CN102799836A - Software promotion method - Google Patents

Software promotion method Download PDF

Info

Publication number
CN102799836A
CN102799836A CN2012102209760A CN201210220976A CN102799836A CN 102799836 A CN102799836 A CN 102799836A CN 2012102209760 A CN2012102209760 A CN 2012102209760A CN 201210220976 A CN201210220976 A CN 201210220976A CN 102799836 A CN102799836 A CN 102799836A
Authority
CN
China
Prior art keywords
software
promoted
recommending
channel
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012102209760A
Other languages
Chinese (zh)
Other versions
CN102799836B (en
Inventor
吴东辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weihai high tech Park Operation Management Co., Ltd
Original Assignee
吴东辉
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 吴东辉 filed Critical 吴东辉
Priority to CN201210220976.0A priority Critical patent/CN102799836B/en
Publication of CN102799836A publication Critical patent/CN102799836A/en
Application granted granted Critical
Publication of CN102799836B publication Critical patent/CN102799836B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The invention relates to the field of software, in particular relates to a software promotion method, and aims to provide a software promotion method. Software comprises personal computer (PC) software and mobile terminal software. According to the technical scheme, after the software runs, the software is recommended to others through at least one communication way; and furthermore, only if a set number is met, the software authority can be obtained, and otherwise, only a trial version runs, or the software can be used for finite times, or the software is ended. The software promotion method has the beneficial effects that the software is promoted by the method, so that the number of users can be increased in a geometrical number manner; a large amount of high-quality software is approved by the users and used; and furthermore, other services, such as an advertisement service, can be derived from the promoted software, and a free software profit pattern can be realized.

Description

The method that a kind of software is promoted
Technical field
The present invention relates to software field, particularly relates to the method that a kind of software is promoted.
Background technology
A lot of freewares are arranged at present; Comprise PC software and mobile terminal software; Generally be to be placed on the website, freely download use, particularly along with the development of mobile Internet by the user; Mobile terminal software is very abundant, online software is arranged like stock market software, internet radio software, geographic position query software, game on line software, MSN, social software etc.; Off-line software is like offline play software, off-line type passenger traffic query software, antitheft mobile phone software, handset capability Optimization Software etc.The purpose of this invention is to provide the method that a kind of software is promoted.
Summary of the invention
Explanation of nouns:
Encrypt generation module: adopting compiler that software is carried out that shell handles is involucrum, forms executable code and by involucrum software; Said compiler comprises Compilation Method and compiling parameter; Compilation Method and compiling parameter are for not manifested by the software user of involucrum; Even do not increase extra encryption measures the encryption meaning is not arranged yet, do not get rid of extra encryption measures certainly, like AES, password authentication etc.
Encrypting module: by encrypting executable code that generation module generates and at least two by involucrum software, two the operation power and methods of operation by involucrum software are controlled by executable code.Encrypting module of the present invention is appreciated that in argumentation to encrypting annexation.
The encryption technology that the present invention relates to is a prior art: existing shell encryption technology is with tool software target software to be carried out shell to encrypt (being commonly called as " involucrum "); The programming code that does not promptly relate to target software is explained; Target software is through needing decrypting process or cooperate encryption lock could move after encrypting, encryption lock be a kind of inner preserve decrypted program hardware, the decrypted program cooperation interior with encryption lock just can normally be moved by the target software of involucrum; There is not encryption lock just can not be moved by the target software of involucrum; So just protected target software not by illegal use, what encryption lock was protected is target software, and the present invention is not to use the encryption lock scheme; Just the decrypted program in the encryption lock is transplanted out as decrypting device, the encrypting module that the present invention is proposed realizes it being the deciphering method of operation certainly to target software at least.The present invention can adopt the shell disposal route, connects at least two softwares through encrypting module, and makes the operation of two softwares keep restricting relation, as: must move simultaneously or operation successively.The purpose software that the user uses is that the present invention connects the target software that Core Generator software will be handled, and the software of generation is software packaging, and software packaging structurally is the structure from decrypted packet, but operating part is a decrypted code, and involucrum partly is encrypted program.
Cipher mode can be a network encryption, and promptly the SaaS pattern announces 201010577492 like Chinese patent.
The purpose of this invention is to provide the method that a kind of software is promoted, software comprises PC software and mobile terminal software, and technical scheme of the present invention is:
At least recommend other people through a communication channel behind the running software, and satisfy and set quantity, could obtain soft ware authorization, otherwise can only move trial edition, or the use of limited number of times, or stop.
Embodiment of the present invention:
1, the unified programming of recommended program according to the invention and original software program.
2, recommended program according to the invention forms module, original software program is carried out shell handle, and promptly the original software program run switch links to each other with the mandate switch that recommended program module according to the invention provides, by authorizing switch Control Software run switch.In other words: software is connected and composed by original program and recommended program, and recommended program is a module, and said module provides connecting interface.
3, a kind of recommendation generator program is provided; Said recommendation generator program is a kind of instrument that can target software (former software) be generated the software with recommendation function; Said recommendation generator program has User Interface; Be used for user's input parameter, so that generate the software with recommendation function of The profile.
The method that described a kind of software is promoted, it is characterized in that: software is connected and composed by original program and recommended program, and recommended program is a module.
The method that described a kind of software is promoted is characterized in that: the channel destination data that software setting recommending data storage unit, recommending data cell stores had been recommended.
The method that described a kind of software is promoted, it is characterized in that: communication channel is one of following mode: note, mail, microblogging, instant messaging, other software.
The method that described a kind of software is promoted, it is characterized in that: software is cell phone software, communication channel is a SMS.
The method that described a kind of software is promoted is characterized in that: software is by recommending generator program to generate, and said recommendation generator program is that former software generates the software with recommendation function with target software.
The method that described a kind of software is promoted is characterized in that: recommend generator program that User Interface is arranged, be used for user's input parameter.
The method that described a kind of software is promoted is characterized in that: recommend generator program that the encryption generation module is arranged, be responsible for target software is encrypted, make the operation of target software depend on recommending module.
Step of the present invention is:
(1) detection of mandate step is arranged behind the running software;
(2) recommendation channel interface is provided;
(3) extract and send content recommendation;
(4) extract the return message value of recommending channel;
(5) recommend successfully to judge and count;
(6) soft ware authorization.
The method that described a kind of software is promoted is characterized in that: it is to realize through said channel software interface that step (4) is extracted the return message value of recommending channel.
The method that described a kind of software is promoted is characterized in that: it is to realize through extracting said channel user interface of software displayed value that step (4) is extracted the return message value of recommending channel.
The method that described a kind of software is promoted, it is characterized in that: step (5) recommends successfully to judge and count, and the recommending data storage unit is set, existing recommending data is compared in newly-increased recommending data and the storage unit, if any then not allowing to recommend or recommend failure.
Present numerous software is free, and mobile terminal software particularly, one of the object of the invention are exactly to realize that freeware realizes profit as the advertisement interface; Freeware is that abundant use crowd will be arranged as the key factor at advertisement interface, the method person's of being to use who adopts here recommendation, and promptly software freely uses through recommending to obtain the authorization; As set and recommend 2 people to authorize; Then increase the user, recommend 3 people to authorize, then increase the user with 3 n power if set with 2 n power; By that analogy, being set at n then increases with the n power mode of n.
The invention has the beneficial effects as follows: adopt this method to promote software; Can make the user become quantity growth how much; Good software obtains customer's approval and a large amount of the use on the one hand; Make the software of being promoted other business of to derive on the other hand,, realize a kind of profit model of freeware like advertising business.
Description of drawings
Fig. 1 is the present invention's the method program process flow diagram of software through recommending to obtain the authorization.
Fig. 2 recommends the user program process flow diagram for the present invention.
The embodiment that Fig. 3 recommends generator program target software to be generated software packaging for the present invention adopts.
Fig. 4 is the present invention's software packaging operation synoptic diagram.
Fig. 5 comprises the operation synoptic diagram of encrypting module for the present invention's software packaging.
Embodiment:
Below in conjunction with accompanying drawing and embodiment the present invention is further specified.
Fig. 1 is the present invention's the method program process flow diagram of software through recommending to obtain the authorization.
The mandate of software and operating procedure are:
101 softwares are installed; 102 running softwares;
103 authorize detection, if authorized Y, then: 104 softwares normally move.
103 authorize detection, if unauthorized N, then: 105 recommend users, recommend the user can pass through SMS, microblogging, mailbox, MSN etc.;
106 recommend counting, if satisfy set point number, then 107 authorize, and software normally moves.
106 recommend counting, if the unmet set point number, then 108 selections are selected to continue 105 and recommended the user, or select operation of 109 trial editions or termination, and trial edition can be set at can move limited number of times.
The recommendation determining program is set, and concrete grammar is: the recommending data storage unit is set, and existing recommending data is compared in newly-increased recommending data and the storage unit, if any then not allowing to recommend or recommend failure.
Fig. 2 recommends the user program process flow diagram for the present invention.Step is:
201 recommend the user, and program is carried out and recommended user instruction;
202 select channel, and 203 notes are used for portable terminals such as mobile phone, and the 204th, mail, microblogging, instant messaging, other software can be PC software, also can be mobile terminal softwares such as mobile phone;
If select 203 short breaths, then execution in step 207 is extracted and is sent content recommendation, and content recommendation comprises software download address and link at least;
If select 204, then carry out 205 logins and detect, if logined then carry out 207 steps, if login then carry out 206 login step;
208 extract the return message values, and program is carried out and read short breath and send the return message value of success or not, or read that mail sends, microblogging issue, instant messaging are sent, the return message value of other software, concrete grammar: a, realize through the related software interface function; B, directly read the user interface displayed value of related software; Said user interface displayed value is that related software informs that with execution result the user sends the inevitable step of success or not; So can directly catch software executing output identification value as a result from the user interface layer of any software, not receive the range upon range of influence of window.User interface is the User Interface that software provides, and is a kind of open code and instruction.
209 return message values judge, if success then carry out 210 and recommends successfully counting, if failure then carry out 216 and recommend failure would get into 214 selections;
211 recommend counting, if satisfy set point number, then 213 authorize, if the unmet set point number gets into 214 and selects; 214 select, and can select to recommend user steps again, and return 201 and recommend the user, or operation of 215 trial editions or termination.
The embodiment that Fig. 3 recommends generator program target software to be generated software packaging for the present invention adopts.Recommending the function of generator program is that target software is packaged into the software packaging with recommendation function; Be a tool software, said tool software comprises recommending module at least, can also comprise the encryption generation module in addition; Said tool software has User Interface, offers user's operation.The generation step is: 301 recommend the generator program operation; 302 add target software, and the target software that is about to required packing adds to be recommended in the generator program; The 303rd, select the interface, the User Interface of promptly recommending generator program to provide; 303 selection interfaces comprise: 304 number of times on probation are set the limited number of times that promptly allows the user to use; 305 recommend number of times to set, and promptly set the recommended amount of obtaining the authorization; 306 recommend channel to set, and promptly communication channel is set, and comprises note, mail, microblogging, instant messaging etc.; 307 target software icons, promptly the needed icon of select target software is generating the icon sign that forms behind the software packaging, and the icon sign of the shortcut of software packaging operation, or the button icon sign of software packaging operation; 308 advertisements promptly can recommend the generator program User Interface to embed advertisement, and advertisement can be prefabricated advertisement, also can be the advertisement of online transmission, and 308 advertisements are optional, can be default; 309 generate software packaging, and soon recommending module is connected with target software and is bundled to together; 310 offer the user; The 311st, encrypt generation module, consider that the user possibly skip the direct operational objective software of recommended program, can encrypt target software through encrypting module, promptly must pass through the operation that recommending module could be opened target software.
Said recommendation generator program also can adopt WEB or WAP method of service, and the website promptly is provided, and will recommend generator program to be placed on website operation, and the user can the Website login webpage, on the website, generates needed software.
Target software is included in certain functional software or the module or the program of client operation, like health consultation software, mobile phone antivirus software, geo-location service software etc.; Also comprise the file that can manifest in client in addition,, can manifest and can make the file of client perception in client like picture file, pdf document, audio-video document etc.
Fig. 4 is the present invention's software packaging operation synoptic diagram.Software packaging at first triggers 401 operation buttons when the operation of user side or client, this operation button is positioned on user's the desktop or suitable interface; Then move 402 recommending module, recommending module is carried out according to the step of setting that requires; Last recommending module output order starts 403 target softwares.
Fig. 5 comprises the operation synoptic diagram of encrypting module for the present invention's software packaging.501 operation buttons; 502 recommending module; 503 target softwares; 504 encrypting modules; 505 encipheror bags, promptly target software and encrypting module are accomplished program function jointly, target software and encrypting module constantly swap data to keep the operation of program; Or target software and encrypting module are kept program run through at least swap data; Operation 502 recommending module behind the 501 operation pushbutton enables, the recommending module output order starts encipheror bag 505, considers and cracks difficulty; Recommending module can be exported one group of instruction and start the encipheror bag; Further, made, promptly instructed with made must be consistent with the input of one group of synchronous recommending module output order of random number and encrypting module.
Software cryptography is existing mature technology, and concrete AES is exemplified below: AES is unpredictable, irreversible, and AES can become an integer to a numeral or character transformation; One house dog program generally is set in program, such as there being such one in one section application program: A=Fx (3), program will obtain the value of variables A according to constant 3; Can rewrite original program like this: A=Fx (DogConvert (1)-12342); Just constant 3 can not appear in the original program so, and get with DogConvert (1)-12342, like this; The person knows that just the actual constant that calls is 3 to have only the software programming; And if can not get the server for encrypting algorithm, the DogConvert function just can not return correct result, formula A=Fx (DogConvert (1)-12342) result certainly can be incorrect yet as a result.
Another kind of encryption method is to be transplanted to encrypting module at least one byte section in the target software, transplants rule and encrypts FACTOR CONTROL by one, and encrypting the factor has unique key, and key is controlled by recommending module.
Programming language of the present invention can be existing any language form, like VC++, and C, Delphi, FORTRAN, Pascal, FOXPRO, Clipper, EXE; WIN16:C, and C++ (Visual, C++Builder, Borland), Visual BASIC; WIN32:C, and C++ (Visual, Borland), FORTRAN (LAHEY, Visual), Java, Visual BASIC, VisualFoxpro, PowerBuilder, Delphi, JavaScript, VBScript installshield, VB.net, VC.net; Linux:C, C++, Java; Microsoft XML Web services platform; The method of html, the ASP.NET method; Mac OS X operating system; Mobile phone operating system: Windows Mobile, Symbian, Android, iOS, mobile phone Mac OS X operating system etc.What propose especially is: the exploitation of android application layer can rely on java, and bottom can be used c, and jni calls.
Can adopt the programming of server, client on the programming framework, also can adopt the control mode to use or the mode of invoke script program or, or adopt the cloud computing mode to programme, be i.e. the SaaS pattern to the server requests mode.
Load mode is used IPV4 at present based on TCP/UDP agreement or other any network load mode, uses IPV6 in the future.In network transmission process, can adopt symmetric cryptography, asymmetric encryption and Hash to encrypt, encrypt like modes such as DES, SSL or SET.

Claims (10)

1. the method promoted of a software is characterized in that: recommends other people through a communication channel at least behind the running software, and satisfies and set quantity, could obtain soft ware authorization, otherwise can only move trial edition, or the use of limited number of times, or termination.
2. the method that a kind of software according to claim 1 is promoted, it is characterized in that: software is connected and composed by original program and recommended program, and recommended program is a module.
3. the method that a kind of software according to claim 2 is promoted is characterized in that: software is by recommending generator program to generate, and said recommendation generator program is that former software generates the software with recommendation function with target software.
4. the method that a kind of software according to claim 3 is promoted is characterized in that: recommend generator program that the encryption generation module is arranged, be responsible for target software is encrypted, make the operation of target software depend on recommending module.
5. the method promoted of a software the steps include: to have to authorize behind (1) running software to detect step; (2) recommendation channel interface is provided; (3) extract and send content recommendation; (4) extract the return message value of recommending channel; (5) recommend successfully to judge and count; (6) soft ware authorization.
6. the method that a kind of software according to claim 5 is promoted is characterized in that: it is to realize through said channel software interface that step (4) is extracted the return message value of recommending channel.
7. the method that a kind of software according to claim 5 is promoted is characterized in that: it is to realize through extracting said channel user interface of software displayed value that step (4) is extracted the return message value of recommending channel.
8. the method that a kind of software according to claim 5 is promoted; It is characterized in that: step (5) recommends successfully to judge and count; The recommending data storage unit is set, and existing recommending data is compared in newly-increased recommending data and the storage unit, if any then not allowing to recommend or recommend failure.
9. according to the method for claim 1 or 2 or 3 or 4 or 5 or 6 or 7 or 8 or 9 described a kind of softwares popularizations, it is characterized in that: the recommendation channel is a note, or mail or microblogging or instant messaging or other software.
10. the method that a kind of software according to claim 9 is promoted, it is characterized in that: software is cell phone software, communication channel is a SMS.
CN201210220976.0A 2012-06-29 2012-06-29 A kind of method that software is promoted Active CN102799836B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210220976.0A CN102799836B (en) 2012-06-29 2012-06-29 A kind of method that software is promoted

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210220976.0A CN102799836B (en) 2012-06-29 2012-06-29 A kind of method that software is promoted

Publications (2)

Publication Number Publication Date
CN102799836A true CN102799836A (en) 2012-11-28
CN102799836B CN102799836B (en) 2018-09-04

Family

ID=47198939

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210220976.0A Active CN102799836B (en) 2012-06-29 2012-06-29 A kind of method that software is promoted

Country Status (1)

Country Link
CN (1) CN102799836B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104424580A (en) * 2013-08-29 2015-03-18 聚游互动(北京)科技发展有限公司 Mobile application selling price confirmation method and system
CN107139211A (en) * 2017-05-26 2017-09-08 上海思依暄机器人科技股份有限公司 The cost recovery control method and device of a kind of domestic robot

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101464983A (en) * 2007-12-18 2009-06-24 汤溪蔚 Electronic commercial matters application method and system
US20100017307A1 (en) * 2008-07-16 2010-01-21 Pipit Interactive, Inc. Method and system for on-line, real-time, interactive collaborative visualization
CN101697538A (en) * 2009-10-21 2010-04-21 深圳市融创天下科技发展有限公司 Method for quickly spreading registration among broad community of users in network system
CN201750554U (en) * 2010-05-04 2011-02-16 浙江宇天科技股份有限公司 Business processing system
CN102130949A (en) * 2011-03-10 2011-07-20 肖智刚 User contribution-based method and system for sharing personalized digital resources

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101464983A (en) * 2007-12-18 2009-06-24 汤溪蔚 Electronic commercial matters application method and system
US20100017307A1 (en) * 2008-07-16 2010-01-21 Pipit Interactive, Inc. Method and system for on-line, real-time, interactive collaborative visualization
CN101697538A (en) * 2009-10-21 2010-04-21 深圳市融创天下科技发展有限公司 Method for quickly spreading registration among broad community of users in network system
CN201750554U (en) * 2010-05-04 2011-02-16 浙江宇天科技股份有限公司 Business processing system
CN102130949A (en) * 2011-03-10 2011-07-20 肖智刚 User contribution-based method and system for sharing personalized digital resources

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104424580A (en) * 2013-08-29 2015-03-18 聚游互动(北京)科技发展有限公司 Mobile application selling price confirmation method and system
CN107139211A (en) * 2017-05-26 2017-09-08 上海思依暄机器人科技股份有限公司 The cost recovery control method and device of a kind of domestic robot

Also Published As

Publication number Publication date
CN102799836B (en) 2018-09-04

Similar Documents

Publication Publication Date Title
CN112733107B (en) Information verification method, related device, equipment and storage medium
CN107682159B (en) Trusted application management method and trusted application management system of intelligent terminal
CN100581103C (en) Securely processing of client credentials used for WEB-based access to resources
CN1522516B (en) Secure header information for multi-content e-mail
US8712041B2 (en) Content protection apparatus and content encryption and decryption apparatus using white-box encryption table
CN105516157B (en) Network information security input system and method based on independent encryption
US20170337397A1 (en) System And Method For Protecting Internet User Data Privacy
CN103607402B (en) A kind of online game data encryption and decryption method and equipment
CN109362074B (en) Method for h5 and server side safety communication in mixed mode APP
US11470060B2 (en) Private exchange of encrypted data over a computer network
CN108322416B (en) Security authentication implementation method, device and system
US20160142440A1 (en) Method and Apparatus for Decryption of Encrypted SSL Data from Packet Traces
CN110025955B (en) Information processing method, terminal, computer-readable storage medium, and computer device
CN101640682A (en) Method for improving safety of Web service
CN105491073B (en) Data downloading method, device and system
CN103488922A (en) Method and equipment for providing verification code
CN109040079A (en) The establishment of live streaming chained address and verification method and related device
Kim et al. Forensic analysis of instant messaging apps: Decrypting Wickr and private text messaging data
KR102362108B1 (en) Authentication systems and methods
CN102799997A (en) Internet advertisement publishing method and system
Han et al. Proposing and verifying a security protocol for hash function-based IoT communication system
CN102799836A (en) Software promotion method
Fahl et al. Trustsplit: usable confidentiality for social network messaging
KR101173583B1 (en) Method for Security Application Data in Mobile Terminal
CN111901287A (en) Method and device for providing encryption information for light application and intelligent equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20211115

Address after: 264200 No. 220, Keji Road, torch high tech Industrial Development Zone, Weihai City, Shandong Province

Patentee after: Weihai high tech Park Operation Management Co., Ltd

Address before: 226001 919, building 1, Wangfu building, No. 6, Renmin East Road, Nantong City, Jiangsu Province

Patentee before: Wu Donghui