Software authorization method, system and device

A technology of software authorization and software, applied in the direction of program/content distribution protection, instruments, electronic digital data processing, etc., which can solve the problems of poor user experience and high cost of use

Active Publication Date: 2018-06-05
SHENZHEN A&E INTELLIGENT TECH INST CO LTD
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for some software users, they actually only need to use a certain commercial software in the short term, but do not need to use it for a long time. However, in the existing actual situation, these short-term users can only choose to spend more money...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software authorization method, system and device
  • Software authorization method, system and device
  • Software authorization method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0092] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0093] The embodiment of the present invention discloses a software authorization method, see figure 1 As shown, the method includes:

[0094] Step S11: before the user terminal activates the target software, acquire the hardware information of the user terminal and the user level corresponding to the user terminal.

[0095] It can be understood that, in this embodiment, the hardware information of the user terminal and the user level corresponding to the use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A software authorization method, system and device. The method comprises: before a user terminal activates target software, acquiring hardware information about the user terminal and a user level corresponding to the user terminal (S11); determining corresponding software usage duration information according to the user level (S12); generating a corresponding authorization file by using the hardware information and the software usage duration information (S13); and sending the authorization file to the user terminal so as to activate the target software on the user terminal by using the authorization file (S14). Authorization files with different software usage duration information can be generated according to different user levels, so that a software user can acquire an authorization file with corresponding software usage duration information by means of purchasing according to the actual requirements thereof, thereby avoiding unnecessary waste, that is, the user's demand for using software according to requirements can be satisfied, and the software usage cost of the user is reduced.

Description

technical field [0001] The invention relates to the technical field of software security, in particular to a software authorization method, system and equipment. Background technique [0002] At present, in the software industry, software developers use various methods and techniques to protect software in order to protect their own interests, so that users need to obtain software authorization before they can use the software normally. [0003] The goal of software authorization is to allow software users to use the software according to the purchased license. At present, commercial software usually adopts the registration code authorization method to ensure that the software is not stolen. Common registration code authorization methods include the following: installation serial number method, user name + serial number method, online registration method and activation code method, etc. Usually, in the field of industrial application software, activation codes are mostly us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/10G06F21/12
CPCG06F21/105G06F21/121G06F21/10G06F21/12
Inventor 王春晓
Owner SHENZHEN A&E INTELLIGENT TECH INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products