Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software authorization method and device

A technology of software authorization and software, applied in the direction of digital data authentication, program/content distribution protection, etc., can solve problems such as inaccurate software authorization, and achieve the effect of accurate and error-free software authorization

Inactive Publication Date: 2013-07-10
NEW FOUNDER HLDG DEV LLC +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the process of realizing the present invention, the inventor found that the prior art has at least the following problems: Since the hardware encryption device assigned to each terminal in the same distributed software system is the same, the user can copy the software on one terminal to another On the terminal, the redundant software and hardware encryption devices are used by other users, resulting in inaccurate software authorization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software authorization method and device
  • Software authorization method and device
  • Software authorization method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the objectives, technical solutions, and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be described clearly and completely in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, not all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0024] In order to solve the current problem that users can copy software on one terminal to another terminal, and use redundant software and hardware encryption devices for other users, which causes inaccurate software authorization, an embodiment of the present invention provides a software authorization Method and device.

[0025] S...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a software authorization method and a software authorization device and relates to the field of digital copyright protection. The method and the device are used for solving the problem that the software authorization is inaccurate because a user, at present, can copy software on one terminal to another terminal to allow other users to use residual software and hardware encryption devices. The invention adopts a technical scheme that: a software authorization file which has an attribute of rejecting to exist in the same terminal with other software authorization files is generated for the terminal configured with the software; and before the configured software is run, the software authorization file and preset information on the hardware encryption devices are verified. The technical scheme provided by the embodiment of the invention can be used in software authorization technique.

Description

Technical field [0001] The invention relates to the field of digital copyright protection, in particular to a method and device for software authorization. Background technique [0002] Due to the reproducibility of software, software piracy is very common, and illegally copied software will seriously damage the interests of software developers and reduce the enthusiasm of programmers. [0003] A distributed software system is a multi-terminal computer system, and each terminal forms a unified software system through the Internet. The distributed software system adopts the structure of distributed computing, and distributes the tasks of the CPU in the original single system to different terminals, installs different software on different terminals, and realizes different system functions through mutual coordination between the terminals. . [0004] The existing method for authorizing a distributed software system is to allocate a hardware encryption device to each terminal, and rea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12G06F21/10G06F21/30
Inventor 刘彦君万巍
Owner NEW FOUNDER HLDG DEV LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products