Supercharge Your Innovation With Domain-Expert AI Agents!

Software authorization management method

A technology of software authorization and management methods, applied in electrical components, user identity/authority verification, digital transmission systems, etc., can solve problems such as inability to achieve 100% security, troublesome use, increased equipment costs and maintenance costs, etc., to ensure legality Benefits, ease of use, and the effect of reducing hardware costs

Pending Publication Date: 2022-07-12
HUIZHOU BOSHIJIE TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to solve the problem of existing authorization methods. The device needs to be connected to the authorized hardware carrier. If it is necessary to run software from multiple different merchants, multiple hardware carriers are required, which is troublesome to use, and the equipment cost and maintenance cost of hardware authorization. Increase, the problem that the software authorization scheme cannot achieve 100% security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software authorization management method
  • Software authorization management method
  • Software authorization management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0127] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, but not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0128] like figure 1 As shown, a software authorization management method includes two relational database tables arranged in an authorization server, a commercial software program arranged in a client, a user login authentication management method between the authorization server and the client, An activation code registration method and a re-registration method, wherein the user login authentication management method includes an authorization code retrieval ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a software authorization management method, which comprises two relational database tables arranged in an authorization server, a commercial software program arranged in a client, a user login authentication management method used between the authorization server and the client, an activation code registration method and a re-registration method. Wherein the user login authentication management method comprises an authorization code retrieving method, an offline authentication method and a heartbeat authentication method. The two relational database tables are an activation code table and an authorization code table. According to the method, a mode of combining offline authentication and online authentication is adopted, the number of legal users can be effectively limited through online authentication, and the uniqueness of software authorization is guaranteed. And offline authentication can effectively reduce the verification pressure of the server. The method effectively prevents one code from multiple purposes, practically guarantees the legitimate rights and interests of commercial software, is convenient to use, and reduces the hardware cost.

Description

technical field [0001] The invention relates to the technical field of software products, in particular to a software authorization management method. Background technique [0002] Software cracking and protection is an eternal topic that follows the software life cycle. In 2004, Microsoft Corporation proposed the End User License Agreement (EULA) and required users to abide by it. To date, the international general management of copyright protection for commercial software remains the same. However, since the EULA only stipulates the rights and obligations of end users in text, it does not provide effective copyright protection mechanisms and control methods from a technical point of view, it cannot control the arbitrary installation and use of users, and it cannot guarantee that users can crack the software without permission. . In order to achieve the purpose of protecting software copyright, there are two types of schemes: hardware protection and software protection. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/32H04L9/06H04L69/22
CPCH04L63/08H04L63/0807H04L69/22H04L63/0823H04L9/3247H04L9/3263H04L9/0631H04L2209/603
Inventor 桂丰
Owner HUIZHOU BOSHIJIE TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More