Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A software authentication method and related equipment and system

Active Publication Date: 2018-05-25
NSFOCUS INFORMATION TECHNOLOGY CO LTD +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Embodiments of the present invention provide a software authentication method and related equipment and systems to solve the problems of low security or limited application scenarios in existing software authentication methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A software authentication method and related equipment and system
  • A software authentication method and related equipment and system
  • A software authentication method and related equipment and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] In order to solve the problems of low security and limited application scenarios in the existing software authentication methods, Embodiment 1 of the present invention provides a software authentication method, such as figure 1 As shown in , it is a schematic flow chart of the software authentication method described in Embodiment 1 of the present invention. figure 1 It can be seen that the software authentication method described in Embodiment 1 of the present invention may include the following steps:

[0037] Step 101: the first server determines whether the authentication mode of the software to be authenticated is remote authentication.

[0038] Wherein, the software to be authenticated may generally be software installed in the first server, such as installed BSA service software, etc., which will not be repeated here.

[0039] Optionally, before step 101 is performed, after the software is installed, remote authentication or local authentication can be selected ...

Embodiment 2

[0084] Based on the same inventive concept as that of Embodiment 1 of the present invention, Embodiment 2 of the present invention provides another software authentication method, such as figure 2 As shown in , it is a schematic flow chart of the software authentication method described in Embodiment 2 of the present invention. figure 2 It can be seen that the software authentication method described in Embodiment 2 of the present invention may include the following steps:

[0085] Step 201: the second server receives the authentication request sent by the first server when the authentication mode of the software to be authenticated is determined to be remote authentication; the second server is locally installed with a dongle;

[0086] Wherein, the software to be authenticated may generally be software installed in the first server, such as installed BSA service software, etc., which will not be repeated here.

[0087] It should be noted that the second server can be any d...

Embodiment 3

[0103] Based on the same inventive concept as that of Embodiment 1 of the present invention, Embodiment 3 of the present invention provides a server, such as image 3 As shown in , it is a schematic structural diagram of the server described in Embodiment 3 of the present invention, which is represented by image 3 It can be seen that the server described in Embodiment 3 of the present invention may include:

[0104] A judging module 31, configured to determine whether the authentication mode of the software to be authenticated in the server is remote authentication;

[0105] The processing module 32 is used to send an authentication request to a remote server equipped with a dongle if it is determined that the authentication method of the software to be authenticated is remote authentication according to the judgment result of the judgment module 31; The first response message carrying the serial number of the dongle returned by the remote server, then determine the serial n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a software authentication method and related equipment and system. If the first server determines that the authentication method of the software to be authenticated is remote authentication, it can send an authentication request to the second server installed with a dongle, and upon receiving When the second server returns the first response message carrying the serial number of the dongle, determine the sequence of the software certificate of the software to be certified according to the serial number of the dongle carried in the first response message number is consistent with the serial number of the dongle, and if they are consistent, it is determined that the software to be certified is successfully certified; wherein, the first response message is that the second server determines that the first server is compatible with the When the designated server bound to the second server is specified, it is returned to the first server. Therefore, on the basis of ensuring the security of software authorization, the application scenarios of dongle authentication are expanded, and the system compatibility is improved.

Description

technical field [0001] The invention relates to the field of software authentication, in particular to a software authentication method and related equipment and systems. Background technique [0002] In order to protect the copyright of software and other products and the interests of manufacturers, when users install and use software on computers, etc., they usually need to perform software certification. Only after the certification is successful, the user can use the software. [0003] Currently, there are two commonly used software authentication methods in the industry: [0004] The first is to sell the certificate serial number, that is, when the user purchases the software, the manufacturer will provide a valid serial number, so that when the user installs the software, the purchased serial number can be used to authenticate the software, thereby ensuring the copyright of the software and manufacturer's interests. However, under normal circumstances, users can obta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/10
CPCG06F21/105G06F21/107
Inventor 朱宝祥
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products