Software authentication method and related device and system
An authentication method and authentication method technology, which are applied in the field of software authentication methods and related equipment and systems, and can solve the problems of limited application scenarios and low security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0036] In order to solve the problems of low security and limited application scenarios in the existing software authentication methods, Embodiment 1 of the present invention provides a software authentication method, such as figure 1 As shown in , it is a schematic flow chart of the software authentication method described in Embodiment 1 of the present invention. figure 1 It can be seen that the software authentication method described in Embodiment 1 of the present invention may include the following steps:
[0037] Step 101: the first server determines whether the authentication mode of the software to be authenticated is remote authentication.
[0038] Wherein, the software to be authenticated may generally be software installed in the first server, such as installed BSA service software, etc., which will not be repeated here.
[0039] Optionally, before step 101 is performed, after the software is installed, remote authentication or local authentication can be selected ...
Embodiment 2
[0084] Based on the same inventive concept as that of Embodiment 1 of the present invention, Embodiment 2 of the present invention provides another software authentication method, such as figure 2 As shown in , it is a schematic flow chart of the software authentication method described in Embodiment 2 of the present invention. figure 2 It can be seen that the software authentication method described in Embodiment 2 of the present invention may include the following steps:
[0085] Step 201: the second server receives the authentication request sent by the first server when the authentication mode of the software to be authenticated is determined to be remote authentication; the second server is locally installed with a dongle;
[0086] Wherein, the software to be authenticated may generally be software installed in the first server, such as installed BSA service software, etc., which will not be repeated here.
[0087] It should be noted that the second server can be any d...
Embodiment 3
[0103] Based on the same inventive concept as that of Embodiment 1 of the present invention, Embodiment 3 of the present invention provides a server, such as image 3 As shown in , it is a schematic structural diagram of the server described in Embodiment 3 of the present invention, which is represented by image 3 It can be seen that the server described in Embodiment 3 of the present invention may include:
[0104] A judging module 31, configured to determine whether the authentication mode of the software to be authenticated in the server is remote authentication;
[0105] The processing module 32 is used to send an authentication request to a remote server equipped with a dongle if it is determined that the authentication method of the software to be authenticated is remote authentication according to the judgment result of the judgment module 31; The first response message carrying the serial number of the dongle returned by the remote server, then determine the serial n...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com