Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software authorization method and system and storage medium

A technology of software authorization and software, which is applied in the direction of program/content distribution protection, instruments, and electronic digital data processing. The method and usage scenarios are flexible, the cost of cracking is increased, and the effect is suitable for popularization and application

Pending Publication Date: 2022-01-28
北京朝歌数码科技股份有限公司
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of the times and the innovation of technology, the investment in software research and development is increasing day by day. However, unauthorized use of software without legal authorization after the software goes online has occurred from time to time, which has brought losses to software developers. In order to avoid this situation, It is particularly important to strengthen the management and control of software usage rights
At present, the traditional software authorization methods include software activation code, network registration, dongle, etc. However, the software activation code method can only authorize a single device, not only requires the user to manually enter the activation code (serial number), it is not suitable for wireless Devices with key input or interface, and the activation code is easy to leak, and the security is poor; the network registration method is ideal for authorization, but this method not only supports online authorization, but does not support offline authorization, and the development and continuous maintenance of the authorization server require high investment costs. ;The dongle method is more ideal than the software activation code method, but this method requires hardware support and is not friendly to most embedded devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software authorization method and system and storage medium
  • Software authorization method and system and storage medium
  • Software authorization method and system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] Such as figure 1 as shown, figure 1 It is a schematic flowchart of the software authorization method provided by Embodiment 1 of the present invention.

[0059] In this embodiment, the software authorization method includes the following steps:

[0060]S101. The software authorizer receives the device information collected by the device manufacturer;

[0061] S102. The software authorizer generates an authorization file according to the received device information and corresponding authorization information;

[0062] S103. The software authorizer returns the authorization file and software version to the device manufacturer;

[0063] S104. The device manufacturer integrates the software version and places the authorization file as required;

[0064] S105. After the device is running, the software loads the authentication module and performs authorization verification. If the verification is passed, it will run normally, otherwise it will stop running. It should be ...

Embodiment 2

[0069] In this embodiment, the software authorization method includes the following steps:

[0070] S201. The software authorizer receives the device information collected by the device manufacturer;

[0071] S202. The software authorizer generates an authorization file according to the received device information and corresponding authorization information;

[0072] S203. The software authorizer returns the authorization file and software version to the device manufacturer;

[0073] S204. The device manufacturer integrates the software version and places the authorization file as required;

[0074] S205. After the device is running, the software loads the authentication module and performs authorization verification. If the verification is passed, it runs normally, otherwise it stops running. It should be noted that after the device is running in this embodiment, the preferred setting mode is to select the software to automatically load the authentication module, but it is ...

Embodiment 3

[0087] In this embodiment, the software authorization method includes the following steps:

[0088] S301. The software authorizer receives the device information collected by the device manufacturer;

[0089] S302. The software authorizer generates an authorization file according to the received device information and corresponding authorization information;

[0090] S303. The software authorizer returns the authorization file and software version to the device manufacturer;

[0091] S304. The device manufacturer integrates the software version and places the authorization file as required;

[0092] S305. After the device is running, the software loads the authentication module and performs authorization verification. If the verification is passed, it runs normally, otherwise it stops running. It should be noted that after the device is running in this embodiment, the preferred setting mode is to select the software to automatically load the authentication module, but it is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a software authorization method and system and a storage medium. The method comprises the steps that a software authorization party generates an authorization file according to received equipment information and corresponding authorization information; the software authorization party returns the authorization file and the software version to an equipment manufacturer; The equipment manufacturer integrates the software version and the authorization file according to requirements; and after the equipment runs, the software loads an authentication module and performs authorization verification, the equipment runs normally if the authorization verification succeeds, and otherwise, the equipment stops running. The authorization file can be preset, a user does not need to manually input an activation code, and the method is more suitable for equipment without key input or interface; off-line authorization simplifies the server authorization link and reduces the development and maintenance cost of the server. Batch authorization can be performed on equipment models, manufacturers, software versions and the like, and independent authorization can also be performed on a chip ID, a network card address and the like of single equipment; multiple signature verification and multiple encryption algorithms are used in authorization and authentication, and cracking is not prone to occurring.

Description

technical field [0001] The embodiment of the present invention relates to the technical field of software authorization, and in particular to a software authorization method, system and storage medium. Background technique [0002] With the development of the times and the innovation of technology, the investment in software research and development is increasing day by day. However, unauthorized use of software without legal authorization after the software goes online has occurred from time to time, which has brought losses to software developers. In order to avoid this situation, It is particularly important to strengthen the management and control of software usage rights. At present, the traditional software authorization methods include software activation code, network registration, dongle, etc. However, the software activation code method can only authorize a single device, not only requires the user to manually enter the activation code (serial number), it is not su...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/10G06F21/12G06F21/60
CPCG06F21/105G06F21/121G06F21/602
Inventor 丘子霖
Owner 北京朝歌数码科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products