CN101339595B - Device for operation by using permission control software - Google Patents

Device for operation by using permission control software Download PDF

Info

Publication number
CN101339595B
CN101339595B CN200810111992XA CN200810111992A CN101339595B CN 101339595 B CN101339595 B CN 101339595B CN 200810111992X A CN200810111992X A CN 200810111992XA CN 200810111992 A CN200810111992 A CN 200810111992A CN 101339595 B CN101339595 B CN 101339595B
Authority
CN
China
Prior art keywords
usage license
functional module
installation kit
software
protecting equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN200810111992XA
Other languages
Chinese (zh)
Other versions
CN101339595A (en
Inventor
孙吉平
韩勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Senseshield Technology Co Ltd
Original Assignee
Beijing Senselock Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Senselock Software Technology Co Ltd filed Critical Beijing Senselock Software Technology Co Ltd
Priority to CN200810111992XA priority Critical patent/CN101339595B/en
Publication of CN101339595A publication Critical patent/CN101339595A/en
Application granted granted Critical
Publication of CN101339595B publication Critical patent/CN101339595B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Stored Programmes (AREA)

Abstract

The invention provides a software protection device, comprising a function module use controlling unit which can control the use of the function module according to the occupancy permits of the function module and which can also arrange or update occupancy permits for the function module, therefore, the problems of being easy to be traced, analyzed and decrypted of the occupancy permits in the software are solved.

Description

A kind of device that uses by usage license Control Software
Technical field
The present invention relates to Software Protection Technique, particularly a kind of use, the technology of coming Control Software to use by the functional module in the usage license Control Software protective device.
Background technology
Functional module: from software product, extract among the software developer can or be placed in the software protecting equipment for external call code, data or code and data.
Along with the develop rapidly of economic technology, software has been deep in the middle of all trades and professions as aid.Software product is software developer and software programming personnel crystallization of wisdom, and software developer's survival and development are bases of software product sufficient supplies, thereby the copyright of protection software product prevents software product by piracy, has very important practical sense.
In numerous strategies of the existing protection software product of software developer; majority has adopted a kind of like this mode: extract core algorithm in the software product or key as the key procedure code, described key procedure code and the needed data of this program code are placed in the software protecting equipment.As the functional module of software protecting equipment, call for external software.Adopt this mode later on when the user uses software product, must have software protecting equipment to move simultaneously, otherwise can't use this software product.
This dominance of strategies is, the key code of software product is placed in the software protecting equipment, and the cracker is difficult to obtain the key procedure code of software product, also is difficult to the clone software protective device, also just is difficult to crack this software product.The process chip of certain described software protecting equipment is that an intelligent card chip with certain safety certification grade just can prevent to be cloned firmly.Just because of this advantage is arranged, the software product of this strategy protection oneself has been adopted in increasing software development commercial city both at home and abroad.
Because the development of the serviceization of the market demand and software industry, the user can buy the service time of a software, access times etc.The software developer provides the software of different editions at the different demands of user.
Therefore software developer's use that need come restricted software by the usage license.
The control of existing software licensing all is to realize in software, and the cracker can and/or analyze usage license data according to the control module of the usage license, thereby revises or forge the usage license, obtains the right to use of illegal software.Thereby be with great economic loss to the software developer.
Summary of the invention:
In view of this, the invention provides a kind of software protecting equipment that uses by usage license Control Software.The present invention reaches the purpose that Control Software is used by the use of the functional module in the usage license Control Software protective device.
According to an aspect of the present invention; a kind of software protecting equipment is provided; it is characterized in that; this software protecting equipment comprises: functional module is used control module; be used to receive the call request of outer bound pair functional module; and, determine whether this functional module can be called according to the usage license of this functional module.
According to an aspect of the present invention, its feature is that also functional module uses control module also to be used to receive usage license installation kit, and installs or upgrade the usage license of the functional module of appointment.
According to an aspect of the present invention, its feature is that also functional module uses control module to check the usage license of the functional module of appointment, if the usage license of this functional module is effective, then allow this functional module to be used, otherwise do not allow this functional module to be used.
According to an aspect of the present invention, its feature also is, the usage license that the usage license effectively comprises this functional module exists and be not out of date.
According to an aspect of the present invention, its feature also is, the usage license is expired to comprise the user has surpassed this usage license to the use of software allowed band.
According to an aspect of the present invention, its feature also is, the allowed band that the use of software has been surpassed this usage license comprises above the service time of this usage license regulation or number of times etc.
According to an aspect of the present invention, its feature is that also functional module uses control module checking by after the legitimacy and validity of this usage license installation kit, for the functional module of appointment is installed or the renewal usage license.
According to an aspect of the present invention, its feature is that also the usage license of the functional module of described installation or renewal appointment comprises: functional module uses control module to check the legitimacy and the validity of this usage license installation kit;
If this usage license installation kit is legal and effective, then use the usage license of carrying in this usage license installation kit to upgrade the usage license of the functional module of appointment;
If the usage license of this functional module does not exist, then preserve the usage license of carrying in the usage license installation kit for this functional module;
If this usage license installation kit is illegal or invalid, then stop the installation process of this usage license installation kit.
According to an aspect of the present invention, its feature is that also the validity checking of usage license installation kit comprises: the check code of checking this usage license installation kit.
According to an aspect of the present invention, its feature is that also check code is to use predefined cryptographic algorithm and password that the usage license is calculated.
According to an aspect of the present invention, its feature is that also described cryptographic algorithm can be the Digital Signature Algorithm of MAC algorithm, hmac algorithm or asymmetric cryptography.
According to an aspect of the present invention, its feature is that also the validity check of usage license installation kit comprises: check whether this usage license installation kit is applicable to this software protecting equipment; The strategy that whether is set in advance influences and can not be used.
According to an aspect of the present invention, its feature is also check whether this usage license installation kit is applicable to that this software protecting equipment comprises: whether this software protecting equipment is included in the scope of application of usage license installation kit.
According to an aspect of the present invention; its feature also is; the strategy that whether set in advance influence and can not being used comprises: if this usage license installation kit is once effective, and installed on this software protecting equipment, and then can not have been installed once more.
Description of drawings
Fig. 1: structural representation of the present invention.
Fig. 2: the use schematic flow sheet of the functional module among the present invention.
Fig. 3: the usage license is installed or the renewal schematic flow sheet among the present invention.
Fig. 4: functional module is used schematic flow sheet in the one embodiment of the invention.
Fig. 5: the usage license in the one embodiment of the invention is installed or the renewal schematic flow sheet.
Embodiment
For making purpose of the present invention, technical scheme and advantage clearer, below with reference to the accompanying drawing embodiment that develops simultaneously, the present invention is further elaborated.
Fig. 1 is a structural drawing of the present invention, as shown in Figure 1, includes functional module in the software protecting equipment of the present invention and uses control module.
It can be the hardware module of a special use that functional module is used control module, also can be the firmware program in the software protecting equipment.Whether its function is: receive the request of the functions of use module that comes from the outside, the usage license of this functional module is resolved, come control function module can be used according to the result who resolves.The described usage license is kept at the memory block of software protecting equipment inside, meets the form that functional module uses control module to accept, and the content of a typical usage license and form are:
[beginning]
License?ID=0x23988707
Meter=32
ExpireDate=20091001
[end]
Wherein, License ID represents the ID of the usage license, and Meter represents the number of times that software can be used, and ExpireDate represents that software is operable by the date.Whether functional module uses control module to come the arbitration functions module to allow to be used according to the value of key word " Meter " and " ExpireDate ".
Describedly whether can be used, be meant that functional module uses control module to check the functional module usage license of appointment according to usage license control function module.If the usage license of this functional module is effective, then allows this functional module to be used, otherwise do not allow this functional module to be used.
The described functional module usage license is meant that effectively the usage license of this functional module exists, and not out of date.
The described usage license is expired to be meant, the user is to the allowed band that surpasses this usage license of the use of software, for example: surpass service time of this usage license regulation or number of times etc.
Functional module uses control module also to be used to receive the usage license installation kit of new functional module, and installs or upgrade the usage license of the functional module of appointment.
Described installation or upgrade the usage license of the functional module of appointment is meant that functional module uses control module to check the legitimacy and the validity of this usage license installation kit.If this usage license installation kit is legal and effective, then use the usage license of carrying in this usage license installation kit to upgrade the usage license of the functional module of appointment, if the authorization message of this functional module does not exist, then preserve the usage license of carrying in the usage license installation kit for this functional module; If this usage license installation kit is illegal or invalid, then stop the installation process of this usage license installation kit.
The validity checking of usage license installation kit is the check code of this usage license installation kit of digital examination, thereby whether the publisher who determines this usage license installation kit is legal, and whether the data that this usage license is installed are correct and complete.
Described check code is that the password that the software developer uses predefined cryptographic algorithm and software developer to have calculates the usage license.
Described cryptographic algorithm can be the MAC algorithm, the Digital Signature Algorithm of hmac algorithm or asymmetric cryptography.
The key that the check code of this usage license installation kit of described inspection is to use predefined cryptographic algorithm and software protecting equipment to preserve is checked and verified the check code of the usage license of carrying in this usage license installation kit.
Described cryptographic algorithm can be the MAC algorithm, the signature verification algorithm of hmac algorithm or asymmetric cryptography.
The validity check of usage license installation kit is whether this usage license installation kit of digital examination is applicable to this software protecting equipment, and for example: this software protecting equipment is not included in the scope of application of usage license installation kit; Whether be subjected to the influence of certain strategy that sets in advance and can not be used, for example: if this usage license installation kit is once effective, and on this software protecting equipment, installed, and then can not be mounted once more.
In sum, provide complete usage license administrative unit in the software protecting equipment provided by the invention, can prevent that the cracker from passing through the usage license administration module of trace analysis software, obtains illegal software license.Usage license installation kit of the present invention in addition has the check code that cryptographic algorithm generates, and the needed key that calculates identifying code has only the software developer to have, and therefore prevents that the cracker from forging the usage license.Thereby software developer's just rights and interests have been protected.
Fig. 2 is the use schematic flow sheet to software function module of the present invention, as shown in Figure 2, among the present invention calling of functional module be may further comprise the steps:
Step 201 receives the request of extraneous functions of use module.
In this step, the functional module in the software protecting equipment uses control module to receive the request that outer bound pair functional module is called by communication interface.
Step 202 is checked the usage license of this functional module.
In this step, functional module in the software protecting equipment is used the usage license of control module audit function module, if the usage license is effectively then execution in step 203, otherwise execution in step 204.
The described functional module usage license is meant that effectively the usage license of this functional module exists, and not out of date.
The described usage license is expired to be meant, the user is to the allowed band that surpasses this usage license of the use of software, for example: surpass service time of this usage license regulation or number of times etc.
Step 203 is called this functional module.
In this step, the functional module in the software protecting equipment is used the control module calling functional modules and is returned to the external world calling the result by communication interface.
Step 204 stops the invoked procedure of this functional module.
In this step, the functional module in the software protecting equipment is used the invoked procedure of control module termination for functional module.
Fig. 3 is the installation procedure synoptic diagram of the usage license installation kit among the present invention, as shown in Figure 3, among the present invention, the installation of the usage license or more new technological process comprise following steps:
Step 301 receives the extraneous usage license installation kit of importing.
In this step, the functional module in the software protecting equipment uses control module to receive extraneous input usage license installation kit by communication interface.
Step 302, the legitimacy of inspection usage license installation kit.
Functional module in this step in the software protecting equipment uses control module to check the legitimacy of usage license installation kit.If illegal execution in step 305, if legal execution step 303.
The validity checking of usage license installation kit is the check code of this usage license installation kit of digital examination, thereby whether the publisher who determines this usage license installation kit is legal, and whether the data that this usage license is installed are correct and complete.
Described check code is that the password that the software developer uses predefined cryptographic algorithm and software developer to have calculates the usage license.
Described cryptographic algorithm can be the MAC algorithm, the Digital Signature Algorithm of hmac algorithm or asymmetric cryptography.
The key that the check code of this usage license installation kit of described inspection is to use predefined cryptographic algorithm and software protecting equipment to preserve is checked and verified the check code of the usage license of carrying in this usage license installation kit.
Described cryptographic algorithm can be the MAC algorithm, the signature verification algorithm of hmac algorithm or asymmetric cryptography.
Step 303, the validity of inspection usage license installation kit.
In this step, functional module uses control module to check the validity of this usage license installation kit in the software protecting equipment.If this usage license peace is subcontracted effectively execution in step 304, otherwise execution in step 305.
The validity check of usage license installation kit is whether this usage license installation kit of digital examination is applicable to this software protecting equipment, and for example: this software protecting equipment is not included in the scope of application of usage license installation kit; Whether be subjected to the influence of certain strategy that sets in advance and can not be used, for example: if this usage license installation kit is once effective, and on this software protecting equipment, installed, and then can not have been installed once more.
Step 304, the usage license of installation or update software functional module.
In this step, functional module uses control module to install as functional module or the renewal usage license in the software protecting equipment.
Described renewal or install and use permission and refer to: if the usage license of this functional module exists, then use the usage license of carrying in this usage license installation kit to upgrade the usage license of the functional module of appointment, if the authorization message of this functional module does not exist, then preserve the usage license of carrying in the usage license installation kit for this functional module.
Step 305, the installation process of the termination usage license.
In this step, functional module uses control module to stop the installation of the usage license in the software protecting equipment.
Software licensing is the access times of restricted software in the present embodiment.And use hmac algorithm to calculate the check code of usage license installation kit.And with USB conduct and extraneous communication interface, in the present embodiment, usage license installation kit is for once effective.
Fig. 4 is in the present embodiment, and functional module is used schematic flow sheet, and as shown in Figure 4, the use flow process of functional module comprises following steps:
Step 401 receives the request of extraneous functions of use module.
In this step, the functional module in the software protecting equipment uses control module to receive the request of extraneous calling functional modules by USB interface.
Step 402 is searched the usage license of this functional module.
In this step, the functional module in the software protecting equipment uses control module to search the usage license of the functional module of appointment.If do not find the mandate of this functional module, execution in step 406, if find, then execution in step 403.
Step 403 is checked the access times of this functional module.
In this step, functional module in the software protecting equipment uses control module to check access times in the usage license of this functional module, if access times are 0, and execution in step 406, if access times are non-0, then execution in step 404.
Step 404, access times successively decrease.
In this step, functional module in the software protecting equipment is used successively decrease access times in the usage license of this functional module of control module.
Step 405, calling functional modules.
In this step, the functional module in the software protecting equipment uses control module to call the functional module of appointment, and by the USB interface return results.
Step 406, the invoked procedure of expiry feature module.
In this step, the functional module in the software protecting equipment is used the invoked procedure of control module expiry feature module.
Fig. 5 is that the usage license in the present embodiment is installed or the renewal schematic flow sheet, and as shown in Figure 5, in the present embodiment, the installation or the renewal of the usage license comprise following steps:
Step 501 receives extraneous input usage license installation kit.
In this step, the functional module in the software protecting equipment uses control module to receive the usage license installation kit of extraneous input by USB interface.
Step 502, the HMAC value of inspection usage license installation kit.
In this step; functional module in the software protecting equipment uses control module according to the key value of preserving in advance; calculate the HMAC value of the usage license; the HMAC value of carrying in result of calculation and the usage license installation kit relatively; if in full accord, think that then the HMAC value is legal, execution in step 503; otherwise, think illegal execution in step 506.
Step 503, the applicability of the bag that the inspection usage license is installed.
In this step; functional module in the software protecting equipment uses the scope of application in the control module inspection usage license to describe part, if the scope of application includes this software protecting equipment in describing, then thinks to be suitable for execution in step 504; otherwise think inapplicable, execution in step 506.
Step 504 checks whether usage license installation kit was used.
In this step, functional module in the software protecting equipment uses control module to use preset rule to check that the sequence number in this usage license installation kit determines whether this usage license installation can be used.If can be used then execution in step 505, otherwise execution in step 506.
Step 505 is installed or the renewal usage license.
In this step, functional module uses control module to install as functional module or the renewal usage license in the software protecting equipment.
Described renewal or install and use permission and refer to: if the usage license of this functional module exists, then use the usage license of carrying in this usage license installation kit to upgrade the usage license of the functional module of appointment, if the authorization message of this functional module does not exist, then preserve the usage license of carrying in the usage license installation kit for this functional module.
Step 506, the installation process of the termination usage license.
In this step, functional module uses control module to stop the installation of the usage license in the software protecting equipment.

Claims (13)

1. one kind is passed through the software protecting equipment that usage license Control Software is used, and the inside of described software protecting equipment comprises:
The memory block, the usage license that is used to preserve software function module;
Communication interface is used for carrying out communication with the external world; Wherein said communication interface is a USB interface;
It is characterized in that described software protecting equipment comprises:
Functional module is used control module, is used for receiving by described communication interface the call request of the described functional module of outer bound pair, and according to the usage license of described functional module, determines whether described functional module can be called; And be used for receiving usage license installation kit, and install or upgrade the usage license of the functional module of appointment by described communication interface; And also will call the result returns to the external world by described communication interface to be used to call described functional module;
It is the hardware module of special use or the firmware in the described software protecting equipment that wherein said functional module is used control module;
The form of the described usage license meets the form that described functional module uses control module to accept;
Described functional module uses control module to judge according to the value of the key word in the described usage license whether described functional module allows to be used.
2. device according to claim 1, it is characterized in that functional module uses control module to check the usage license of the functional module of appointment, if the usage license of described functional module is effective, then allow described functional module to be used, otherwise do not allow described functional module to be used.
3. device according to claim 2 is characterized in that the usage license effectively comprises: the usage license of described functional module exists and is not out of date.
4. device according to claim 3 is characterized in that, the usage license is expired to be comprised: the user has surpassed the allowed band of the described usage license to the use of software.
5. device according to claim 4 is characterized in that, the allowed band that the use of software has been surpassed the described usage license comprises: the service time or the number of times that surpass described usage license regulation.
6. device according to claim 1 is characterized in that, functional module uses control module after the legitimacy and validity checked by described usage license installation kit, for the functional module of appointment is installed or the renewal usage license.
7. device according to claim 6 is characterized in that, the usage license of the functional module of described installation or renewal appointment comprises: functional module uses control module to check the legitimacy and the validity of described usage license installation kit;
If described usage license installation kit is legal and effective, then use the usage license of carrying in the described usage license installation kit to upgrade the usage license of the functional module of appointment;
If the usage license of described functional module does not exist, then preserve the usage license of carrying in the usage license installation kit for described functional module;
If described usage license installation kit is illegal or invalid, then stop the installation process of described usage license installation kit.
8. device according to claim 7 is characterized in that, the validity checking of usage license installation kit comprises: the check code of checking described usage license installation kit.
9. device according to claim 8 is characterized in that, check code is to use predefined cryptographic algorithm and password that the usage license is calculated.
10. device according to claim 9 is characterized in that, described cryptographic algorithm is the Digital Signature Algorithm of MAC algorithm, hmac algorithm or asymmetric cryptography.
11. device according to claim 7 is characterized in that, the validity check of usage license installation kit comprises:
Check whether described usage license installation kit is applicable to described software protecting equipment;
The strategy that whether is set in advance influences and can not be used.
12. device according to claim 11 is characterized in that, check whether described usage license installation kit is applicable to that described software protecting equipment comprises: whether described software protecting equipment is included in the scope of application of usage license installation kit.
13. device according to claim 11; it is characterized in that; the strategy that whether set in advance influence and can not being used comprises: if described usage license installation kit is once effective, and installed on described software protecting equipment, and then can not have been installed once more.
CN200810111992XA 2008-05-20 2008-05-20 Device for operation by using permission control software Active CN101339595B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200810111992XA CN101339595B (en) 2008-05-20 2008-05-20 Device for operation by using permission control software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810111992XA CN101339595B (en) 2008-05-20 2008-05-20 Device for operation by using permission control software

Publications (2)

Publication Number Publication Date
CN101339595A CN101339595A (en) 2009-01-07
CN101339595B true CN101339595B (en) 2011-08-10

Family

ID=40213661

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810111992XA Active CN101339595B (en) 2008-05-20 2008-05-20 Device for operation by using permission control software

Country Status (1)

Country Link
CN (1) CN101339595B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102402656A (en) * 2010-09-19 2012-04-04 邹芬 Method for realizing software authorization by using dual power supply system device independent of host computer in real time
CN102065077B (en) * 2010-11-11 2013-12-18 中国联合网络通信集团有限公司 Method and system for distributing application software to terminal
US20120255033A1 (en) * 2011-03-28 2012-10-04 Microsoft Corporation Licensing software on a single-user basis
CN103164640A (en) * 2011-12-08 2013-06-19 北京深思洛克软件技术股份有限公司 Executive method of executable file in control software protective device
CN102930184B (en) * 2012-10-19 2015-11-25 华为技术有限公司 A kind of functional module loading method and device
CN104573493B (en) * 2014-12-25 2018-07-06 北京深思数盾科技股份有限公司 A kind of method for protecting software and system
CN106874714A (en) * 2017-02-15 2017-06-20 湖南长城银河科技有限公司 A kind of software authorization method
CN107391966B (en) * 2017-07-21 2018-08-21 北京深思数盾科技股份有限公司 A kind of method for protecting software, device and software protective lock
CN108449315B (en) * 2018-02-05 2021-02-19 平安科技(深圳)有限公司 Request validity verifying device, method and computer readable storage medium
CN110381204B (en) * 2019-07-16 2021-01-08 维沃移动通信有限公司 Information display method, mobile terminal and computer readable storage medium
CN116680005A (en) * 2023-05-26 2023-09-01 广州市玄武无线科技股份有限公司 Value-added function management and control method and device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1409834A (en) * 1999-10-18 2003-04-09 西门子公司 Electronic device with software protection
CN101034987A (en) * 2007-01-18 2007-09-12 北京飞天诚信科技有限公司 Method and device for improving the security of the intelligent secret key
CN101163044A (en) * 2007-11-12 2008-04-16 北京深思洛克数据保护中心 Remote updating method and system for information safety equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1409834A (en) * 1999-10-18 2003-04-09 西门子公司 Electronic device with software protection
CN101034987A (en) * 2007-01-18 2007-09-12 北京飞天诚信科技有限公司 Method and device for improving the security of the intelligent secret key
CN101163044A (en) * 2007-11-12 2008-04-16 北京深思洛克数据保护中心 Remote updating method and system for information safety equipment

Also Published As

Publication number Publication date
CN101339595A (en) 2009-01-07

Similar Documents

Publication Publication Date Title
CN101339595B (en) Device for operation by using permission control software
KR101425464B1 (en) Access control system and access control method for a people conveyor control system
CN101344906B (en) Sectional type remote updating method
CN101866404B (en) Software system module independent authorization control method and device
TWI365654B (en) Method and system for verifying binding of an initial trusted device to a secured processing system
EP2262259A1 (en) Method for monitoring execution of data processing program instructions in a security module
DE60314871D1 (en) METHOD FOR AUTHENTICATING A USER IN ACCESS TO A SERVICE PROVIDER'S SERVICE
EP3072273B1 (en) Systems and methods for fuel dispenser security
CN103077458A (en) ATM (automated teller machine) secure transaction authentication method based on position
CN109086575A (en) A kind of authorization method and system of software license
WO2009117618A3 (en) Payment processing system trusted agent identification
KR20120051662A (en) A method for controlling unauthorized software application usage
CN106446613A (en) Protection method for pre-installed application in terminal
WO2012171568A8 (en) Method and apparatus for authenticating users of a hybrid terminal
WO2013044192A3 (en) Securing transactions against cyberattacks
US20070204328A1 (en) Production security control apparatus for software products and control method thereof
CN109598104A (en) Soft ware authorization based on timestamp and secret authentication file protects system and method
CN106897606A (en) A kind of brush machine means of defence and device
CN107994993B (en) Application program detection method and device
WO2006017144A3 (en) Real-time entry and verification of pin at point-of-sale terminal
CN101686129A (en) Novel method for strong safety service and user resource management
CN1971572A (en) Method and device for accurate charging in digital copyright management
JP2005161674A5 (en)
CN101404052A (en) Method for remotely activating software
WO2016186369A1 (en) Card payment method using dynamic otp

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: BEIJING SHENSI SHUDUN SCIENCE + TECHNOLOGY CO., LT

Free format text: FORMER OWNER: BEIJING SENSELOCK SOFTWARE TECHNOLOGY CO., LTD.

Effective date: 20150120

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 100086 HAIDIAN, BEIJING TO: 100872 HAIDIAN, BEIJING

TR01 Transfer of patent right

Effective date of registration: 20150120

Address after: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing

Patentee after: BEIJING SHENSI SHUDUN TECHNOLOGY Co.,Ltd.

Address before: 100086 Beijing City, Haidian District Zhongguancun South Street No. 6 Zhucheng building block B room 1201

Patentee before: Beijing Senselock Software Technology Co.,Ltd.

C56 Change in the name or address of the patentee
CP03 Change of name, title or address

Address after: 100193 Beijing, Haidian District, East West Road, No. 10, East Hospital, building No. 5, floor 5, layer 510

Patentee after: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

Address before: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing

Patentee before: BEIJING SHENSI SHUDUN TECHNOLOGY Co.,Ltd.

CP01 Change in the name or title of a patent holder

Address after: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee after: Beijing Shendun Technology Co.,Ltd.

Address before: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

CP01 Change in the name or title of a patent holder