Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software authorization and protection device and method based on asymmetric cryptographic algorithm

An asymmetric encryption and software authorization technology, applied in computer security devices, digital data protection, program/content distribution protection, etc., can solve the problems of weak protection, high production cost, low database security, etc., and achieve high security , the effect of reducing costs

Active Publication Date: 2015-02-18
XIAMEN HYMAKE TECH
View PDF4 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although there are many software authorization and protection methods, such as registration code method, dongle method, inserting function restriction program, Key File protection, etc., the disadvantages of these methods are also obvious, or the algorithm is complex, the production cost is high, or it is easy to crack, the protection weak
[0003] With the popularization of the Internet, combined with Internet technology, someone proposed a method of software authorization and protection through online registration. Compared with other methods in the prior art, this method has high security and is not complicated in technical implementation, but this method The method only uses a unique connection between the application server and the database, and the database security is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software authorization and protection device and method based on asymmetric cryptographic algorithm
  • Software authorization and protection device and method based on asymmetric cryptographic algorithm
  • Software authorization and protection device and method based on asymmetric cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be further described in conjunction with the accompanying drawings and specific embodiments.

[0041] As a specific example, such as figure 1 As shown, a software authorization and protection device based on an asymmetric encryption algorithm of the present invention includes a software vendor client, multiple user clients, a software vendor server, a database, and a user server. The business client is connected to the software business server through a wireless and / or wired network, the software business server is connected to the database through the internal security network of the first local area network, the user server is connected to the database through the internal security network of the second local area network, and the plurality of users The client connects to the user server through the Internet,

[0042] The software vendor client includes an authorization code application module, which applies for an authorization code from t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a software authorization and protection device and method based on an asymmetric cryptographic algorithm. The device comprises a software seller client computer, a plurality of client computers, a software seller server, a database and a user server, wherein the software client computer is connected with the software seller server through wireless and / or wired networks, the software seller server is connected with the database through a first VPN (virtual private network), the user server is connected with the database through a second VPN, and a plurality of client computers are connected with the user sever through Internet. The invented device adopts double-backup connection between the application server and the database, and the database safety performance is improved. The invention also has another goal of providing the software authorization and protection method based on the asymmetric cryptographic algorithm. The method provided by the invention adopts an asymmetric cryptographic technology, the safety is high, the technology realization is not complicated, and the mode for obtaining the authorization by a user is simpler.

Description

technical field [0001] The invention relates to a software authorization and protection device and method based on an asymmetric encryption algorithm. Background technique [0002] Due to the reproducibility and repeatability of software, software developers and their development teams in the industry have always suffered from illegal software copying and pirated software products. Although there are many software authorization and protection methods, such as registration code method, dongle method, inserting function restriction program, Key File protection, etc., the disadvantages of these methods are also obvious, or the algorithm is complex, the production cost is high, or it is easy to crack, the protection Weak. [0003] With the popularization of the Internet, combined with Internet technology, someone proposed a method of software authorization and protection through online registration. Compared with other methods in the prior art, this method has high security and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/12G06F21/62
CPCG06F21/123G06F21/125G06F21/629
Inventor 李志龙
Owner XIAMEN HYMAKE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products