CN101067859A - Antipirating method for network software - Google Patents

Antipirating method for network software Download PDF

Info

Publication number
CN101067859A
CN101067859A CNA2007100266950A CN200710026695A CN101067859A CN 101067859 A CN101067859 A CN 101067859A CN A2007100266950 A CNA2007100266950 A CN A2007100266950A CN 200710026695 A CN200710026695 A CN 200710026695A CN 101067859 A CN101067859 A CN 101067859A
Authority
CN
China
Prior art keywords
software
user
charging
server
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2007100266950A
Other languages
Chinese (zh)
Inventor
张文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNA2007100266950A priority Critical patent/CN101067859A/en
Publication of CN101067859A publication Critical patent/CN101067859A/en
Pending legal-status Critical Current

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This invention provides an anti-pirating method for network software, which sets a charge process on the software to send user information using the software to a charge server set by an owner of the software automatically via network, which is connected with the charge platform of network operators and converts the information of using the software of the user to charge information after receiving the information to trust the operator to charge to the user, which guarantees legal right of software owners.

Description

A kind of method for preventing piracy of network software
Technical field
The invention belongs to the software anti-pirate technical field, particularly relate to and a kind ofly collect the software usage charges automatically by network and come anti-piracy method.
Background technology
At present, the main method that prevents software piracy is the product start-up routine, and its principle is when install software, import a key, generate one then and install ID number, it is sent back to the software seller place, return one by software seller and confirm ID, its input PC, software activation.Do not finish the software of this active program, can't normally use or reduce properties of product.Theoretically, this kind mode can prevent that product is by piracy.But in fact; owing to exist the activating software of exempting from of institutional purchase on the market; exist the software of exempting to activate of brand PC merchant's prepackage; some that exist other can avoid activating the software of restriction; therefore, this defence program of software activation does not reach the anti-piracy purpose of expection of software seller at present.A large amount of piracy software is still in circulation on the market.
Along with networks development, the network user is more and more, random downloaded software on network, it is one of main mode of software piracy, it also is a kind of pirate mode that the software owner is difficult to inhibition, even the anti-piracy mode of product start-up routine is done how perfectly, always be difficult to avoid being cracked and suffer piracy, as operating system of Microsoft etc.
In addition, the individual PC software of selling on StoreFront at present almost is to sell in the mode of lump-sum payment entirely, extremely several ten thousand yuan of some software prices up to several thousand yuan, the mode of this disposable sale allows the user feel to buy disposable selling software, is a very big financial burden.
Summary of the invention
The objective of the invention is to want to find the method that not only can protect software property right owner's rights and interests but also can reduce user's financial burden greatly.
A kind of method for preventing piracy that is specially adapted for employed software on the network particularly is provided, this method is different from the past to stop the disabled user to use software by various technological means, but use software the user is to charge, say in a way, there is not pirate user, just reaches anti-piracy purpose yet.
In order to realize the foregoing invention purpose, the technical scheme of employing is as follows:
A kind of method for preventing piracy of network software, by a charging program is set on software, when described charging program uses this software the user, automatically the charging server that sets to the software owner by network sends the user and uses software information, described charging server is connected with the charge platform of Virtual network operator, and after receiving that the user uses software information, judges the type of service of software, if type of service is paid utilization, then carry out following A operation:
A, use software information to change into the charge platform that pay imformation is forwarded to Virtual network operator the user, automatically collect the software usage charges by charge platform, described charge platform sends pay imformation to charging server after collecting the software usage charges, or can't collect that the software working costs sends to charging server can't pay imformation;
Paid utilization in the operation A can be understood as the software owner this software is hired out, and must pay usage charges when the user uses.Because the type of service of software is not only paid utilization, past contact comprises gives, if to the software given executable operations A all, then give nonsensical, type of service more also comprises disposable buying out, the user is disposable buy out this software after, if go back executable operations A when using, then belong to and repeat charge, also unworkable certainly, type of service also comprises the use with condition restriction, as using in certain number of times or the certain hour etc., also equal freeware under the restrictive condition meeting, if executable operations A when using also loses its limited significance.
So, for the non-paid utilization of type of service, then the present invention will carry out following B or C operation:
B, judge whether software is disposable selling or specific giving, if sell or specificly give use for disposable, then check by the set database of authorized user of charging server whether this user is authorized user, if authorized user is not then done any operation, let alone freely to use, otherwise executable operations A;
C, judge whether software has the restriction of access times or service time, if then check software whether to exceed limited field, if do not go beyond the scope, does not then do any operation, lets alone freely to use, if go beyond the scope then executable operations A.
In the technique scheme, described charging program uses software information to comprise unique software identification code and subscriber identity information at least to the user that charging server sent.The software identification code is corresponding with subscriber identity information, and this corresponding relation is can be one by one corresponding, as limits a user can only use this software under specific occasions, but also one-to-many, as the user can be under a plurality of occasions that limit this software of use.The software identification code is for being unique identification code that each user generated by the software owner according to actual conditions, and this software identification code can comprise type of service, as hiring out, disposablely selling, give, limit use etc.Subscriber identity information can adopt IP address, user place, or the computed machine code of user, but or uniquely identified information such as Mac address.
Charging program of the present invention also is provided with locking module, described locking module be when the user can't finish be connected with charging server or charging server receives that charge platform sends can't pay imformation after, locked software makes it and can't use.Locking module is to guarantee reasonably to collect the usage charges of software, if can't collect, then locks this software.
After the user that described charging server reception is sent by the charging program on the software uses software information, whether obtain the authorization by its set database of authorized user verification user, if belong to authorized user, then do not do any operation, if without permission, then the charging program on this user terminal distributes the unique software identification code of another one, and adopts this software identification code to use software information together with this user's identity information as a new user, then execution in step A.The authorized user database deposits that software is disposable to be sold or complimentary user uses information, or other the specific user profile that can charge, comprise that restriction meets the specific user of qualifications etc. when using, these specific users are authorized user, when authorized user uses this software, charging server does not send pay imformation to charge platform, guarantee the rights and interests of authorized user, when the employed software of authorized user is replicated or transplants use, for new user, its subscriber identity information difference, with the software identification code of this software can not be unique corresponding, so charging program distributes the unique software identification code of another one, and adopt this software identification code to use software information as a new user together with this user's identity information, execution in step A makes new user pay usage charges then, guarantees software owner's rights and interests.
Identical reason, the user that restriction is used among the operation C is when using this software, charging server also can carry out verification earlier, restriction is used in whether exceeding of checking user, if do not exceed, then let alone freely to use, if exceed, then start charging program, if the software that this restriction is used is replicated or transplants, charging server also can be used as new user and be carried out operation A for new user's distribution software identification code, and subscriber identity information that restriction is used and corresponding with it software identification code can be deposited in its set calibration database of chargeable service.
So as long as the user is when using, executable operations A of the present invention charges, then this user, unless this user becomes authorized user by legal mode otherwise charges when each the use as the user of paid utilization.
For more convenient user's use, set charging program contains predefined charging server IP address on the software of the present invention, by this IP address can be when the user surfs the Net automatic access software property right owner's charging server.
Further, described charging server also is provided with network address database, the IP address and the relevant data of the accounting server of each Virtual network operator deposited in the inside, can discern the Virtual network operator at the user place of using software automatically, and be connected with the network billing server of this Virtual network operator automatically.
Further, the present invention can also be provided with a network address in software, and by can go directly software owner's Boot Server of this network address, the charging program of the bootable software of described Boot Server correctly is connected with charging server.This is for some software all general in the whole world, and as the english software of Microsoft, all there is considerable user in 200 countries in the whole world, and Boot Server is set, and bootable user finds this country or local charging server.Its principle is that the user surfs the Net, charging program at first points to the software business man's who sets on the software Boot Server, Boot Server is found out the charging server network address of this user the country one belongs to, the charging server of guiding user capture this country or this area after minute folding user's IP address.
Charging program of the present invention can add in the related software by the mode of patch.
Because what the internet was carried out now is the IPV4 standard, because the shortage of ip address that the IPV4 standard can provide, therefore, individual's host ip is dynamic, and subscriber identity information can adopt IP, computer machine sign indicating number, Mac address etc., and perhaps it combines.In case carry out the IPV6 standard, the IP address will be fixed, this will make things convenient for charging server whether the user to be authorized the verification work of identity widely.Carry out after the IPV6 standard, charging server if verification user's fixed ip address and software identification code whether with exist the data of authorized user lane database to match can to judge whether the user belongs to authorized user.
Charging server can be that the property right owner of software owns, and also can become the public charging server that a third party has, and public charging server can be all software seller's services.The effect of public charging server is identical with above-mentioned charging server effect, and its authorized user database data is provided by software property right owner.As all charging servers of the third party is the commercial service device that the billing proxy service is provided for all software business mans, the owner who has charging server signs with all Virtual network operators earlier and withholds software usage charges, audio-visual broadcast charge, sell the Q coin, withhold the expense of shopping online and other consumption.When chargeable service need be acted on behalf of by other businessman, it needn't sign the agreement of agency's charge with all Virtual network operators, and it only needs to sign an agreement just passable with the businessman that has charging server.Various expenses are withheld by Virtual network operator earlier, and delivering then provides the businessman of acting on behalf of chargeable service, deliver software property right owner and other sell out and the businessman that service is provided by the businessman of acting on behalf of chargeable service again.
Method for preventing piracy of the present invention is for adopting brand-new mode, promptly encourage to duplicate, and to the mode that the user charges, withhold by delegated network operator and charge, so, for the Internet user, as long as use this software, just must pay dues, otherwise can't use according to the agreement of being signed with the owner, compared with prior art, have following effect:
One, the software business man can not cause tremendous loss because of the software pirate version again.General pirated disc copier is mechanically propagation software sale just, even be equipped with its software pirate version of software of charging program, still have the program of a charge in the piracy software of duplicating out again, the user is when using pirate internet software movable, charging program in the software can start automatically, send pay imformation by charging server to the accounting server of Virtual network operator, the charge platform of Virtual network operator still can be deducted the software usage charges according to the charge data that contains in the software in user's number of the account.Prevented the pirated disc copier like this, effectively and used the common infringement of the user of piracy software the property right owner of software.Copyrighted software merchant's interests have been protected effectively.
Two, reduced the consumption door widely, because charging software can adopt and monthly pay usage charges this rents pattern, also can adopt the metering calendar scheduling marketing method of repeatedly paying the bill, first payment is more than one percent to 1/tens of a disposable software Payment Amount, and the disposable selling software price comparison that only needs several yuans and price to do tens thousand of units up to hundreds of unit to number is got up, the consumption door is much lower, and this has just improved the wish of consumer's purchase copyrighted software widely.The operating system that has solved present some copyrighted software on the market such as Microsoft is reluctant to buy this difficult problem because of the too high user of price.Simultaneously, because charging software just just need be paid dues when the user uses it, do not use this software just needn't pay dues for a long time, therefore, the hommization more of this sales mode is subjected to consumer's welcome more.
Three, the merchant has brought favorable economic benefit to copyrighted software.Because the present invention can change the infringement user who uses piracy software into paying customer, therefore, can bring good economic benefits to the copyrighted software merchant.
Four, when the user does not re-use this charging software, as long as this software deposited in the dustbin or just passable its deletion.Can remove the trouble of handling the termination protocol formality from like this.
Five, the present invention can reduce the pollution of software packaging material to environment widely, for the user saves the software packaging expenditure.Many network utility softwares for example antivirus software are to be contained in fineness to have in the box of anti-counterfeit package and sell when selling.The present invention allows the random propagation software of user, so just for reducing wrappage condition has been created in the pollution of environment, simultaneously, has also saved the packing expenditure for the user.
Embodiment
Embodiment one, and concrete steps are as follows:
1, it is payware that the software owner gives the software of oneself preparing release market qualitative, and its Payment Methods are the agency of user's delegated network operator charge.Add a charging program for the business software of preparing to sell, the content of charging program contains the code of this charging software, software copyright owner's company code, Bank Account Number, expenses standard, information such as charging way, charging way can be monthly payment, timing, metering.For the lower software of some charges, can take lump sum settlement of all charges unrestrictedly to use.Charging software presses the relevant agreement of internet and standard is made, contain can access software property right owner charging server the address.
2, Virtual network operator adds a special accounting server at charge platform, and the effect of this accounting server is to withhold the software usage charges for the software owner specially.This accounting server is paid the fees in the number of the account with the usage charges data of recording user and the network that it counts the user, thereby is reached for the purpose that software property right owner agency collects user's software toll.
3, by user's use agreement is set on software, by on packing box, printing additional the charge prompting, by various advertisements, inform the user, this software is charging software, by Virtual network operator such as telecommunications, move, Netcom, UNICOM, E family are wide etc., and company withholds gets the software usage charges, it is the charge agreement that the legal copy or the software of piracy all are counted as agreeing this software that the user has used this software.In software business man and user's use agreement, having a is the content relevant with charge, and the user clicks definite frame that I agree software, just agrees charging clause.
4, the user uses internet software, charging program in the software automatically starts or starts initiated access software property right owner's the program of charging server by the user, if the software that this user uses is unwarranted piracy software, charging server can be found this software from the authorized user lane database and not authorize, so, distribute a software identification code to give this software, simultaneously, find address with the accounting server of the corresponding Virtual network operator of user's source IP address from lane database, user's the request of withholding the software usage charges is transmitted to the accounting server of Virtual network operator together with this machine IP address designation of user.After the taximeter of Virtual network operator receives that the agency who transmits the user who comes collects the request of software usage charges, this machine sign according to the user, set up link with user's software charging program immediately, allow the charging program of software that charge data is sended over, the taximeter server is found out user's the number of the account of paying the fees by the host identification of analysis user, bill and account receivable is counted in user's the number of the account of paying the fees.If the user is the validated user of mandate of lump-sum payment, or free user, charging server is not transmitted the request of withholding the software usage charges to the accounting server of Virtual network operator after investigating user's legal identity, so just can avoid repeating charge and mistake charge.
5, the accounting server of Virtual network operator is after the registration work of agency's charge of finishing this user, this user's the software identification code and the numbering of paying the fees are transmitted to software property right owner's charging server, and charging server deposits it in the validated user list of authorization database in.This validated user has the right to obtain services such as upgrade patch.
Embodiment two:
Software and the additional charging program of complimentary software for lump-sum payment, when the user uses the legal or pirate internet software of lump-sum payment or free of cost, user's charging program starts, send the request of agency's charge to property right owner's charging server, the property right owner of software passes through verification procedure, determine whether authorized user of user, if be authorized user, charging server is ended charging program.If be unauthorized user, charging server distributes a unique identification code to the user, then the request of charging to the accounting server Forward Proxy of Virtual network operator.Its process with realize that practical operation of the present invention is same.
Be directed to some illegal businessman and often some VCD or DVD CD taken broadcast profit on the network; anti-piracy, can add a charging program at the CD that legal dealer will protect in advance, at this moment; if the user watches these movie and video programs on the net, this program has become the charge program.The legal owner's of CD interests have been protected effectively.
Embodiment three:
Some professional softwares are added a charging program, and software seller sells software by marketing channel.The user buys software and uses software.The user use software number of times or the time number reach the quantity of regulation, the software automatic blocking, the user can't continue to use.The prompting that the user presses on the software connects the internet, by guiding information from the request broker charge to charging server that send.Charging server is to the accounting server Forward Proxy charge request of Virtual network operator.Its process with realize that practical operation of the present invention is identical.
The charging mode of charging server of the present invention can be applied to sell audio-video product on the net, and the Q coin is bought and the consumption online aspect.Charging server is actually the account number of determining the user according to user's IP address, server can be determined user's true identity by the verification user's IP address when determining user's account number, therefore, other user can't consume by account and the password of usurping others.

Claims (7)

1, a kind of method for preventing piracy of network software, it is characterized in that on software, being provided with a charging program, when described charging program uses this software the user, automatically the charging server that sets to the software owner by network sends the user and uses software information, described charging server is connected with the charge platform of Virtual network operator, and after receiving that the user uses software information, judges the type of service of software, if be paid utilization, then carry out following A operation:
A, use software information to convert the charge platform that pay imformation is forwarded to Virtual network operator to the user, automatically collect the software usage charges by charge platform, described charge platform sends pay imformation to charging server after collecting the software usage charges, or can't collect that the software working costs sends to charging server can't pay imformation;
If not paid utilization, then carry out following B or C operation:
B, judge whether software is disposable selling or specific giving, if sell or specificly give use for disposable, then check by the set database of authorized user of charging server whether this user is authorized user, if authorized user is not then done any operation, let alone freely to use, otherwise executable operations A;
C, judge whether software has the restriction of access times or service time, if then check software whether to exceed limited field, if do not go beyond the scope, does not then do any operation, lets alone freely to use, if go beyond the scope then executable operations A.
2, the method for preventing piracy of network software according to claim 1 is characterized in that described charging program uses software information to comprise unique software identification code and subscriber identity information at least to the user that charging server sent.
3, the method for preventing piracy of network software according to claim 1 and 2, it is characterized in that described charging program also is provided with locking module, described locking module be when the user can't finish be connected with charging server or charging server receives that charge platform sends can't pay imformation after, locked software makes it and can't use.
4, the method for preventing piracy of network software according to claim 3, after it is characterized in that described charging server receives the user who is sent by the charging program on the software and uses software information, whether obtain the authorization by its set database of authorized user verification user, if belong to authorized user, then do not do any operation, if without permission, then the charging program on this user terminal distributes the unique software identification code of another one, and adopt this software identification code to use software information as a new user together with this user's identity information, execution in step A then.
5, the method for preventing piracy of network software according to claim 4, it is characterized in that charging program set on the described software contains predefined charging server IP address, by this IP address can be when the user surfs the Net automatic access software property right owner's charging server.
6, the method for preventing piracy of network software according to claim 5, it is characterized in that described charging server also is provided with network address database, the IP address and the relevant data of the accounting server of each Virtual network operator deposited in the inside, can discern the Virtual network operator at the user place of using software automatically, and be connected with the network billing server of this Virtual network operator automatically.
7, the method for preventing piracy of network software according to claim 6, it is characterized in that a network address can also be set in software, by can go directly software owner's Boot Server of this network address, the charging program of the bootable software of described Boot Server correctly is connected with charging server.
CNA2007100266950A 2007-02-02 2007-02-02 Antipirating method for network software Pending CN101067859A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2007100266950A CN101067859A (en) 2007-02-02 2007-02-02 Antipirating method for network software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2007100266950A CN101067859A (en) 2007-02-02 2007-02-02 Antipirating method for network software

Publications (1)

Publication Number Publication Date
CN101067859A true CN101067859A (en) 2007-11-07

Family

ID=38880403

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2007100266950A Pending CN101067859A (en) 2007-02-02 2007-02-02 Antipirating method for network software

Country Status (1)

Country Link
CN (1) CN101067859A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103745139A (en) * 2013-12-29 2014-04-23 国云科技股份有限公司 Software authorization control method
CN110046477A (en) * 2019-04-04 2019-07-23 上海望友信息科技有限公司 Industrial application software verification authorization method, system, medium, client/server-side
CN110135153A (en) * 2018-11-01 2019-08-16 哈尔滨安天科技股份有限公司 The credible detection method and device of software

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103745139A (en) * 2013-12-29 2014-04-23 国云科技股份有限公司 Software authorization control method
CN103745139B (en) * 2013-12-29 2016-04-20 国云科技股份有限公司 A kind of software authorization control method
CN110135153A (en) * 2018-11-01 2019-08-16 哈尔滨安天科技股份有限公司 The credible detection method and device of software
CN110046477A (en) * 2019-04-04 2019-07-23 上海望友信息科技有限公司 Industrial application software verification authorization method, system, medium, client/server-side

Similar Documents

Publication Publication Date Title
CA2373542C (en) Systems and methods for secure transaction management and electronic rights protection
US5884280A (en) System for and method of distributing proceeds from contents
EP2245533B1 (en) Computer data product license installation / update confirmation
US6898576B2 (en) Method and apparatus for executing code in accordance with usage rights
CN1592907B (en) System and methods providing secure delivery of licenses and content
US20070073837A1 (en) Online multimedia file distribution system and method
US20060085356A1 (en) Method for purchasing a software license over a public network
US20040073514A1 (en) Method for printing digital works
JP2007525725A (en) Content regulation system and apparatus
US20060271493A1 (en) Method and apparatus for executing code in accordance with usage rights
CN102160391A (en) Digital rights management licensing over third party networks
US20040073789A1 (en) Method for collaborative software licensing of electronically distributed computer programs
WO1997030575A2 (en) Automated system for management of licensed software
JP2000113066A (en) Method and system for managing distribution of digital contents
AU701005B2 (en) Charging system and method
KR20010075272A (en) Copyright information management system
CA2411456A1 (en) System and method for distributing content
US20070100777A1 (en) Price determination of digital media files in a peer-to-peer network
CN101067859A (en) Antipirating method for network software
CN100437616C (en) Software anti-pirate device 8 h
US7117180B1 (en) System for controlling the use of digital works using removable content repositories
CN1346110A (en) Network platform based software protection and sales system
JP2002133110A (en) Writings securities authenticating system
Sharma et al. Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy Prevention
Yoshioka IPR protection features for optical disks to promote superdistribution

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20071107