Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software security and software validity period verification method and system

A software security and verification method technology, applied in the direction of digital data protection, platform integrity maintenance, program/content distribution protection, etc. Effect

Pending Publication Date: 2022-07-05
合肥泽康电子科技有限公司
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This method also requires hardware USB-WIFI support, and cannot verify the validity period, and only verifies whether the software is allowed to run, and cannot guarantee the safety of the software operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software security and software validity period verification method and system
  • Software security and software validity period verification method and system
  • Software security and software validity period verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the embodiments of the present invention. Obviously, the described embodiments are part of the present invention. examples, but not all examples. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0049] like figure 1 As shown, the first embodiment of the present invention discloses a method for verifying software security and software validity period, and the method includes the following steps:

[0050] S10. When the software is running, obtain the hardware data of the host;

[0051] It should be noted that the hardware data of the host includes specific iden...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a software security and validity period verification method and system, and the method comprises the steps: obtaining hardware data of a host when software runs; encrypting the hardware data by adopting an encryption algorithm to obtain a first identification code and a first verification code corresponding to the first identification code; judging whether the first verification code is successfully matched with a pre-obtained target verification code or not; if yes, verification is passed, otherwise, dates D are traversed in a date set, the first identification code and the dates D are processed and then encrypted, a second verification code corresponding to each date D is obtained, D belongs to [D1, D2], D is a positive integer, D2 is larger than or equal to D1, D1 is the current date of the system, and D2 is the expiration date of the validity period of the software; judging whether a second verification code matched with the target verification code exists or not; if yes, determining that the verification is passed, and if not, determining that the verification fails. According to the method, additional encryption hardware is not needed, the cost is reduced, the period is short, and verification of software in environments such as medical scenes which cannot be connected with an external network is facilitated.

Description

technical field [0001] The invention relates to the technical field of software verification, in particular to a verification method and system for software security and software validity period. Background technique [0002] At present, in some scenarios that cannot be connected to the external network, such as hospital environments, the hardware verification method (dongle) is generally used for software security verification. This method must purchase hardware equipment, which increases the verification cost, and with the increase in sales volume , the cost of encryption hardware has increased dramatically. In addition, when the customer's encryption equipment is damaged or lost, additional encryption equipment needs to be purchased, which increases the maintenance cost, and the customer can only use it normally after a certain period, thereby reducing customer satisfaction. [0003] In the related art, for example, the invention patent application with the application n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/52G06F21/60
CPCG06F21/12G06F21/52G06F21/602
Inventor 崔敬雅苏超孟炎盛浩然钱嘉程
Owner 合肥泽康电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products