Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for software protection, authorization and registration

A technology for software protection and authorization information, applied in the computer field, it can solve the problems of hardware equipment and operating system dependence, insufficient security, and achieve the effects of efficient and low-cost software distribution and delivery, preventing piracy, and avoiding business losses.

Active Publication Date: 2018-02-27
航天信息软件技术有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The advantage is safety, and the disadvantage is the dependence on hardware devices and operating systems, and additional production, initialization, logistics, installation and maintenance costs
[0005] Soft encryption has no hardware on the client side, which can realize the electronic distribution of software, saving a lot of software protection and distribution costs for developers. The disadvantage is that the security is not high enough. Some popular soft encryption tools and manufacturers in the market basically have corresponding keygen crack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for software protection, authorization and registration
  • A method for software protection, authorization and registration
  • A method for software protection, authorization and registration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0025] figure 1 It is a flowchart of a method for software protection, authorization and registration according to an embodiment of the present invention; as shown in the figure, the method includes the following steps:

[0026] S110, receiving and verifying the verification information sent by the user during registration;

[0027] Wherein, the verification information may include product serial number, CDKEY (product password) and verification code.

[002...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for software protection, authorization and registration, which comprises the following steps: receiving verification information sent by a user when registering and verifying it; if the verification is passed, obtaining the user's customer key information and hardware feature code; according to the customer key The information and hardware feature code, product ID, product authorization, and MD5 check code are combined and coded according to a custom algorithm, and the obtained code is generated through an asymmetric encryption algorithm to generate authorization information and sent to the corresponding client. The invention can protect the intellectual property rights of products, limit the unauthorized use of software products, effectively prevent piracy, avoid commercial losses, and at the same time support rich and flexible authorization packaging and pricing mechanisms, high-efficiency and low-cost software distribution and delivery, and at the same time based on software registration information It can conduct a comprehensive analysis of software product sales, market, and customer conditions.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a method for software protection, authorization and registration. Background technique [0002] For software suppliers, if they want to develop their business quickly in the increasingly severe competition, they need an effective means to protect market revenue and core technology to ensure their own competitive advantages. At the same time, they also need to use flexible software licensing and delivery models to obtain Highest market profit and customer satisfaction. Allow customers to pay according to their own needs, and which functions and product features they really need can be purchased. At the same time, it can convert potential trial customers into new customers. [0003] Common software protection technologies are mainly divided into two categories: hard encryption and soft encryption. [0004] Hard encryption technology, that is, dongle or dongle. The advantage i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12
Inventor 李南熹李长山
Owner 航天信息软件技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products