CN102479305A - Software licensing verification method and system - Google Patents

Software licensing verification method and system Download PDF

Info

Publication number
CN102479305A
CN102479305A CN2010105628860A CN201010562886A CN102479305A CN 102479305 A CN102479305 A CN 102479305A CN 2010105628860 A CN2010105628860 A CN 2010105628860A CN 201010562886 A CN201010562886 A CN 201010562886A CN 102479305 A CN102479305 A CN 102479305A
Authority
CN
China
Prior art keywords
software
license
information
checking
passed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010105628860A
Other languages
Chinese (zh)
Inventor
刘学鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kingdee Software China Co Ltd
Original Assignee
Kingdee Software China Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kingdee Software China Co Ltd filed Critical Kingdee Software China Co Ltd
Priority to CN2010105628860A priority Critical patent/CN102479305A/en
Publication of CN102479305A publication Critical patent/CN102479305A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

A software licensing verification method includes the following steps: acquiring user information and software licensing information; building a licensing file according to the user information and the software licensing information; importing the licensing file to software; acquiring verification information of the software during use of the software and judging whether the verification information accords with the licensing file or not, if not, then the verification fails, if so, then the verification passes. The software licensing verification method is easy and quick in implementing while cost can be reduced. The invention further provides a software licensing verification system.

Description

The method and system of software license checking
[technical field]
The present invention relates to software license checking field, relate in particular to a kind of method and system of software license checking.
[background technology]
The piracy of software can be brought tremendous loss to software vendor, for stopping piracy, often when the user uses software, software is carried out License Authentication.The method of traditional software license checking adopts modes such as hardware encryption card, user cipher activation, registration code activation mostly.The mode of hardware encryption card is meant the encrypted card that adopts soft or hard to combine, and when the encrypted card of corresponding software is inserted in parallel interface (or USB interface) when lasting of computing machine, software license is verified and passed through.Modes such as user cipher activation and registration code activation are meant password or the active coding that obtains software license, pass through checking through input password or active coding.
Yet the method for these traditional software license checkings implement more complicated, and the making of hardware encryption card makes that also cost is higher owing to will in advance encrypted card, password and active coding etc. will be set.
[summary of the invention]
Based on this, be necessary to provide a kind of method that implements not only fast simple but also the software license checking that can reduce cost.
A kind of method of software license checking may further comprise the steps:
Obtain user profile and software license information;
Generate license file according to said user profile and software license information;
Said license file is imported software;
In the use of software, obtain the authorization information of software;
Judge whether said authorization information meets said license file, if then checking is passed through, otherwise checking is not passed through.
Preferably, said user profile comprises user's registration information and hardware information; Said authorization information is this machine hardware information of operating software;
The said step of judging whether said authorization information meets said license file is:
Judge said machine hardware information whether with said license file in hardware information identical, if then checking is passed through, otherwise checking is not passed through.
Preferably, said user profile comprises user's registration information and hardware information, and said authorization information comprises the informative abstract of the current permission of software;
Before the step that said license file is imported software, also comprise:
Calculate the informative abstract of said license file, and be recorded in the software license database;
The said step of judging whether authorization information meets license file is:
Whether the informative abstract of judging said current permission exists in said software license database, if then checking is passed through, otherwise checking is not passed through.
Preferably, said authorization information also comprises this machine hardware information of operating software;
Said method also comprises:
When the informative abstract of said current permission exists in said software license database, further judge said machine hardware information whether with said license file in hardware information identical, if identical, then checking is passed through, otherwise checking is not passed through.
Preferably, also comprise:
When the hardware information in said machine hardware information and the said license file is inequality, the user is joined in the blacklist according to said machine hardware information.
In addition, also be necessary to provide a kind of system that implements not only fast simple but also the software license checking that can reduce cost.
A kind of system of software license checking comprises:
The information acquisition module is used to obtain user profile and software license information;
The license file generation module generates license file according to said user profile and software license information;
Import module, be used for said license file is imported software;
Authentication module obtains the authorization information of software in the use of software, judge whether said authorization information meets said license file, if then checking is not passed through, otherwise checking is passed through.
Preferably, said user profile comprises user's registration information and hardware information; Said authorization information is this machine hardware information of operating software;
Said authentication module is used for also judging whether said machine hardware information be identical with the hardware information of said license file, if then checking is passed through, otherwise checking is not passed through.
Preferably, said user profile comprises user's registration information and hardware information; Said authorization information comprises the informative abstract of the current permission of software; Said system also comprises:
The informative abstract computing module is used for after the license file generation module generates license file, calculating the informative abstract of said license file;
The software license database writes down the informative abstract of said license file;
Said authentication module is used for also judging whether the informative abstract of the current permission of said software exists at said software license database, if then checking is passed through, otherwise checking is not passed through.
Preferably, said authorization information also comprises this machine hardware information of operating software;
Said authentication module also is used for informative abstract when the current permission of said software when said software license database exists; Further judge said machine hardware information whether with said license file in hardware information identical; If identical, then checking is passed through, otherwise checking is not passed through.
Preferably, said system also comprises:
The blacklist logging modle is used for when the hardware information of said machine hardware information and said license file is inequality, according to said machine hardware information the user being joined in the blacklist.
The method and system of above-mentioned software license checking; Through obtaining user profile and software license information; Generate license file according to user profile and software license information, license file is imported software, in the use of software, obtain the authorization information of software again; The license file of customization was then verified and is passed through before this authorization information met, otherwise checking is not passed through.Implement so simply fast, and owing to need not to make encrypted card or, effectively reduce cost in advance for the user is provided with password or active coding.
[description of drawings]
Fig. 1 is the method flow diagram of software license checking among the embodiment;
Fig. 2 is the method flow diagram of software license checking among another embodiment;
Fig. 3 is the structural representation of the system of software license checking among the embodiment;
Fig. 4 is the structural representation of the system of software license checking among another embodiment.
[embodiment]
Fig. 1 shows the method flow of a software license checking among the embodiment, and this method flow may further comprise the steps:
Step S102 obtains user profile and software license information.
In one embodiment, user profile comprises user's registration information and hardware information.Wherein, user's registration information is registered the relevant information that is provided after being meant user installation software, for example title, address etc.Hardware information is meant the hardware information of the computing machine of operating software, for example network interface card MAC (Medium/MediaAccess Control, medium access control) address, CPU sequence number, hard disk sequence number etc.Software license information comprises the permission that each functional module and each functional module in software type, the software are corresponding etc.
Step S104 generates license file according to user profile and software license information.
Above-mentioned user profile of obtaining and software license information can be recorded in the software license database.Generate the file of customization according to the user profile in the software license database and software license information, i.e. license file, this license file comprises user's registration information, hardware information and software license information etc.
Step S106 imports software with license file.
The license file that generates can return to the user, and the user imports license file through the import feature of software, then can normally use software behind the importing license file.
Step S108 obtains the authorization information of software in the use of software.
Step S110 judges whether authorization information meets license file, if then get into step S112, otherwise get into step S114.
Should be noted that and when some key function points of executive software, to obtain the current authorization information of software and judge whether to meet license file, also can when software carries out version updating, obtain the authorization information of software and judge whether to meet license file.
Step S112, checking is passed through.
Step S114, checking is not passed through.
In one embodiment, authorization information is this machine hardware information of operating software, and the detailed process of step S110 is: judge this machine hardware information whether with license file in hardware information identical, if then checking is passed through, otherwise checking is not passed through.This machine hardware information that obtains operating software comprises MAC Address of Network Card, CPU sequence number and hard disk sequence number etc.; MAC Address of Network Card, CPU sequence number and hard disk sequence number that these information before are recorded in it in the license file compare; If it is all identical; Then the checking pass through, if wherein have one inequality, then the checking do not pass through.
Collect user profile and software license information during through registration software; Generate license file according to user profile and software license information; License file is imported software; In the use of software, obtain the authorization information of software again, the license file of customization was then verified and is passed through before this authorization information met, otherwise checking is not passed through.Implement so simply fast, and owing to need not to make encrypted card or, effectively reduce cost in advance for the user is provided with password or active coding.
Fig. 2 shows the method flow of the software license checking among another embodiment, and this method flow may further comprise the steps:
Step S202 obtains user profile and software license information.
User profile comprises user's registration information and hardware information; The title of filling in when user's registration information is meant user's submit applications, registration etc.; Hardware information is meant the hardware information of the computing machine of operating software, for example MAC Address of Network Card, CPU sequence number, hard disk sequence number etc.Software license information comprises the permission that each functional module and each functional module in software type, the software are corresponding etc.
Step S204 generates license file according to user profile and software license information.
User profile of obtaining and software license information can be recorded in the software license database.
Step S206 calculates the informative abstract of license file, and is recorded in the software license database.
Informative abstract is the digital signature of file, and when the content changing of file, informative abstract then can change, and therefore can judge through informative abstract whether the current authenticating documents of software is identical with the license file of customization.In a preferred embodiment, license file is carried out MD5 calculate, obtain the MD5 value of license file, license file and corresponding MD5 value all are recorded in the software license database.
Step S208 imports software with license file.
Import feature through software imports software with license file, then can normally use software after importing successfully.
Step S210 obtains the informative abstract of the current permission of software in the use of software.
The current permission of software is meant the current license file when software normally uses.
Step S212 judges whether the informative abstract of the current permission of software exists in the software license database, if then get into step S214, otherwise get into step S220.
Because informative abstract has uniqueness; If the informative abstract of the current permission of software exists in the software license database; Explain that then the current permission of software is the license file of customization, checking is passed through, if the informative abstract of the current permission of software does not exist in the software license database; Current being permitted that software then is described not is customization, and checking do not pass through.This mode can prevent that the disabled user from forging license file; But because license file perhaps the informative abstract of file be recorded in the software license database; The license file of forging can be realized preventing pirate effect, particularly in the escalation process of software owing to be not recorded in the software license database; Because need carry out alternately, can effectively discern piracy software and the software license database is placed in the server with server.
Step S214 obtains this machine hardware information of operating software.
Step S216, judge this machine hardware information whether with license file in hardware information identical, if then get into step S218, otherwise get into step S220.
When the informative abstract of the current permission of software exists in the software license database; Explain that the current permission of software is correct; Need then further to judge whether this machine hardware information is identical with hardware information in the license file, can prevent effectively that the user from copying the license file of software to the behavior (behavior also is regarded as piracy) of the enterprising enforcement usefulness of other computing machines.
Step S228, checking is passed through.
Checking then can be continued normal the use through back software.
Step S220, checking is not passed through.
In one embodiment; When the hardware information in this machine hardware information and the license file is inequality; According to this machine hardware information the user is joined in the blacklist, because this machine hardware information comprises MAC Address of Network Card, CPU sequence number and the hard disk sequence number etc. of the computing machine of operating software.Can obtain user's specific address behind this machine of obtaining hardware information,, can take certain measure, for example forbid down loading updating etc., further play the purpose that prevents software piracy for the user in the blacklist.
Should be noted that among the above-mentioned steps S212, can when software carries out version updating, carry out judgement, also can regularly or when the user uses some key function points of software, carry out and judge.
Fig. 3 shows the system of software license checking among the embodiment, and this system comprises information acquisition module 10, license file generation module 20, imports module 30 and authentication module 40, wherein:
Information acquisition module 10 is used to obtain user profile and software license information.
In one embodiment, user profile comprises user's registration information and hardware information.User's registration information is registered the relevant information that is provided after being meant user installation software, for example title, address etc.Hardware information is meant the hardware information of the computing machine of operating software, for example MAC Address of Network Card, CPU sequence number, hard disk sequence number etc.Software license information comprises the permission that each functional module and each functional module in software type, the software are corresponding etc.
License file generation module 20 is used for generating license file according to user profile and software license information.
License file has comprised above-mentioned user profile and software license information, is the license file that the user customized.
Importing module 30 is used for license file is imported software.
Authentication module 40 is used for obtaining in the use of software the authorization information of software, judges whether authorization information meets license file, if then checking is passed through, otherwise checking is not passed through.
In one embodiment, authorization information is this machine hardware information of operating software, and authentication module 40 is used for also judging whether this this machine hardware information is identical with the hardware information of license file, if then checking is passed through, otherwise checking is not passed through.
Fig. 4 shows the system of the software license checking among another embodiment; This system is except comprising above-mentioned information acquisition module 10, license file generation module 20, importing module 30 and the authentication module 40; Also comprise informative abstract computing module 50, software license database 60 and blacklist logging modle 70, wherein:
Informative abstract computing module 50 is used for after license file generation module 20 generates license file, calculating the informative abstract of license file.
Informative abstract is the digital signature of file, and when the content changing of file, informative abstract then can change, and therefore can judge through informative abstract whether the current permission of software is identical with the license file of customization.In a preferred embodiment, informative abstract computing module 50 is used for that license file is carried out MD5 and calculates, and obtains the MD5 value of license file.
Software license database 60 is used to write down the informative abstract of license file.
Among this embodiment, authorization information comprises the informative abstract of the current permission of software.Authentication module 40 is used for also judging whether the informative abstract of the current permission of software exists at software license database 60, if identical, explains that then the current permission of software is the license file of customization, and checking is passed through, if inequality, then checking is not passed through.
In another embodiment, authorization information also comprises this machine hardware information of operating software.Authentication module 40 also is used for informative abstract when the current permission of software when software license database 60 exists, and judges further whether said machine hardware information be identical with hardware information in the license file, if then checking is passed through, otherwise checking is not passed through.
Blacklist logging modle 70 is used for when the hardware information of this machine hardware information and license file is inequality, and it is obstructed out-of-date promptly to verify, according to this machine hardware information the user is joined in the blacklist.
To being in the user in the blacklist, can take certain measure, for example forbid down loading updating etc., further play the purpose that prevents software piracy.
The above embodiment has only expressed several kinds of embodiments of the present invention, and it describes comparatively concrete and detailed, but can not therefore be interpreted as the restriction to claim of the present invention.Should be pointed out that for the person of ordinary skill of the art under the prerequisite that does not break away from the present invention's design, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection domain of patent of the present invention should be as the criterion with accompanying claims.

Claims (10)

1. the method for software license checking may further comprise the steps:
Obtain user profile and software license information;
Generate license file according to said user profile and software license information;
Said license file is imported software;
In the use of software, obtain the authorization information of software;
Judge whether said authorization information meets said license file, if then checking is passed through, otherwise checking is not passed through.
2. the method for software license checking according to claim 1 is characterized in that said user profile comprises user's registration information and hardware information; Said authorization information is this machine hardware information of operating software;
The said step of judging whether said authorization information meets said license file is:
Judge said machine hardware information whether with said license file in hardware information identical, if then checking is passed through, otherwise checking is not passed through.
3. the method for software license checking according to claim 1 is characterized in that said user profile comprises user's registration information and hardware information, and said authorization information comprises the informative abstract of the current permission of software;
Before the step that said license file is imported software, also comprise:
Calculate the informative abstract of said license file, and be recorded in the software license database;
The said step of judging whether authorization information meets license file is:
Whether the informative abstract of judging said current permission exists in said software license database, if then checking is passed through, otherwise checking is not passed through.
4. the method for software license checking according to claim 3 is characterized in that said authorization information also comprises this machine hardware information of operating software;
Said method also comprises:
When the informative abstract of said current permission exists in said software license database, further judge said machine hardware information whether with said license file in hardware information identical, if identical, then checking is passed through, otherwise checking is not passed through.
5. the method for software license checking according to claim 4 is characterized in that, also comprises:
When the hardware information in said machine hardware information and the said license file is inequality, the user is joined in the blacklist according to said machine hardware information.
6. the system of a software license checking is characterized in that, comprising:
The information acquisition module is used to obtain user profile and software license information;
The license file generation module generates license file according to said user profile and software license information;
Import module, be used for said license file is imported software;
Authentication module obtains the authorization information of software in the use of software, judge whether said authorization information meets said license file, if then checking is not passed through, otherwise checking is passed through.
7. the system of software license checking according to claim 6 is characterized in that said user profile comprises user's registration information and hardware information; Said authorization information is this machine hardware information of operating software;
Said authentication module is used for also judging whether said machine hardware information be identical with the hardware information of said license file, if then checking is passed through, otherwise checking is not passed through.
8. the system of software license checking according to claim 6 is characterized in that said user profile comprises user's registration information and hardware information; Said authorization information comprises the informative abstract of the current permission of software; Said system also comprises:
The informative abstract computing module is used for after the license file generation module generates license file, calculating the informative abstract of said license file;
The software license database writes down the informative abstract of said license file;
Said authentication module is used for also judging whether the informative abstract of the current permission of said software exists at said software license database, if then checking is passed through, otherwise checking is not passed through.
9. the system of software license checking according to claim 8 is characterized in that said authorization information also comprises this machine hardware information of operating software;
Said authentication module also is used for informative abstract when the current permission of said software when said software license database exists; Further judge said machine hardware information whether with said license file in hardware information identical; If identical, then checking is passed through, otherwise checking is not passed through.
10. the system of software license checking according to claim 9 is characterized in that said system also comprises:
The blacklist logging modle is used for when the hardware information of said machine hardware information and said license file is inequality, according to said machine hardware information the user being joined in the blacklist.
CN2010105628860A 2010-11-29 2010-11-29 Software licensing verification method and system Pending CN102479305A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010105628860A CN102479305A (en) 2010-11-29 2010-11-29 Software licensing verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010105628860A CN102479305A (en) 2010-11-29 2010-11-29 Software licensing verification method and system

Publications (1)

Publication Number Publication Date
CN102479305A true CN102479305A (en) 2012-05-30

Family

ID=46091945

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010105628860A Pending CN102479305A (en) 2010-11-29 2010-11-29 Software licensing verification method and system

Country Status (1)

Country Link
CN (1) CN102479305A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103268435A (en) * 2013-04-25 2013-08-28 福建伊时代信息科技股份有限公司 Intranet license generation method and system, and intranet license protection method and system
CN103473487A (en) * 2013-09-23 2013-12-25 中标软件有限公司 Product software network verification encryption method and product software network verification encryption system
CN103685471A (en) * 2013-11-21 2014-03-26 珠海金山网络游戏科技有限公司 Method and system for updating software client sides in monopoly mode
CN103812857A (en) * 2013-11-08 2014-05-21 汉柏科技有限公司 Method for realizing uniqueness license
CN103905390A (en) * 2012-12-26 2014-07-02 联想(北京)有限公司 Permission acquisition method, device, electronic equipment and system
CN103927463A (en) * 2014-05-07 2014-07-16 朱剑锋 Application software copyright protection system for gateway server
CN103995991A (en) * 2014-05-07 2014-08-20 华中师范大学 Method for binding hardware information and secret keys in software copyright protection
CN104700002A (en) * 2013-12-05 2015-06-10 航天信息软件技术有限公司 Software protecting, authorizing and registering method
CN104966024A (en) * 2015-03-11 2015-10-07 深圳市腾讯计算机系统有限公司 Database protection method and apparatus
CN106934257A (en) * 2015-12-30 2017-07-07 航天信息软件技术有限公司 A kind of program encryption methods and procedures encryption device
CN107885979A (en) * 2017-11-08 2018-04-06 江苏国泰新点软件有限公司 A kind of method, apparatus of software free trial, equipment on probation and storage medium
CN109543397A (en) * 2018-11-22 2019-03-29 福州符号信息科技有限公司 A kind of encryption authorization scheme of algorithms library
CN110175038A (en) * 2019-04-09 2019-08-27 北京深思数盾科技股份有限公司 The update method and device of soft-lock license
CN112667973A (en) * 2020-11-30 2021-04-16 新华三技术有限公司 Method and device for activating management software of network equipment
CN117390599A (en) * 2023-12-04 2024-01-12 深圳中安高科电子有限公司 Offline multi-device product license issuing and verifying method, system and device

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1621992A (en) * 2004-12-20 2005-06-01 四川大学 Method for software copyright protection
CN1704863A (en) * 2004-05-25 2005-12-07 华为技术有限公司 Licensing file generating method, software product protection method and system
CN1960363A (en) * 2006-09-12 2007-05-09 北京飞天诚信科技有限公司 Method and equipment for implementing remote updating information security devices through network
CN101060441A (en) * 2007-06-13 2007-10-24 华为技术有限公司 A method, equipment and system for controlling the upgrade of software version
CN101159754A (en) * 2007-09-28 2008-04-09 李华 Internet application management system operating on intelligent mobile terminal
CN101256607A (en) * 2008-03-10 2008-09-03 北京深思洛克数据保护中心 Method for remote updating and controlling use of software protection apparatus
CN101315653A (en) * 2007-05-30 2008-12-03 苗东利 Method for recognizing pirate operating system
CN101369303A (en) * 2008-10-13 2009-02-18 金蝶软件(中国)有限公司 Method and system for controlling concurrency user number
CN101404053A (en) * 2008-05-04 2009-04-08 北京深思洛克软件技术股份有限公司 Method for preventing repeatedly issuing software permission

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1704863A (en) * 2004-05-25 2005-12-07 华为技术有限公司 Licensing file generating method, software product protection method and system
CN1621992A (en) * 2004-12-20 2005-06-01 四川大学 Method for software copyright protection
CN1960363A (en) * 2006-09-12 2007-05-09 北京飞天诚信科技有限公司 Method and equipment for implementing remote updating information security devices through network
CN101315653A (en) * 2007-05-30 2008-12-03 苗东利 Method for recognizing pirate operating system
CN101060441A (en) * 2007-06-13 2007-10-24 华为技术有限公司 A method, equipment and system for controlling the upgrade of software version
CN101159754A (en) * 2007-09-28 2008-04-09 李华 Internet application management system operating on intelligent mobile terminal
CN101256607A (en) * 2008-03-10 2008-09-03 北京深思洛克数据保护中心 Method for remote updating and controlling use of software protection apparatus
CN101404053A (en) * 2008-05-04 2009-04-08 北京深思洛克软件技术股份有限公司 Method for preventing repeatedly issuing software permission
CN101369303A (en) * 2008-10-13 2009-02-18 金蝶软件(中国)有限公司 Method and system for controlling concurrency user number

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103905390A (en) * 2012-12-26 2014-07-02 联想(北京)有限公司 Permission acquisition method, device, electronic equipment and system
CN103905390B (en) * 2012-12-26 2017-05-24 联想(北京)有限公司 Permission acquisition method, device, electronic equipment and system
CN103268435A (en) * 2013-04-25 2013-08-28 福建伊时代信息科技股份有限公司 Intranet license generation method and system, and intranet license protection method and system
CN103268435B (en) * 2013-04-25 2016-07-06 福建伊时代信息科技股份有限公司 Intranet license generates method and system, intranet license protection method and system
CN103473487B (en) * 2013-09-23 2017-01-11 中标软件有限公司 Product software network verification encryption method and product software network verification encryption system
CN103473487A (en) * 2013-09-23 2013-12-25 中标软件有限公司 Product software network verification encryption method and product software network verification encryption system
CN103812857A (en) * 2013-11-08 2014-05-21 汉柏科技有限公司 Method for realizing uniqueness license
CN103685471A (en) * 2013-11-21 2014-03-26 珠海金山网络游戏科技有限公司 Method and system for updating software client sides in monopoly mode
CN103685471B (en) * 2013-11-21 2017-05-03 珠海金山网络游戏科技有限公司 Method and system for updating software client sides in monopoly mode
CN104700002A (en) * 2013-12-05 2015-06-10 航天信息软件技术有限公司 Software protecting, authorizing and registering method
CN103995991A (en) * 2014-05-07 2014-08-20 华中师范大学 Method for binding hardware information and secret keys in software copyright protection
CN103995991B (en) * 2014-05-07 2017-02-15 华中师范大学 Method for binding hardware information and secret keys in software copyright protection
CN103927463A (en) * 2014-05-07 2014-07-16 朱剑锋 Application software copyright protection system for gateway server
CN104966024A (en) * 2015-03-11 2015-10-07 深圳市腾讯计算机系统有限公司 Database protection method and apparatus
CN104966024B (en) * 2015-03-11 2018-08-03 深圳市腾讯计算机系统有限公司 A kind of method and device of protection database
CN106934257A (en) * 2015-12-30 2017-07-07 航天信息软件技术有限公司 A kind of program encryption methods and procedures encryption device
CN107885979A (en) * 2017-11-08 2018-04-06 江苏国泰新点软件有限公司 A kind of method, apparatus of software free trial, equipment on probation and storage medium
CN109543397A (en) * 2018-11-22 2019-03-29 福州符号信息科技有限公司 A kind of encryption authorization scheme of algorithms library
CN109543397B (en) * 2018-11-22 2022-02-11 福州符号信息科技有限公司 Method and system for encrypting and authorizing algorithm library
CN110175038A (en) * 2019-04-09 2019-08-27 北京深思数盾科技股份有限公司 The update method and device of soft-lock license
CN112667973A (en) * 2020-11-30 2021-04-16 新华三技术有限公司 Method and device for activating management software of network equipment
CN112667973B (en) * 2020-11-30 2023-12-26 新华三技术有限公司 Method and device for activating management software of network equipment
CN117390599A (en) * 2023-12-04 2024-01-12 深圳中安高科电子有限公司 Offline multi-device product license issuing and verifying method, system and device
CN117390599B (en) * 2023-12-04 2024-03-26 深圳中安高科电子有限公司 Offline multi-device product license issuing and verifying method, system and device

Similar Documents

Publication Publication Date Title
CN102479305A (en) Software licensing verification method and system
CN107770159B (en) Vehicle accident data recording method and related device and readable storage medium
CN111917773B (en) Service data processing method and device and server
CN100495421C (en) Authentication protection method based on USB device
CN102144193B (en) Method for granting authorization to access a computer-based object in an automation system, computer program, and automation system
CN105262717A (en) Network service security management method and device
CN106452764B (en) Method for automatically updating identification private key and password system
CA2561608C (en) System and method for registering entities for code signing services
CN106529218B (en) Application verification method and device
CN102946392A (en) URL (Uniform Resource Locator) data encrypted transmission method and system
CN110311787B (en) Authorization management method, system, device and computer readable storage medium
CN111200589A (en) Data protection method and system for alliance chain
CN103560883A (en) Safety identification method, between android application programs, based on user right
CN114186199B (en) License authorization method and device
CN113221128B (en) Account and password storage method and registration management system
CN113282944B (en) Intelligent lock unlocking method and device, electronic equipment and storage medium
CN113297560A (en) Identity authentication method, device and equipment based on block chain and readable storage medium
CN102685122B (en) The method of the software protection based on cloud server
CN104683299A (en) Control method for software registration, authentication server and terminal
US20090025061A1 (en) Conditional peer-to-peer trust in the absence of certificates pertaining to mutually trusted entities
CN105243311A (en) Fingerprint information safe calling method, fingerprint information safe calling device and mobile terminal
CN103336918B (en) Electronic hard disk system authorization method and device
CN108965335B (en) Method for preventing malicious access to login interface, electronic device and computer medium
US8755521B2 (en) Security method and system for media playback devices
CN114257376B (en) Digital certificate updating method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20120530