CN102479305A - Software licensing verification method and system - Google Patents
Software licensing verification method and system Download PDFInfo
- Publication number
- CN102479305A CN102479305A CN2010105628860A CN201010562886A CN102479305A CN 102479305 A CN102479305 A CN 102479305A CN 2010105628860 A CN2010105628860 A CN 2010105628860A CN 201010562886 A CN201010562886 A CN 201010562886A CN 102479305 A CN102479305 A CN 102479305A
- Authority
- CN
- China
- Prior art keywords
- software
- license
- information
- checking
- passed
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
A software licensing verification method includes the following steps: acquiring user information and software licensing information; building a licensing file according to the user information and the software licensing information; importing the licensing file to software; acquiring verification information of the software during use of the software and judging whether the verification information accords with the licensing file or not, if not, then the verification fails, if so, then the verification passes. The software licensing verification method is easy and quick in implementing while cost can be reduced. The invention further provides a software licensing verification system.
Description
[technical field]
The present invention relates to software license checking field, relate in particular to a kind of method and system of software license checking.
[background technology]
The piracy of software can be brought tremendous loss to software vendor, for stopping piracy, often when the user uses software, software is carried out License Authentication.The method of traditional software license checking adopts modes such as hardware encryption card, user cipher activation, registration code activation mostly.The mode of hardware encryption card is meant the encrypted card that adopts soft or hard to combine, and when the encrypted card of corresponding software is inserted in parallel interface (or USB interface) when lasting of computing machine, software license is verified and passed through.Modes such as user cipher activation and registration code activation are meant password or the active coding that obtains software license, pass through checking through input password or active coding.
Yet the method for these traditional software license checkings implement more complicated, and the making of hardware encryption card makes that also cost is higher owing to will in advance encrypted card, password and active coding etc. will be set.
[summary of the invention]
Based on this, be necessary to provide a kind of method that implements not only fast simple but also the software license checking that can reduce cost.
A kind of method of software license checking may further comprise the steps:
Obtain user profile and software license information;
Generate license file according to said user profile and software license information;
Said license file is imported software;
In the use of software, obtain the authorization information of software;
Judge whether said authorization information meets said license file, if then checking is passed through, otherwise checking is not passed through.
Preferably, said user profile comprises user's registration information and hardware information; Said authorization information is this machine hardware information of operating software;
The said step of judging whether said authorization information meets said license file is:
Judge said machine hardware information whether with said license file in hardware information identical, if then checking is passed through, otherwise checking is not passed through.
Preferably, said user profile comprises user's registration information and hardware information, and said authorization information comprises the informative abstract of the current permission of software;
Before the step that said license file is imported software, also comprise:
Calculate the informative abstract of said license file, and be recorded in the software license database;
The said step of judging whether authorization information meets license file is:
Whether the informative abstract of judging said current permission exists in said software license database, if then checking is passed through, otherwise checking is not passed through.
Preferably, said authorization information also comprises this machine hardware information of operating software;
Said method also comprises:
When the informative abstract of said current permission exists in said software license database, further judge said machine hardware information whether with said license file in hardware information identical, if identical, then checking is passed through, otherwise checking is not passed through.
Preferably, also comprise:
When the hardware information in said machine hardware information and the said license file is inequality, the user is joined in the blacklist according to said machine hardware information.
In addition, also be necessary to provide a kind of system that implements not only fast simple but also the software license checking that can reduce cost.
A kind of system of software license checking comprises:
The information acquisition module is used to obtain user profile and software license information;
The license file generation module generates license file according to said user profile and software license information;
Import module, be used for said license file is imported software;
Authentication module obtains the authorization information of software in the use of software, judge whether said authorization information meets said license file, if then checking is not passed through, otherwise checking is passed through.
Preferably, said user profile comprises user's registration information and hardware information; Said authorization information is this machine hardware information of operating software;
Said authentication module is used for also judging whether said machine hardware information be identical with the hardware information of said license file, if then checking is passed through, otherwise checking is not passed through.
Preferably, said user profile comprises user's registration information and hardware information; Said authorization information comprises the informative abstract of the current permission of software; Said system also comprises:
The informative abstract computing module is used for after the license file generation module generates license file, calculating the informative abstract of said license file;
The software license database writes down the informative abstract of said license file;
Said authentication module is used for also judging whether the informative abstract of the current permission of said software exists at said software license database, if then checking is passed through, otherwise checking is not passed through.
Preferably, said authorization information also comprises this machine hardware information of operating software;
Said authentication module also is used for informative abstract when the current permission of said software when said software license database exists; Further judge said machine hardware information whether with said license file in hardware information identical; If identical, then checking is passed through, otherwise checking is not passed through.
Preferably, said system also comprises:
The blacklist logging modle is used for when the hardware information of said machine hardware information and said license file is inequality, according to said machine hardware information the user being joined in the blacklist.
The method and system of above-mentioned software license checking; Through obtaining user profile and software license information; Generate license file according to user profile and software license information, license file is imported software, in the use of software, obtain the authorization information of software again; The license file of customization was then verified and is passed through before this authorization information met, otherwise checking is not passed through.Implement so simply fast, and owing to need not to make encrypted card or, effectively reduce cost in advance for the user is provided with password or active coding.
[description of drawings]
Fig. 1 is the method flow diagram of software license checking among the embodiment;
Fig. 2 is the method flow diagram of software license checking among another embodiment;
Fig. 3 is the structural representation of the system of software license checking among the embodiment;
Fig. 4 is the structural representation of the system of software license checking among another embodiment.
[embodiment]
Fig. 1 shows the method flow of a software license checking among the embodiment, and this method flow may further comprise the steps:
Step S102 obtains user profile and software license information.
In one embodiment, user profile comprises user's registration information and hardware information.Wherein, user's registration information is registered the relevant information that is provided after being meant user installation software, for example title, address etc.Hardware information is meant the hardware information of the computing machine of operating software, for example network interface card MAC (Medium/MediaAccess Control, medium access control) address, CPU sequence number, hard disk sequence number etc.Software license information comprises the permission that each functional module and each functional module in software type, the software are corresponding etc.
Step S104 generates license file according to user profile and software license information.
Above-mentioned user profile of obtaining and software license information can be recorded in the software license database.Generate the file of customization according to the user profile in the software license database and software license information, i.e. license file, this license file comprises user's registration information, hardware information and software license information etc.
Step S106 imports software with license file.
The license file that generates can return to the user, and the user imports license file through the import feature of software, then can normally use software behind the importing license file.
Step S108 obtains the authorization information of software in the use of software.
Step S110 judges whether authorization information meets license file, if then get into step S112, otherwise get into step S114.
Should be noted that and when some key function points of executive software, to obtain the current authorization information of software and judge whether to meet license file, also can when software carries out version updating, obtain the authorization information of software and judge whether to meet license file.
Step S112, checking is passed through.
Step S114, checking is not passed through.
In one embodiment, authorization information is this machine hardware information of operating software, and the detailed process of step S110 is: judge this machine hardware information whether with license file in hardware information identical, if then checking is passed through, otherwise checking is not passed through.This machine hardware information that obtains operating software comprises MAC Address of Network Card, CPU sequence number and hard disk sequence number etc.; MAC Address of Network Card, CPU sequence number and hard disk sequence number that these information before are recorded in it in the license file compare; If it is all identical; Then the checking pass through, if wherein have one inequality, then the checking do not pass through.
Collect user profile and software license information during through registration software; Generate license file according to user profile and software license information; License file is imported software; In the use of software, obtain the authorization information of software again, the license file of customization was then verified and is passed through before this authorization information met, otherwise checking is not passed through.Implement so simply fast, and owing to need not to make encrypted card or, effectively reduce cost in advance for the user is provided with password or active coding.
Fig. 2 shows the method flow of the software license checking among another embodiment, and this method flow may further comprise the steps:
Step S202 obtains user profile and software license information.
User profile comprises user's registration information and hardware information; The title of filling in when user's registration information is meant user's submit applications, registration etc.; Hardware information is meant the hardware information of the computing machine of operating software, for example MAC Address of Network Card, CPU sequence number, hard disk sequence number etc.Software license information comprises the permission that each functional module and each functional module in software type, the software are corresponding etc.
Step S204 generates license file according to user profile and software license information.
User profile of obtaining and software license information can be recorded in the software license database.
Step S206 calculates the informative abstract of license file, and is recorded in the software license database.
Informative abstract is the digital signature of file, and when the content changing of file, informative abstract then can change, and therefore can judge through informative abstract whether the current authenticating documents of software is identical with the license file of customization.In a preferred embodiment, license file is carried out MD5 calculate, obtain the MD5 value of license file, license file and corresponding MD5 value all are recorded in the software license database.
Step S208 imports software with license file.
Import feature through software imports software with license file, then can normally use software after importing successfully.
Step S210 obtains the informative abstract of the current permission of software in the use of software.
The current permission of software is meant the current license file when software normally uses.
Step S212 judges whether the informative abstract of the current permission of software exists in the software license database, if then get into step S214, otherwise get into step S220.
Because informative abstract has uniqueness; If the informative abstract of the current permission of software exists in the software license database; Explain that then the current permission of software is the license file of customization, checking is passed through, if the informative abstract of the current permission of software does not exist in the software license database; Current being permitted that software then is described not is customization, and checking do not pass through.This mode can prevent that the disabled user from forging license file; But because license file perhaps the informative abstract of file be recorded in the software license database; The license file of forging can be realized preventing pirate effect, particularly in the escalation process of software owing to be not recorded in the software license database; Because need carry out alternately, can effectively discern piracy software and the software license database is placed in the server with server.
Step S214 obtains this machine hardware information of operating software.
Step S216, judge this machine hardware information whether with license file in hardware information identical, if then get into step S218, otherwise get into step S220.
When the informative abstract of the current permission of software exists in the software license database; Explain that the current permission of software is correct; Need then further to judge whether this machine hardware information is identical with hardware information in the license file, can prevent effectively that the user from copying the license file of software to the behavior (behavior also is regarded as piracy) of the enterprising enforcement usefulness of other computing machines.
Step S228, checking is passed through.
Checking then can be continued normal the use through back software.
Step S220, checking is not passed through.
In one embodiment; When the hardware information in this machine hardware information and the license file is inequality; According to this machine hardware information the user is joined in the blacklist, because this machine hardware information comprises MAC Address of Network Card, CPU sequence number and the hard disk sequence number etc. of the computing machine of operating software.Can obtain user's specific address behind this machine of obtaining hardware information,, can take certain measure, for example forbid down loading updating etc., further play the purpose that prevents software piracy for the user in the blacklist.
Should be noted that among the above-mentioned steps S212, can when software carries out version updating, carry out judgement, also can regularly or when the user uses some key function points of software, carry out and judge.
Fig. 3 shows the system of software license checking among the embodiment, and this system comprises information acquisition module 10, license file generation module 20, imports module 30 and authentication module 40, wherein:
In one embodiment, user profile comprises user's registration information and hardware information.User's registration information is registered the relevant information that is provided after being meant user installation software, for example title, address etc.Hardware information is meant the hardware information of the computing machine of operating software, for example MAC Address of Network Card, CPU sequence number, hard disk sequence number etc.Software license information comprises the permission that each functional module and each functional module in software type, the software are corresponding etc.
License file generation module 20 is used for generating license file according to user profile and software license information.
License file has comprised above-mentioned user profile and software license information, is the license file that the user customized.
Importing module 30 is used for license file is imported software.
In one embodiment, authorization information is this machine hardware information of operating software, and authentication module 40 is used for also judging whether this this machine hardware information is identical with the hardware information of license file, if then checking is passed through, otherwise checking is not passed through.
Fig. 4 shows the system of the software license checking among another embodiment; This system is except comprising above-mentioned information acquisition module 10, license file generation module 20, importing module 30 and the authentication module 40; Also comprise informative abstract computing module 50, software license database 60 and blacklist logging modle 70, wherein:
Informative abstract computing module 50 is used for after license file generation module 20 generates license file, calculating the informative abstract of license file.
Informative abstract is the digital signature of file, and when the content changing of file, informative abstract then can change, and therefore can judge through informative abstract whether the current permission of software is identical with the license file of customization.In a preferred embodiment, informative abstract computing module 50 is used for that license file is carried out MD5 and calculates, and obtains the MD5 value of license file.
Among this embodiment, authorization information comprises the informative abstract of the current permission of software.Authentication module 40 is used for also judging whether the informative abstract of the current permission of software exists at software license database 60, if identical, explains that then the current permission of software is the license file of customization, and checking is passed through, if inequality, then checking is not passed through.
In another embodiment, authorization information also comprises this machine hardware information of operating software.Authentication module 40 also is used for informative abstract when the current permission of software when software license database 60 exists, and judges further whether said machine hardware information be identical with hardware information in the license file, if then checking is passed through, otherwise checking is not passed through.
To being in the user in the blacklist, can take certain measure, for example forbid down loading updating etc., further play the purpose that prevents software piracy.
The above embodiment has only expressed several kinds of embodiments of the present invention, and it describes comparatively concrete and detailed, but can not therefore be interpreted as the restriction to claim of the present invention.Should be pointed out that for the person of ordinary skill of the art under the prerequisite that does not break away from the present invention's design, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection domain of patent of the present invention should be as the criterion with accompanying claims.
Claims (10)
1. the method for software license checking may further comprise the steps:
Obtain user profile and software license information;
Generate license file according to said user profile and software license information;
Said license file is imported software;
In the use of software, obtain the authorization information of software;
Judge whether said authorization information meets said license file, if then checking is passed through, otherwise checking is not passed through.
2. the method for software license checking according to claim 1 is characterized in that said user profile comprises user's registration information and hardware information; Said authorization information is this machine hardware information of operating software;
The said step of judging whether said authorization information meets said license file is:
Judge said machine hardware information whether with said license file in hardware information identical, if then checking is passed through, otherwise checking is not passed through.
3. the method for software license checking according to claim 1 is characterized in that said user profile comprises user's registration information and hardware information, and said authorization information comprises the informative abstract of the current permission of software;
Before the step that said license file is imported software, also comprise:
Calculate the informative abstract of said license file, and be recorded in the software license database;
The said step of judging whether authorization information meets license file is:
Whether the informative abstract of judging said current permission exists in said software license database, if then checking is passed through, otherwise checking is not passed through.
4. the method for software license checking according to claim 3 is characterized in that said authorization information also comprises this machine hardware information of operating software;
Said method also comprises:
When the informative abstract of said current permission exists in said software license database, further judge said machine hardware information whether with said license file in hardware information identical, if identical, then checking is passed through, otherwise checking is not passed through.
5. the method for software license checking according to claim 4 is characterized in that, also comprises:
When the hardware information in said machine hardware information and the said license file is inequality, the user is joined in the blacklist according to said machine hardware information.
6. the system of a software license checking is characterized in that, comprising:
The information acquisition module is used to obtain user profile and software license information;
The license file generation module generates license file according to said user profile and software license information;
Import module, be used for said license file is imported software;
Authentication module obtains the authorization information of software in the use of software, judge whether said authorization information meets said license file, if then checking is not passed through, otherwise checking is passed through.
7. the system of software license checking according to claim 6 is characterized in that said user profile comprises user's registration information and hardware information; Said authorization information is this machine hardware information of operating software;
Said authentication module is used for also judging whether said machine hardware information be identical with the hardware information of said license file, if then checking is passed through, otherwise checking is not passed through.
8. the system of software license checking according to claim 6 is characterized in that said user profile comprises user's registration information and hardware information; Said authorization information comprises the informative abstract of the current permission of software; Said system also comprises:
The informative abstract computing module is used for after the license file generation module generates license file, calculating the informative abstract of said license file;
The software license database writes down the informative abstract of said license file;
Said authentication module is used for also judging whether the informative abstract of the current permission of said software exists at said software license database, if then checking is passed through, otherwise checking is not passed through.
9. the system of software license checking according to claim 8 is characterized in that said authorization information also comprises this machine hardware information of operating software;
Said authentication module also is used for informative abstract when the current permission of said software when said software license database exists; Further judge said machine hardware information whether with said license file in hardware information identical; If identical, then checking is passed through, otherwise checking is not passed through.
10. the system of software license checking according to claim 9 is characterized in that said system also comprises:
The blacklist logging modle is used for when the hardware information of said machine hardware information and said license file is inequality, according to said machine hardware information the user being joined in the blacklist.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010105628860A CN102479305A (en) | 2010-11-29 | 2010-11-29 | Software licensing verification method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010105628860A CN102479305A (en) | 2010-11-29 | 2010-11-29 | Software licensing verification method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102479305A true CN102479305A (en) | 2012-05-30 |
Family
ID=46091945
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010105628860A Pending CN102479305A (en) | 2010-11-29 | 2010-11-29 | Software licensing verification method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102479305A (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103268435A (en) * | 2013-04-25 | 2013-08-28 | 福建伊时代信息科技股份有限公司 | Intranet license generation method and system, and intranet license protection method and system |
CN103473487A (en) * | 2013-09-23 | 2013-12-25 | 中标软件有限公司 | Product software network verification encryption method and product software network verification encryption system |
CN103685471A (en) * | 2013-11-21 | 2014-03-26 | 珠海金山网络游戏科技有限公司 | Method and system for updating software client sides in monopoly mode |
CN103812857A (en) * | 2013-11-08 | 2014-05-21 | 汉柏科技有限公司 | Method for realizing uniqueness license |
CN103905390A (en) * | 2012-12-26 | 2014-07-02 | 联想(北京)有限公司 | Permission acquisition method, device, electronic equipment and system |
CN103927463A (en) * | 2014-05-07 | 2014-07-16 | 朱剑锋 | Application software copyright protection system for gateway server |
CN103995991A (en) * | 2014-05-07 | 2014-08-20 | 华中师范大学 | Method for binding hardware information and secret keys in software copyright protection |
CN104700002A (en) * | 2013-12-05 | 2015-06-10 | 航天信息软件技术有限公司 | Software protecting, authorizing and registering method |
CN104966024A (en) * | 2015-03-11 | 2015-10-07 | 深圳市腾讯计算机系统有限公司 | Database protection method and apparatus |
CN106934257A (en) * | 2015-12-30 | 2017-07-07 | 航天信息软件技术有限公司 | A kind of program encryption methods and procedures encryption device |
CN107885979A (en) * | 2017-11-08 | 2018-04-06 | 江苏国泰新点软件有限公司 | A kind of method, apparatus of software free trial, equipment on probation and storage medium |
CN109543397A (en) * | 2018-11-22 | 2019-03-29 | 福州符号信息科技有限公司 | A kind of encryption authorization scheme of algorithms library |
CN110175038A (en) * | 2019-04-09 | 2019-08-27 | 北京深思数盾科技股份有限公司 | The update method and device of soft-lock license |
CN112667973A (en) * | 2020-11-30 | 2021-04-16 | 新华三技术有限公司 | Method and device for activating management software of network equipment |
CN117390599A (en) * | 2023-12-04 | 2024-01-12 | 深圳中安高科电子有限公司 | Offline multi-device product license issuing and verifying method, system and device |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1621992A (en) * | 2004-12-20 | 2005-06-01 | 四川大学 | Method for software copyright protection |
CN1704863A (en) * | 2004-05-25 | 2005-12-07 | 华为技术有限公司 | Licensing file generating method, software product protection method and system |
CN1960363A (en) * | 2006-09-12 | 2007-05-09 | 北京飞天诚信科技有限公司 | Method and equipment for implementing remote updating information security devices through network |
CN101060441A (en) * | 2007-06-13 | 2007-10-24 | 华为技术有限公司 | A method, equipment and system for controlling the upgrade of software version |
CN101159754A (en) * | 2007-09-28 | 2008-04-09 | 李华 | Internet application management system operating on intelligent mobile terminal |
CN101256607A (en) * | 2008-03-10 | 2008-09-03 | 北京深思洛克数据保护中心 | Method for remote updating and controlling use of software protection apparatus |
CN101315653A (en) * | 2007-05-30 | 2008-12-03 | 苗东利 | Method for recognizing pirate operating system |
CN101369303A (en) * | 2008-10-13 | 2009-02-18 | 金蝶软件(中国)有限公司 | Method and system for controlling concurrency user number |
CN101404053A (en) * | 2008-05-04 | 2009-04-08 | 北京深思洛克软件技术股份有限公司 | Method for preventing repeatedly issuing software permission |
-
2010
- 2010-11-29 CN CN2010105628860A patent/CN102479305A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1704863A (en) * | 2004-05-25 | 2005-12-07 | 华为技术有限公司 | Licensing file generating method, software product protection method and system |
CN1621992A (en) * | 2004-12-20 | 2005-06-01 | 四川大学 | Method for software copyright protection |
CN1960363A (en) * | 2006-09-12 | 2007-05-09 | 北京飞天诚信科技有限公司 | Method and equipment for implementing remote updating information security devices through network |
CN101315653A (en) * | 2007-05-30 | 2008-12-03 | 苗东利 | Method for recognizing pirate operating system |
CN101060441A (en) * | 2007-06-13 | 2007-10-24 | 华为技术有限公司 | A method, equipment and system for controlling the upgrade of software version |
CN101159754A (en) * | 2007-09-28 | 2008-04-09 | 李华 | Internet application management system operating on intelligent mobile terminal |
CN101256607A (en) * | 2008-03-10 | 2008-09-03 | 北京深思洛克数据保护中心 | Method for remote updating and controlling use of software protection apparatus |
CN101404053A (en) * | 2008-05-04 | 2009-04-08 | 北京深思洛克软件技术股份有限公司 | Method for preventing repeatedly issuing software permission |
CN101369303A (en) * | 2008-10-13 | 2009-02-18 | 金蝶软件(中国)有限公司 | Method and system for controlling concurrency user number |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103905390A (en) * | 2012-12-26 | 2014-07-02 | 联想(北京)有限公司 | Permission acquisition method, device, electronic equipment and system |
CN103905390B (en) * | 2012-12-26 | 2017-05-24 | 联想(北京)有限公司 | Permission acquisition method, device, electronic equipment and system |
CN103268435A (en) * | 2013-04-25 | 2013-08-28 | 福建伊时代信息科技股份有限公司 | Intranet license generation method and system, and intranet license protection method and system |
CN103268435B (en) * | 2013-04-25 | 2016-07-06 | 福建伊时代信息科技股份有限公司 | Intranet license generates method and system, intranet license protection method and system |
CN103473487B (en) * | 2013-09-23 | 2017-01-11 | 中标软件有限公司 | Product software network verification encryption method and product software network verification encryption system |
CN103473487A (en) * | 2013-09-23 | 2013-12-25 | 中标软件有限公司 | Product software network verification encryption method and product software network verification encryption system |
CN103812857A (en) * | 2013-11-08 | 2014-05-21 | 汉柏科技有限公司 | Method for realizing uniqueness license |
CN103685471A (en) * | 2013-11-21 | 2014-03-26 | 珠海金山网络游戏科技有限公司 | Method and system for updating software client sides in monopoly mode |
CN103685471B (en) * | 2013-11-21 | 2017-05-03 | 珠海金山网络游戏科技有限公司 | Method and system for updating software client sides in monopoly mode |
CN104700002A (en) * | 2013-12-05 | 2015-06-10 | 航天信息软件技术有限公司 | Software protecting, authorizing and registering method |
CN103995991A (en) * | 2014-05-07 | 2014-08-20 | 华中师范大学 | Method for binding hardware information and secret keys in software copyright protection |
CN103995991B (en) * | 2014-05-07 | 2017-02-15 | 华中师范大学 | Method for binding hardware information and secret keys in software copyright protection |
CN103927463A (en) * | 2014-05-07 | 2014-07-16 | 朱剑锋 | Application software copyright protection system for gateway server |
CN104966024A (en) * | 2015-03-11 | 2015-10-07 | 深圳市腾讯计算机系统有限公司 | Database protection method and apparatus |
CN104966024B (en) * | 2015-03-11 | 2018-08-03 | 深圳市腾讯计算机系统有限公司 | A kind of method and device of protection database |
CN106934257A (en) * | 2015-12-30 | 2017-07-07 | 航天信息软件技术有限公司 | A kind of program encryption methods and procedures encryption device |
CN107885979A (en) * | 2017-11-08 | 2018-04-06 | 江苏国泰新点软件有限公司 | A kind of method, apparatus of software free trial, equipment on probation and storage medium |
CN109543397A (en) * | 2018-11-22 | 2019-03-29 | 福州符号信息科技有限公司 | A kind of encryption authorization scheme of algorithms library |
CN109543397B (en) * | 2018-11-22 | 2022-02-11 | 福州符号信息科技有限公司 | Method and system for encrypting and authorizing algorithm library |
CN110175038A (en) * | 2019-04-09 | 2019-08-27 | 北京深思数盾科技股份有限公司 | The update method and device of soft-lock license |
CN112667973A (en) * | 2020-11-30 | 2021-04-16 | 新华三技术有限公司 | Method and device for activating management software of network equipment |
CN112667973B (en) * | 2020-11-30 | 2023-12-26 | 新华三技术有限公司 | Method and device for activating management software of network equipment |
CN117390599A (en) * | 2023-12-04 | 2024-01-12 | 深圳中安高科电子有限公司 | Offline multi-device product license issuing and verifying method, system and device |
CN117390599B (en) * | 2023-12-04 | 2024-03-26 | 深圳中安高科电子有限公司 | Offline multi-device product license issuing and verifying method, system and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102479305A (en) | Software licensing verification method and system | |
CN107770159B (en) | Vehicle accident data recording method and related device and readable storage medium | |
CN111917773B (en) | Service data processing method and device and server | |
CN100495421C (en) | Authentication protection method based on USB device | |
CN102144193B (en) | Method for granting authorization to access a computer-based object in an automation system, computer program, and automation system | |
CN105262717A (en) | Network service security management method and device | |
CN106452764B (en) | Method for automatically updating identification private key and password system | |
CA2561608C (en) | System and method for registering entities for code signing services | |
CN106529218B (en) | Application verification method and device | |
CN102946392A (en) | URL (Uniform Resource Locator) data encrypted transmission method and system | |
CN110311787B (en) | Authorization management method, system, device and computer readable storage medium | |
CN111200589A (en) | Data protection method and system for alliance chain | |
CN103560883A (en) | Safety identification method, between android application programs, based on user right | |
CN114186199B (en) | License authorization method and device | |
CN113221128B (en) | Account and password storage method and registration management system | |
CN113282944B (en) | Intelligent lock unlocking method and device, electronic equipment and storage medium | |
CN113297560A (en) | Identity authentication method, device and equipment based on block chain and readable storage medium | |
CN102685122B (en) | The method of the software protection based on cloud server | |
CN104683299A (en) | Control method for software registration, authentication server and terminal | |
US20090025061A1 (en) | Conditional peer-to-peer trust in the absence of certificates pertaining to mutually trusted entities | |
CN105243311A (en) | Fingerprint information safe calling method, fingerprint information safe calling device and mobile terminal | |
CN103336918B (en) | Electronic hard disk system authorization method and device | |
CN108965335B (en) | Method for preventing malicious access to login interface, electronic device and computer medium | |
US8755521B2 (en) | Security method and system for media playback devices | |
CN114257376B (en) | Digital certificate updating method, device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20120530 |