Supercharge Your Innovation With Domain-Expert AI Agents!

Software use authorization protection method

A technology of authorization protection and software authorization, applied in digital data protection, program/content distribution protection, instruments, etc., can solve the problems of loss of security risk, frequent software theft, etc., to achieve the effect of protecting correct use and reducing security risks

Pending Publication Date: 2022-05-13
北京鼎普科技股份有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For this reason, the present invention provides a kind of software authorization protection method, in order to solve the problems of frequent theft of existing software, causing losses and security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software use authorization protection method
  • Software use authorization protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0025] refer to figure 1 , this embodiment discloses a software authorization protection method, the method is:

[0026] S1. Generate a machine code, and determine the uniqueness of the standard software installation machine through the machine code;

[0027] S2. Generate a software XML authorization file template, and generate and obtain it through management platform configuration;

[0028] S3. Signature value generation, the machine code string is first generated by a secure hash algorithm to generate a unique value, and then the unique value is calculated by the RSA algorithm to generate a signed value, and the signed value is encoded by base64 encoding to generate a signed value;

[0029] S4. Based on the plaintext content of the authorization file template generated by S2 and S3, the AES algorithm is used to encrypt the content through a preset fixed password to generate a ciphertext authorization file;

[0030] S5. After the authorization file is decoded and authorize...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a software use authorization protection method, which comprises the following steps of: S1, generating a machine code, and determining the uniqueness of a standard software installation machine through the machine code; s2, generating a software XML authorization file template, and performing generation and acquisition through management platform configuration; s3, generating a signature value, firstly generating a unique value from the machine code character string through a secure hash algorithm, then operating the unique value through an RSA algorithm to generate a signature value, and encoding the signature value through base64 encoding to generate the signature value; s4, based on the authorization file template plaintext content generated in S2 and S3, through a preset fixed password, carrying out an AES algorithm to carry out encryption processing on the content, and generating a ciphertext authorization file; and S5, after the authorization file is decoded and authorized, generating a final authorization file. According to the method, the problems of loss and safety risk caused by frequent embezzlement of the existing software are solved.

Description

technical field [0001] The invention relates to the technical field of software protection, in particular to a software usage authorization protection method. Background technique [0002] With the development of network technology, pirated software and embezzled software are becoming more and more frequent, resulting in damage to the company's revenue and potential safety hazards. In order to protect the company's software from accidental or intentional theft, although it can be installed correctly but cannot be used without authorization from the authorization platform, it is necessary to authorize the terminal (computer) generated after the software is installed through the company's internal authorization platform It can be used normally only after the file is authorized (license file), which protects the software from being stolen or illegally used, better protects the company's interests from loss, and protects the correct use of the company's software from leaking com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/12G06F21/60G06F21/64
CPCG06F21/12G06F21/602G06F21/64
Inventor 李枝广
Owner 北京鼎普科技股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More