages of hard encryption are: ①It is easy to cause hardware conflicts, and the operation requirements are high; ②As the software is upgraded, the dongle needs to be replaced constantly, which is costly; ③Additional professional hardware equipment is required, and the flexibility is poor
The disadvantages of soft encryption are: ①The authorization process depends on the network; ②The software needs to be manually activated after obtaining the authorization code; ③The format of the keyfile and serial number used is similar and easy to be tampered with
[0007] Regarding the above-mentioned related technologies, the inventor believes that the authorization process of the above-mentioned method is relatively complicated, the adaptability and flexibility are low, the cost is high, the authorization process relies on the network, does not support offline terminal software authorization, and the security is weak

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal software authorization system and method based on machine fingerprint and USBkey
  • Terminal software authorization system and method based on machine fingerprint and USBkey
  • Terminal software authorization system and method based on machine fingerprint and USBkey

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several changes and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0038] The embodiment of the present invention discloses a terminal software authorization system based on machine fingerprint and USBkey, such as figure 1 and figure 2 As shown, it includes a hardware information collection module, an authorization module, an activation verification module, an application installation module, and an encryption and decryption module.

[0039] Hardware information collection module: collect hardware information and send hardware information. The collected hardware inf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a terminal software authorization system and method based on a machine fingerprint and a USBkey, and the system comprises the following modules: a hardware information collection module which collects hardware information and transmits the hardware information; an authorization module which is used for receiving the hardware information, combining the hardware information and generating an authorization file; an activation verification module which is used for verifying the authorization file; and an application installation modulewhich is used for carrying out application software installation and data deployment after the authorization file passes verification. According to the invention, the authorization process is simple and easy to use, and authorization is carried out by adopting an independent USBkey without depending on other hardware; the adaptability and the flexibility are high, and the cost is low.

Description

technical field [0001] The present invention relates to the technical field of information system software, in particular to a terminal software authorization system and method based on machine fingerprints and USB keys. Background technique [0002] In order to deal with related problems such as malicious copying and illegal use of software, security authorization of software with intellectual property rights is an effective means to ensure software security. According to different working methods and principles, common software protection technologies at home and abroad are divided into two types, one is software-based soft encryption technology, and the other is hard encryption technology that requires specific hardware. However, whether it is soft encryption or hard encryption, there are inevitable disadvantages. The disadvantages of hard encryption are: ①It is easy to cause hardware conflicts, and the operation requirements are high; ②As the software is upgraded, the d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/10G06F21/12
CPCG06F21/105G06F21/123
Inventor 孙哲徐鑫朋陈景江浩汪光敏张文雅
Owner EAST CHINA INST OF COMPUTING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products