CN102779043A - Software connection method and tool software - Google Patents

Software connection method and tool software Download PDF

Info

Publication number
CN102779043A
CN102779043A CN2012102209879A CN201210220987A CN102779043A CN 102779043 A CN102779043 A CN 102779043A CN 2012102209879 A CN2012102209879 A CN 2012102209879A CN 201210220987 A CN201210220987 A CN 201210220987A CN 102779043 A CN102779043 A CN 102779043A
Authority
CN
China
Prior art keywords
software
add
ons
tool
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012102209879A
Other languages
Chinese (zh)
Other versions
CN102779043B (en
Inventor
吴东辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yuntu Chongqing Business Information Consulting Service Co ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810656034.4A priority Critical patent/CN108845805B/en
Priority to CN201210220987.9A priority patent/CN102779043B/en
Publication of CN102779043A publication Critical patent/CN102779043A/en
Application granted granted Critical
Publication of CN102779043B publication Critical patent/CN102779043B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

The invention relates to the field of software, and particularly relates to a software connection method and tool software. The tool software provided by the invention is characterized in that the tool software recompiles at least two existing independent softwares into a new software, and builds an operation instruction set in the compiling process; an operation order of the two independent softwares is appointed in the operation instruction set; the operation instruction set restricts the operation relation of the two independent softwares, and the new software only includes a start button. The software connection method has the beneficial effects that operation of at least two softwares is kept in a constraint relation through an encryption module, for example, the softwares must simultaneously operate or successively operate, and thus the target software must be authorized by additional software when being used.

Description

Method and tool software that a kind of software connects
Technical field
The present invention relates to software field, particularly relates to method and tool software that a kind of software connects.
Background technology
Software generally is meant can accomplish a certain functional programs; Said program is in a certain environment or platform operation, and the software of general a kind of function is isolated operation, and the function Different software possibly adhere to different developers separately; And the developer is unfamiliar with the other side's development technique each other; Sometimes need at least 2 Different software to move simultaneously or successively, for example a certain functional software is the purpose software that the user needs, and serves and need to adopt MSN to link up in the use; Preferred plan is to let these two softwares move simultaneously; And MSN operation is the necessary condition of purpose running software, can guarantee purpose software user's presence like this, technically can bind this two softwares; Adopt proper technology to connect these two softwares in other words, or provide a tool software that these two softwares connections are bundled to together; And for example: purpose software can be connected packing with the advertisement software for display; Purpose software is promoted software with recommendation and is connected packing; Or the like, it is a lot of needing the situation of this pattern.Because Different software generally adheres to different developers separately, so the technical scheme that connects is to realize through skinning technique, promptly needn't relate to the other side's development technique, do not relate to the other side's source code, only the shell to software carries out connection processing.The software packaging of prior art can be bundled to the assembly of or several softwares together, but can not realize the mutual restriction operation between several softwares; Existing shell encryption technology is with tool software target software to be carried out shell to encrypt (being commonly called as " involucrum "); The programming code that does not promptly relate to target software is explained; Target software is through needing decrypting process or cooperate encryption lock could move after encrypting, encryption lock be a kind of inner preserve decrypted program hardware, the decrypted program cooperation interior with encryption lock just can normally be moved by the target software of involucrum; There is not encryption lock just can not be moved by the target software of involucrum; So just protected target software not by illegal use, encryption lock protection be target software, be not the function of the connection software that proposes of the present invention.The objective of the invention is to adopt the shell disposal route, connect at least two softwares, and make the operation of two softwares keep restricting relation through encrypting module, as: must move simultaneously or operation successively.The purpose software that the user uses is that the present invention connects the target software that Core Generator software will be handled, and the software of generation is software packaging, and software packaging structurally is the structure from decrypted packet, but operating part is a decrypted code, and involucrum partly is encrypted program.
Further, the implication of software can be here: program or module or file or code, typical code such as URL linked code.
Summary of the invention
Explanation of nouns:
Encrypt generation module: adopting compiler that software is carried out that shell handles is involucrum, forms executable code and by involucrum software; Said compiler comprises Compilation Method and compiling parameter; Compilation Method and compiling parameter are for not manifested by the software user of involucrum; Even do not increase extra encryption measures the encryption meaning is not arranged yet, do not get rid of extra encryption measures certainly, like AES, password authentication etc.
Encrypting module: by encrypting executable code that generation module generates and at least two by involucrum software, two the operation power and methods of operation by involucrum software are controlled by executable code.Encrypting module of the present invention is appreciated that in argumentation to encrypting annexation.
The purpose of this invention is to provide method and tool software that a kind of software connects; Software comprises PC software and mobile terminal software; The implication of software is program or module or file or code etc. and other code collection of hardware phase region, and technical scheme of the present invention is:
Method and tool software that a kind of software connects; It is characterized in that: a tool software is arranged; Said tool software is a new software with at least two existing stand alone softwares recompilities, and newly-built operating instruction collection in the compilation process, said operating instruction collection restrict the operational relation of said two stand alone softwares; At least be the operation of another software of soft ware authorization, or the operation of a software depend on the operation of another software.
Method and tool software that a kind of software connects is characterized in that: encrypting module is arranged, and said encrypting module connects at least two softwares, and the operation of a software depends on the operation of another software at least, and the operation of at least one software depends on encrypting module.
Method and tool software that described a kind of software connects, it is characterized in that: encrypting module is the network encryption mode, i.e. the SaaS pattern.
Method and tool software that described a kind of software connects; It is characterized in that: a tool software is arranged; Said tool software comprises the encryption generation module; It is Add-ons that said tool software comprises at least one software that need connect, said tool software with Add-ons and at least another software be that target software passes through packing operation and generates a packing software, simultaneously; In generative process; Tool software embeds software packaging with encrypting module, and it is software packaging that said tool software generates the software with Add-ons function with target software, and said software packaging moves the back simultaneously or successively obtain the operational effect of Add-ons and two softwares of target software in the software packaging by the user.
Method and tool software that described a kind of software connects, it is characterized in that: tool software has User Interface, is used for importing when the user packs operation information needed.
Method and tool software that described a kind of software connects; It is characterized in that: the software that tool software will connect generates software packaging with another software through the packing operation; The software that needs to connect is Add-ons; Another software is target software, and it is the additional function software packaging that tool software generates the software with Add-ons function with target software.
Method and tool software that described a kind of software connects, it is characterized in that: Add-ons is a recommending module, and tool software comprises recommending module, it is the recommendation function software packaging that said tool software generates the software with recommendation function with target software.
Method and tool software that described a kind of software connects, it is characterized in that: Add-ons is the advertisement merge module, and tool software comprises the advertisement merge module, it is the advertising function software packaging that said tool software generates the software with advertising function with target software.
Method and tool software that described a kind of software connects; It is characterized in that: Add-ons is a MSN; Tool software comprises MSN, and it is the instant communication function software packaging that said tool software generates the software with instant communication function with target software.
Method and tool software that described a kind of software connects, it is characterized in that: Add-ons is a MSN, and target software is a user application software, and licensing of application software depends on MSN.
Method and tool software that described a kind of software connects; It is characterized in that: Add-ons is certain functional software, as: but MSN, SNS software, social software, webpage, pop-up window, animation, audio frequency and video, geographic position locating module, payment module, advertisement module, recommending module, authorization module etc., browser reading file, image file, URL linked code etc.
Above-mentioned Add-ons can make up each other, forms multi-functional Add-ons, as: MSN+payment module; Advertisement module+payment module; MSN+advertisement module; MSN+authorization module etc.
Method and tool software that described a kind of software connects; It is characterized in that: target software is certain user software, as: but passenger traffic query software, hotel query software, handset capability Optimization Software, Games Software, construction budget software, amount calculation software, design software, various client software reading file, picture etc.
Method and tool software that described a kind of software connects is characterized in that: Add-ons is the computer code set, as: program or module or file or code.
Method and tool software that described a kind of software connects is characterized in that: target software is the computer code set, as: program or module or file or code.
Method and tool software that described a kind of software connects the steps include: (1) the Core Generator software that connects, and tool software comprises the encryption generation module, and tool software has User Interface; (2) select Add-ons, Add-ons and assembly are put into the tool software workspace; (3) workspace of tool software put into target software and assembly by select target software; (4) operation button settings, the operation button or the shortcut of the software packaging after promptly setting will generate; (5) carry out the tool software setting operation, encrypting module is embedded Add-ons and target software.
Or the steps include: that (1) the Core Generator software that connects, tool software comprise and encrypt generation module and Add-ons that tool software has User Interface; (2) workspace of tool software put into target software and assembly by select target software; (3) Add-ons setting promptly is provided with requirement and the parameter that Add-ons moves in the future; (4) operation button settings, the operation button or the shortcut of the software packaging after promptly setting will generate; (5) carry out the tool software setting operation, encrypting module and Add-ons are embedded target software.
Encrypt generation module and comprise compiler, compile step is: (1) is extracted Add-ons and is started item or Starting mode, writes the operating instruction collection; (2) target software is divided into plurality of sections, and, numbering is write the operating instruction collection every segment number; (3) the software section of cutting apart is upset by certain rule, and will be upset rule and write the operating instruction collection; (4) with operating instruction collection and all software section of cutting apart compiling packings.
Said tool software can be a client software, also can be server software, and server software promptly adopts WEB or WAP method of service, logins the back by the user and uses, and is responsible for generating wrapper by the website, offers the user after the completion.
The implication of encrypting module according to the invention is: the software packaging publisher stipulates the method for operation of target software; The direct method of operation of target software is hidden for the software user; The software user can not change the regulation of the method for operation of target software packetized software publishing side; In other words the operation power of former target software is encrypted, utilize encrypting module that Add-ons and purpose software are bound in other words.
The mode of encrypting has: a, encryption generation module are provided by the third party; Add-ons and target software unification are packed as component encrypts; Add-ons and target software start button submit to the encryption generation module to carry out programmed, or operation successively, or operation simultaneously; Or authorize the target software operation behind the certain number of times of Add-ons operation, or authorize the target software operation after satisfying the certain condition of Add-ons.B, Add-ons side use the encryption generation module that target software is connected; Because the active that is Add-ons side connects; Add-ons can be programmed with the source code to oneself, so can the service condition of Add-ons be designed, the operation result of Add-ons is handled; Result control encrypting module, encrypting module is authorized operation to target software.C, target software side use the encryption generation module that Add-ons is connected; Because the active that is target software side connects; Target software can be programmed with the source code to oneself; So can the service condition of target software be designed, the service condition of target software can be limited by the output parameter of Add-ons, for example adopt MSN (as Add-ons) that the application software of oneself developing is authorized; Must be online such as the application software user, and user's IMU signal must be in authorization database.
The principle of encrypting has: a, for software development side, pass point can be set in software, and obj, dll, ActiveX etc. are called, or directly encrypt and be compiled into executable file; B, use shell Encryption Tool; The software that need are encrypted carries out the uniform packing encryption; It is characterized in that not relating to encrypted software programming source code; The scale-of-two byte of only software being formed is upset reorganization by certain rule, need reduce by meta-rule during operation, can't not move if there is the also meta-rule software of encrypting module like this; C, encrypting module is divided into ciphering unit and two functional units of decrypting device, ciphering unit embeds target software, and decrypting device embeds Add-ons, and decrypting device and ciphering unit are worked in coordination just can keep the operation of target software and Add-ons.
Encrypting module generally comprises AES and encrypts the factor, can formulate by the user, third party's encrypting module supplier can also provide different ID number with the user from establishing the cryptoguard module, to distinguish different encrypted module user.
Encrypting the factor can be to preserve in many ways, and promptly the SaaS pattern announces 201010577492 like Chinese patent.
Need to prove: Add-ons is if program or module, and target software also is program or module, can restrict the operational relation of Add-ons and target software through encrypting module; Add-ons is if file (like the word file) or code (like the URL linked code); Target software is program or module, can only restrict the operation of target software through encrypting module, is that association is opened for file; For linked code is to trigger to carry out; Behind the File Open or linked code can freely close after carrying out, the effect of encrypting module is that target software is encrypted, and opens file simultaneously or triggers linked code; Add-ons is if program or module (like MSN or browser); Target software is file (like a pdf document); The effect of encrypting module is that pdf document is encrypted, and when pdf document is opened in deciphering certainly, moves Add-ons simultaneously, can freely close if Add-ons is not encrypted; Encrypt like Add-ons, then form the restricting relation of Add-ons and pdf document; Add-ons and target software all are files, can form restricting relation through encrypting module, or only restrict a side; Add-ons or target software are code (like the URL linked code), carry out because code is disposable triggering, carry out the back incident and finish, so generally can not form restricting relation.The type of software can be carried out independent assortment according to the requirement of commercial application with effect.
Above-mentioned annex software and target software can exchange in form.
The invention has the beneficial effects as follows: make the operation of at least two softwares keep restricting relation through encrypting module; As: must move simultaneously or operation successively; Must be when can be implemented in application target software like this through the mandate of Add-ons, purpose software is the needed software of user, is MSN like Add-ons; So just can guarantee and user's communication that the while also can be realized a kind of authorization method of purpose software; And for example Add-ons is a kind of software through communication channel recommendation user, so just can realize that the user must recommend other users' ability application target software; And for example Add-ons is a kind of advertisement module, so just can realize the user must be under the state of display ads could application target software; Just like Add-ons is the URL linked code, and purpose software is pdf document, and the URL linked code is pointed to an advertising platform, can realize that like this pdf document author clicks advertisement through the reader and obtains income.The purpose software that the user uses is the target software that tool software of the present invention will be handled.
Description of drawings
Fig. 1 concerns synoptic diagram for encrypting module of the present invention and each software.
Fig. 2 encrypts synoptic diagram for software packaging of the present invention.
Fig. 3 is the another kind of encryption principle synoptic diagram of the present invention.
Fig. 4 connects Core Generator software (third party) packing process flow diagram for the present invention.
Fig. 5 connects Core Generator software (Add-ons side) packing process flow diagram for the present invention.
Fig. 6 is an advertisement module embodiment advertisement module schematic diagram for Add-ons of the present invention.
The method program process flow diagram of target software through recommending to obtain the authorization when Fig. 7 is recommending module for Add-ons of the present invention.
Recommending module was recommended the user program process flow diagram when Fig. 8 was recommending module for Add-ons of the present invention.
When being recommending module for Add-ons of the present invention, adopts Fig. 9 the embodiment of recommending Core Generator software (a kind of connection Core Generator software) target software to be generated software packaging.
Software packaging operation synoptic diagram when Figure 10 is recommending module for Add-ons of the present invention.
Figure 11 is the embodiment of a kind of target software remote authorization of tool software realization of the present invention.
Figure 12 is a kind of embodiment of MSN for Add-ons of the present invention.
Figure 13 encrypts the generation module fundamental diagram for the present invention.
Figure 14 encrypts generation module starts target software with the Add-ons operation result fundamental diagram for the present invention.
Figure 15 encrypts the fundamental diagram of generation module encipher only target software for the present invention.
Figure 16 connects the embodiment of customizing browser and pdf document formation advertisement mode with encrypting module for the present invention.
Embodiment:
Below in conjunction with accompanying drawing and embodiment the present invention is further specified.
Fig. 1 concerns synoptic diagram for encrypting module of the present invention and each software.101 encrypting modules are responsible for the Add-ons that need connect is carried out related encryption with target software, make the operation of target software receive the restriction of Add-ons, or Add-ons is first moves, and move behind the target software, or Add-ons and target software move simultaneously; 102 target softwares; The 103rd, another target software, the quantity of target software is unrestricted; 104 Add-onses; The 105th, another Add-ons, the quantity of Add-ons is unrestricted; 106 operation buttons are responsible for starting Add-ons and target software.
Further, Add-ons is the computer code set, as: program, module, file, code; Or target software is computer code set, as: program, module, file, code.Generic-document is DOC with the operation of suffix name associated program like word file suffix name in computer system, and code has the specific run mode; Triggering link like the URL code points to; Two files that connected by encrypting module in this case can represent that promptly packaging file is the suffix name of former file destination, like this through the click packaging file with file destination suffix name; Packaging file is related corresponding software operation from the deciphering back, and appended document must move simultaneously.
Fig. 2 encrypts synoptic diagram for software packaging of the present invention.201 operation buttons are responsible for starting software packaging; 202 packetization module comprise 203 Add-onses, 204 encrypting modules, 205 target softwares.The operation of target software depends on the operation of Add-ons, or authorizes encrypting module to allow the target software operation after satisfying the certain service condition of Add-ons.
The function of encrypting module is to bind the operational relation of Add-ons and target software, and encrypting module can be a notion, untrue existence; To the pack essence of operation of Add-ons and target software is to Add-ons and target software connects on function and integral body recompilates; Compilation Method is determined that by tool software Compilation Method does not manifest for the user, and is perhaps unreadable; So be interpreted as encryption; Be that Compilation Method is a kind of encryption method, Compilation Method is made up of compiler language, and compiler language is made up of instruction code.
Fig. 3 is the another kind of encryption principle synoptic diagram of the present invention.301 operation buttons are responsible for software startup; 302 Add-onses; 303 decrypting device; 304 ciphering units; 305 target softwares.303 decrypting device and 304 ciphering units are formed encrypting module 306; 304 ciphering units embed 305 target softwares and form encryption target software 307; 303 decrypting device embed in 302 Add-onses; By 301 operation pushbutton enable Add-onses 302; Add-ons 302 starts ciphering unit 303; Here Starting mode has two kinds; Or directly start, or starting decrypting device satisfying the Add-ons back that imposes a condition, 303 decrypting device and 304 ciphering unit swap datas are kept the operation of target software 305.
Fig. 4 connects Core Generator software (third party) packing process flow diagram for the present invention.401 connect Core Generator software; Be tool software according to the invention, said tool software comprises the encryption generation module, and said tool software provides for the third party; The source code that is Add-ons and target software all seals for said tool software; Unknowable, what can know only is start button and output result separately, so the setting of Add-ons is only limited to the original function of Add-ons.Behind the 401 connection Core Generator software startups User Interface is provided, user interactions has the selection interface, and 402 selection interfaces select the interface to comprise at least: 403 add the Add-ons options, are about to Add-ons and add the tool software working directory to; 404 add the target software option, are about to target software and add the tool software working directory to; 405 operation button settings, i.e. the button icon and the shortcut of the software packaging that setting will generate; 406 generate software packaging; Promptly connecting Core Generator software is connected Add-ons and embeds encrypting module with target software; The simplest link order is to do batch file to the startup shortcut of the startup shortcut of Add-ons and target software, is started by the autoexec order behind the generation software packaging; 407 offer the user.
Fig. 5 connects Core Generator software (Add-ons side) packing process flow diagram for the present invention.501 connect Core Generator software; It is tool software according to the invention; Said tool software comprises the encryption generation module, and said tool software is the exploitation of Add-ons side, and promptly the source code of Add-ons is open for said tool software; Can programme, so can require programming and setting according to said tool software to the setting of Add-ons.Behind the 501 connection Core Generator software startups User Interface is provided, user interactions has the selection interface, and 502 add target softwares, are about to target software or assembly and add said tool software working directory to; 503 selection interfaces; Select the interface to comprise at least: 504 Add-ons settings; Promptly can be provided with Add-ons on request, could move, or the unconditional number of times that moves of target software or time or the like are set like the Action Target software of carrying out the Add-ons requirement; 505 operation button settings, i.e. the button icon and the shortcut of the software packaging that setting will generate; 506 generate software packagings, promptly connect Core Generator software and Add-ons is connected with target software and embeds encrypting module; 507 offer the user.
Fig. 6 is an advertisement module embodiment advertisement module schematic diagram for Add-ons of the present invention.601 is advertisement module, and 601 advertisement module comprise: 602 communication units, be responsible for carrying out exchanges data and transmission with advertisement distributing system; Or the ad data sent of unidirectional reception advertisement distributing system, 603 storage unit are responsible for ad data is kept in; 604 display modules; Be responsible for ad data being shown the mode of demonstration can be the static WML page and dynamic asp page face, the advertisement display type can be: (1) literal wheel is broadcast; (2) image ad (3) Flash advertisement; (4) GIF advertisement; (5) audio frequency and video advertisement; (6) play the window advertisement; (7) unsteady advertisement, above-mentioned adline all can link to the webpage or the resource of advertising distributors' appointment through URL, comprises website or sales platform.
602 communication units: the bottom communication is based on ICP/IP protocol, and data transmission can be based on udp protocol.
603 storage unit: the writing of ad data, sense order, the temporary of ad data is provided, can also provide the off-line of advertisement to show in addition.
604 display units: support static and dynamically demonstration; Support the URL link; Support Event triggered URL, can realize URL initial trigger (URL just is triggered and is positioned to the network address displaying contents when being display unit work), agreement can be HyperText Transfer Protocol agreement.Be noted that in addition: the agreement itself that display unit adopts is just based on ICP/IP protocol; So itself just has communication function; As a kind of embodiment, the direct embedding media of display unit, display unit directly points to the sensing address that advertisement distributing system provides through Internet protocol.
605 encrypting modules are responsible for connecting advertisement module 601 and target software 606,607th, and advertisement distributing system is responsible for to advertisement module 601 releasing advertisements.
Advertisement module comprises display unit at least, and said display unit adopts HyperText Transfer Protocol agreement, and display type is JPG, JIF; The HTML code webpage (htm, html), or dynamic web page (php; Asp; Asp.net, jsp), or javascript or iframe mode are called.Display unit directly points to the sensing address that advertisement distributing system provides through Internet protocol, and advertisement distributing system provides changes link, and the record linkage number of times is used for the advertising fee clearing.
Advertisement module is used by the target software owner and is connected Core Generator software generation software packaging, promptly has the target software of advertising function.
Advertisement module connects Core Generator software to be provided by the ad distribution platform, or provides the WEB page online generating mode.
Advertisement module comprises display unit at least, and display unit is the indispensable unit of advertisement, and storage unit can be default, or the advertisement video data is stored in any position beyond the advertisement module.
Method and tool software that a kind of software connects, it is characterized in that: the software of connection or Add-ons are advertisement module, the operation of the operation decision target software of said advertisement module.
Method and tool software that a kind of software connects is characterized in that: but target software is program or client's perception file, advertisement module is a display unit, said display unit comprises display image and URL linked code, adopts HTTP.
As a kind of embodiment, advertisement module only keeps Flash advertisement or GIF advertisement, and the advertisement picture links to the ad distribution platform through URL; Target software is a pdf document, connects advertisement module and pdf document through encrypting module, if the PDF reader clicks advertisement like this; Then the ad distribution platform is pointed in link; The ad distribution platform can point to advertisement publishers' network address through changeing link, writes down the click behavior simultaneously, takes off advertisement publishers' ad click expense; And pay PDF author with ad click expense, realize a kind of profit model.In this case; The advertisement module and the pdf document that connect through encrypting module are packaging files, promptly explain close literature kit by oneself, and the file suffixes name is the pdf document form; Just need not to be provided with start button in this case, can direct correlation PDF program display file content through click.
The method program process flow diagram of target software through recommending to obtain the authorization when Fig. 7 is recommending module for Add-ons of the present invention.
Present numerous software is free, and mobile terminal software particularly, one of the object of the invention are exactly to realize that freeware realizes profit as the advertisement interface; Freeware is that abundant use crowd will be arranged as the key factor at advertisement interface, the method person's of being to use who adopts here recommendation, and promptly software freely uses through recommending to obtain the authorization; As set and recommend 2 people to authorize; Then increase the user, recommend 3 people to authorize, then increase the user with 3 n power if set with 2 n power; By that analogy, being set at n then increases with the n power mode of n.
At user side, the operation of software packaging and the authorisation step of target software are:
701 softwares are installed; 702 running softwares;
703 authorize detection, if authorized Y, then: 704 softwares normally move.
703 authorize detection, if unauthorized N, then: 705 recommend users, recommend the user can pass through SMS, microblogging, mailbox, MSN etc.;
706 recommend counting, if satisfy set point number, then 707 authorize, and software normally moves.
706 recommend counting, if the unmet set point number, then 708 selections are selected to continue 705 and recommended the user, or select operation of 709 trial editions or termination, and trial edition can be set at can move limited number of times.
The recommendation determining program is set, and concrete grammar is: the recommending data storage unit is set, and existing recommending data is compared in newly-increased recommending data and the storage unit, if any then not allowing to recommend or recommend failure.
Recommending module was recommended the user program process flow diagram when Fig. 8 was recommending module for Add-ons of the present invention.801 recommend the user, and program is carried out and recommended user instruction;
802 select channel, and 803 notes are used for portable terminals such as mobile phone, and the 804th, mail, microblogging, instant messaging, other software can be PC software, also can be mobile terminal softwares such as mobile phone;
If select 803 short breaths, then execution in step 807 is extracted and is sent content recommendation, and content recommendation comprises software download address and link at least;
If select 804, then carry out 805 logins and detect, if logined then carry out 807 steps, if login then carry out 806 login step;
808 extract the return message values, and program is carried out and read short breath and send the return message value of success or not, or read that mail sends, microblogging issue, instant messaging are sent, the return message value of other software, concrete grammar: a, realize through the related software interface function; B, directly read the user interface displayed value of related software; Said user interface displayed value is that related software informs that with execution result the user sends the inevitable step of success or not; So can directly catch software executing output identification value as a result from the user interface layer of any software, not receive the range upon range of influence of window.User interface is the User Interface that software provides, and is a kind of open code and instruction.
809 return message values judge, if success then carry out 810 and recommends successfully counting, if failure then carry out 816 and recommend failure would get into 814 selections;
811 recommend counting, if satisfy set point number, then 813 authorize, if the unmet set point number gets into 814 and selects; 814 select, and can select to recommend user steps again, and return 801 and recommend the user, or operation of 815 trial editions or termination.
When being recommending module for Add-ons of the present invention, adopts Fig. 9 the embodiment of recommending Core Generator software (a kind of connection Core Generator software) target software to be generated software packaging.Recommending the function of Core Generator software is that target software is packaged into the software packaging with recommendation function; Be a tool software, said tool software comprises recommending module at least, also comprises the encryption generation module in addition; Said tool software has User Interface, offers user's operation.The generation step is: 901 recommend the Core Generator running software; 902 add target software, and the target software that is about to required packing adds in the working directory of recommending Core Generator software; The 903rd, select the interface, the User Interface of promptly recommending Core Generator software to provide; 903 selection interfaces comprise: 904 number of times on probation are set the limited number of times that promptly allows the user to use; 905 recommend number of times to set, and promptly set the recommended amount of obtaining the authorization; 906 recommend channel to set, and promptly communication channel is set, and comprises note, mail, microblogging, instant messaging etc.; 907 target software icons, promptly the needed icon of select target software is generating the icon sign that forms behind the software packaging, and the icon sign of the shortcut of software packaging operation, or the button icon sign of software packaging operation; 908 advertisements promptly can recommend Core Generator software users interactive interface to embed advertisement, and advertisement can be prefabricated advertisement, also can be the advertisement of online transmission, and 908 advertisements are optional, can be default; 909 generate software packaging, and soon recommending module is connected with target software and is bundled to together; 910 offer the user; The 911st, encrypt generation module, consider that the user possibly skip the direct operational objective software of recommended program, can encrypt target software through encrypting module, promptly must pass through the operation that recommending module could be opened target software.
Said recommendation Core Generator software also can adopt WEB or WAP method of service, and the website promptly is provided, and will recommend Core Generator software to be placed on website operation, and the user can the Website login webpage, on the website, generates needed software packaging.
Software packaging operation synoptic diagram when Figure 10 is recommending module for Add-ons of the present invention.1001 operation buttons; 1002 recommending module; 1003 target softwares; 1004 encrypting modules; 1005 encrypt target softwares, and promptly target software and encrypting module are accomplished program function jointly, target software and encrypting module constantly swap data to keep the operation of program; Or target software and encrypting module are kept program run through at least swap data; Operation 1002 recommending module behind the 1001 operation pushbutton enables, the recommending module output order starts encrypts Cheng Jiami 1005, considers and cracks difficulty; Recommending module can be exported one group of instruction and start the encipheror bag; Further, made, promptly instructed with made must be consistent with the input of one group of synchronous recommending module output order of random number and encrypting module.
Software cryptography is existing mature technology, and concrete AES is exemplified below: AES is unpredictable, irreversible, and AES can become an integer to a numeral or character transformation; One house dog program generally is set in program, such as there being such one in one section application program: A=Fx (3), program will obtain the value of variables A according to constant 3; Can rewrite original program like this: A=Fx (DogConvert (1)-12342); Just constant 3 can not appear in the original program so, and get with DogConvert (1)-12342, like this; The person knows that just the actual constant that calls is 3 to have only the software programming; And if can not get the server for encrypting algorithm, the DogConvert function just can not return correct result, formula A=Fx (DogConvert (1)-12342) result certainly can be incorrect yet as a result.
Another kind of encryption method is to be transplanted to encrypting module at least one byte section in the target software, transplants rule and encrypts FACTOR CONTROL by one, and encrypting the factor has unique key, and key is controlled by recommending module.
Figure 11 is the embodiment of a kind of target software remote authorization of tool software realization of the present invention.Tool software according to the invention (connecting Core Generator software) is a kind of mandate Core Generator software; Said mandate Core Generator software is developed by the target software developer; Or the third party provides, if the third party provides, the third party authorizes Core Generator software to have exclusive sequence number and exclusive condition code and user cipher to be used for distinguishing different tools software user; Said mandate Core Generator generates the target software client on the one hand; Offer the user, generate the corresponding grant service module on the other hand, offer target software supplier and be used for the user of oneself is carried out remote authorization.1101 target software vendor servers are responsible for providing the user to serve, and comprise: 1102 pass point service modules, 1103 authorization service modules, 1104 authorize clients data blocks; 1105 clients comprise: 1106 authorization modules, and 1107 encrypting modules, 1108 target softwares, 1108 target softwares comprise 1109 pass points.1106 authorization modules comprise communication unit and ID authentication ' unit; Communication unit carries out exchanges data through the internet protocol 1101 target software vendor servers of negotiating peace; After the operation of 1105 clients, at first carry out the authorization check step, authorization message derives from 1101 target software vendor servers; Authorization module obtains authorizing the back to start the decrypting device of encrypting module 1107, and 1108 target softwares are able to operation through the explanation that embeds encrypting module 1107 wherein; In 1101 target software vendor servers, also be provided with 1104 authorize clients databases, its objective is provides the authorize clients data to authorization service module 1103, so that different clients is served in difference.
In order further to protect target software, the self-protection measure of perhaps taking as target software exploitation side increases by 1102 pass point service modules and 1109 pass points, and 1102 pass point service modules and 1109 pass points are cooperatings.At first in the operational process of target software, pass point is set; Insert query statement at pass point, query statement is operated the pass point service module, and the pass point service module is provided with AES; Produce rreturn value through algorithm; The rreturn value assignment is returned pass point, and target software normally moves, and target software can not move if rreturn value meets AES.Also can a part of program of target software be placed in the 1102 pass point service modules in addition, call, if call success then target software normally moves by 1109 pass points.Or directly target software is carried out shell and encrypt (SHELL), decrypting device is placed on target software vendor server end, supports the client objectives running software by the server end decrypting device.
1102 pass point service modules and 1109 pass points are optional, can be default when encrypting less demanding application.
Method and tool software that a kind of software connects, it is characterized in that: the software of connection or Add-ons are authorization modules, authorization module is responsible for the mandate of target software
Figure 12 is a kind of embodiment of MSN for Add-ons of the present invention.1201 target software suppliers end, 1201 target software suppliers end comprises: 1202 pass point service modules, 1203 MSNs, 1204 authorize clients databases; 1205 instant communication servers; 1206 clients, 1206 clients comprise: 1207 MSNs, 1208 encrypting modules, 1209 target softwares, 1209 target softwares comprise 1210 pass points; 1206 clients are bound through 1208 encrypting modules 1207 MSNs, 1209 target softwares and are formed by connecting.The mandate of target software realizes through MSN; The simplest mode is: authorize clients IMU signal is added target software supplier instant messaging buddy list; And the definition buddy list be the authorize clients list, can realize through MSN provider API.
1202 pass point service modules and 1210 pass points can be default.
Instant messaging generates strapping tool software (being a kind of of said connection Core Generator software) and is provided by the exploitation of instant messaging service side; And different serial numbers or ID can be set; Different encrypted mode and condition code can be provided, can form the soft ware authorization solution that a kind of instant messaging service side provides like this, and can additional pay module or link; On-line payment target software usage charges are by the online immediately authority to pay user of target software supplier authoring system.
Method and tool software that a kind of software connects, it is characterized in that: the software of connection or Add-ons are MSNs, MSN also is responsible for the mandate of target software.
Figure 13 encrypts the generation module fundamental diagram for the present invention.Encrypt generation module and comprise compiler, compiler can be by software developers develop, and compile mode, algorithm, parameter can be formulated voluntarily; Can increase encryption measures; Compiler can be a shell script, also can be the program that compiling is accomplished, and the employing compiler generally can not be understood after another software is compiled the formation packaging file; Packetized software is made amendment and is difficult for for the software packaging user; So even without extra encryption measures, for software packaging, also have the meaning of encryption, promptly the user can not make amendment to the running software mode in the bag.In addition,, generally carry compiler, and provide and carry out encryption measures in user's compilation process for existing developing instrument software.
1301 compilers are responsible for target software and Add-ons are handled, and extract the startup item of target software and Add-ons; 1302 Add-onses comprise that Add-ons starts, by compiler Add-ons are divided into plurality of sections artificially, as Add-ons cut apart 1, Add-ons cuts apart 2, Add-ons is cut apart n; The 1303rd, the software packaging of generation comprises two parts, and one is to move to collect, and another is that software is cut apart the storehouse, moves collection and comprises Add-ons startup item, target software startup item, operating instruction collection; Software cuts apart that target software and Add-ons are arranged in the storehouse is the summation of the plurality of sections cut apart by the people; As Add-ons cut apart 2, Add-ons cuts apart 1, target software cuts apart 2, target software cuts apart 1, up to n; These softwares are cut apart by compiler and are upset by certain rule; And cut apart numbering for each, upset rule and cut apart number record and concentrate at operating instruction; 1304 is target software, comprises target software and starts, by compiler target software is divided into plurality of sections artificially, as target software cut apart 1, target software cuts apart 2, target software is cut apart n; The software packaging that generates through the compiler compiling has the item of startup; Move Add-ons and target software by setting behind the software startup; At this moment operation control is ordered from the operating instruction collection; The Add-ons that to upset originally by rule is cut apart to cut apart with target software and is assembled recovery again, and target software and Add-ons all can normally move like this.Like this, the software packaging user at least can't the isolated operation target software.
Operating instruction is concentrated a monitoring function can be set, and monitors the running status of Add-ons and target software respectively, and following logical relation can be set: Add-ons and target software must move simultaneously; Add-ons is operation earlier; Target software is operation earlier; The Add-ons operation result starts target software; Add-ons is closed target software and is unconditionally closed; Add-ons is closed target software operation as usual; Target software is closed Add-ons and is closed; Target software is closed Add-ons operation as usual.
The software packaging that is generated is the structure from decrypted packet, can operating part be decrypted code, and involucrum partly is encrypted program.
Compile step is: (1) is extracted Add-ons and is started item, writes the operating instruction collection; (2) extract target software and start item, write the operating instruction collection; (3) Add-ons is divided into plurality of sections, and, numbering is write the operating instruction collection every segment number; (4) target software is divided into plurality of sections, and, numbering is write the operating instruction collection every segment number; (5) the software section of cutting apart is upset by certain rule, and will be upset rule and write the operating instruction collection; (6), and the startup item is set with operating instruction collection and all software sections of cutting apart compiling packings.
Method and tool software that a kind of software connects; It is characterized in that: a tool software is arranged, and said tool software is a new software with at least two existing stand alone softwares recompilities, newly-built operating instruction collection in the compilation process; Said operating instruction collection restricts the operational relation of said two stand alone softwares; At least be the operation of another software of soft ware authorization, or the operation of a software depends on the operation of another software, new software has only a start button.
For target software be one can relating operation file, like pdf document, then target software is not established and is started; Move by the file direct correlation; Add-ons generally has the setting of the item of startup, if Add-ons is a URL linked code, then has to trigger to be provided with.
Figure 14 encrypts generation module starts target software with the Add-ons operation result fundamental diagram for the present invention.Consider the singularity of Add-ons operation result; Perhaps connecting Core Generator software and Add-ons is same developer, and promptly the former code of Add-ons is transparent to connecting Core Generator software, when packing, can be provided with Add-ons; Compilation process can generate two operating instruction collection; One is Add-ons operating instruction collection, and another is a target software operating instruction collection, during the software packaging operation; At first move Add-ons operating instruction collection, target software operating instruction collection reruns after waiting until the Add-ons operation result.
Figure 15 encrypts the fundamental diagram of generation module encipher only target software for the present invention.Consider the situation that Add-ons need not be encrypted, can only extract the startup item of Add-ons, for example Add-ons is an advertisement module, as long as can require the user to have a look advertisement, closes the back target software and can move as usual.
Figure 16 connects the embodiment of customizing browser and pdf document formation advertisement mode with encrypting module for the present invention.Among the figure: the 1601st, advertisement distributing system; The 1602nd, customizing browser; Customizing browser can be customized to the smaller floating frame of window size; Customizing browser comprises the URL link that the sensing advertisement distributing system provides; Can realize URL initial trigger (be browser when opening URL with regard to triggered location to network address displaying contents), agreement can be HyperText Transfer Protocol agreement; The 1603rd, advertisement position 1,1604th, advertisement position n, customizing browser 1602 comprise an advertisement position at least; The 1605th, encrypting module; The 1606th, pdf document.
At first PDF author can be signatory in the advertisement distributing system registration; And open account of receipts; PDF works file is uploaded to the advertisement distributing system website, and the website is adopted connection Core Generator software that customizing browser 1602 is connected packing with pdf document 1606 through encrypting module 1605 and is formed new PDF formal file, and said PDF formal file can be placed on any website and supply the reader to download; Or propagate between the reader; Customizing browser is worked simultaneously when the reader opens said PDF formal file, if the PDF reader clicks certain advertisement position, advertisement distributing system will be clicked to change and link to advertising distributors' network address; Advertisement distributing system record click behavior; Advertising distributors are in the advertisement distributing system registration, and the advertising fee of the some that prestored, and advertisement distributing system can count PDF author's account with advertising distributors' click advertising fee like this.
Said pdf document is meant a kind of file that can read, and practical implementation needn't be limited to this a kind of file layout, can be audio frequency and video, picture etc. also, as long as its essence is to satisfy a kind of demand properties of reader.It is characterized in that: but target software is program or client's perception file, advertisement module is customizing browser or display unit, said display unit comprises display image and URL linked code, adopts HTTP.
As a kind of performance; Encrypting module connects the URL linked code that pdf document and is pointed to advertisement distributing system; Trigger the URL linked code simultaneously when the reader opens the PDF formal file, the URL linked code is directly called the website of the existing generic browser display ads of computer system delivery system, selects to click the advertisement position on the advertisement distributing system website by the PDF reader; Certainly, the PDF reader can freely close generic browser.
The connection Core Generator software of above-mentioned application mode can multinest; It is multiple generation; As purpose software being generated target software with recommendation Core Generator software earlier with recommendation function; The target software that will have a recommendation function with instant messaging Core Generator software again generates the target software with instant communication function, and target software just has recommendation and two kinds of attachment functions of instant messaging like this.
Programming language of the present invention can be existing any language form, like VC++, and C, Delphi, FORTRAN, Pascal, FOXPRO, Clipper, EXE; WIN16:C, and C++ (Visual, C++Builder, Borland), Visual BASIC; WIN32:C, and C++ (Visual, Borland), FORTRAN (LAHEY, Visual), Java, Visual BASIC, VisualFoxpro, PowerBuilder, Delphi, JavaScript, VBScript installshield, VB.net, VC.net; Linux:C, C++, Java; Microsoft XML Web services platform; The method of html, the ASP.NET method; Mac OS X operating system; Mobile phone operating system: Windows Mobile, Symbian, Android, iOS, mobile phone Mac OS X operating system etc.What propose especially is: the exploitation of android application layer can rely on java, and bottom can be used c, and jni calls.
Can adopt the programming of server, client on the programming framework, also can adopt the control mode to use or the mode of invoke script program or, or adopt the cloud computing mode to programme, be i.e. the SaaS pattern to the server requests mode.
Load mode is used IPV4 at present based on TCP/UDP agreement or other any network load mode, uses IPV6 in the future.In network transmission process, can adopt symmetric cryptography, asymmetric encryption and Hash to encrypt, encrypt like modes such as DES, SSL or SET.

Claims (10)

1. the method and the tool software that connect of a software; It is characterized in that: a tool software is arranged; Said tool software is a new software with at least two existing stand alone softwares recompilities, and newly-built operating instruction collection in the compilation process, said operating instruction collection restrict the operational relation of said two stand alone softwares; At least be the operation of another software of soft ware authorization, or the operation of a software depend on the operation of another software.
2. the method and the tool software that connect of a software, it is characterized in that: encrypting module is arranged, and said encrypting module connects at least two softwares, and the operation of a software depends on the operation of another software at least, and the operation of at least one software depends on encrypting module.
3. method and tool software that a kind of software according to claim 2 connects; It is characterized in that: a tool software is arranged; Said tool software comprises the encryption generation module; It is Add-ons that said tool software comprises at least one software that need connect, said tool software with Add-ons and at least another software be that target software passes through packing operation and generates a packing software, simultaneously; In generative process; Tool software embeds software packaging with encrypting module, and it is software packaging that said tool software generates the software with Add-ons function with target software, and said software packaging moves the back simultaneously or successively obtain the operational effect of Add-ons and two softwares of target software in the software packaging by the user.
4. the method and the tool software that connect according to claim 1 or 2 or 3 described a kind of softwares, it is characterized in that: at least one software is one of following software: but MSN, SNS software, social software, webpage, pop-up window, animation, audio frequency and video, geographic position locating module, payment module, advertisement module, recommending module, authorization module, browser reading file, image file, URL linked code.
5. method and tool software that a kind of software according to claim 4 connects, it is characterized in that: the software of connection or Add-ons are authorization modules, authorization module is responsible for the mandate of target software.
6. method and tool software that a kind of software according to claim 4 connects, it is characterized in that: the software of connection or Add-ons are MSNs, MSN also is responsible for the mandate of target software.
7. method and tool software that a kind of software according to claim 4 connects, it is characterized in that: the software of connection or Add-ons are advertisement module, the operation of the operation decision target software of said advertisement module.
8. the method and the tool software that connect of a software the steps include: (1) the Core Generator software that connects, and tool software comprises the encryption generation module, and tool software has User Interface; (2) select Add-ons, Add-ons and assembly are put into the tool software workspace; (3) workspace of tool software put into target software and assembly by select target software; (4) operation button settings, the operation button or the shortcut of the software packaging after promptly setting will generate; (5) carry out the tool software setting operation, encrypting module is embedded Add-ons and target software.
9. the method and the tool software that connect of a software the steps include: (1) the Core Generator software that connects, and tool software comprises encrypts generation module and Add-ons, and tool software has User Interface; (2) workspace of tool software put into target software and assembly by select target software; (3) Add-ons setting promptly is provided with requirement and the parameter that Add-ons moves in the future; (4) operation button settings, the operation button or the shortcut of the software packaging after promptly setting will generate; (5) carry out the tool software setting operation, encrypting module and Add-ons are embedded target software.
10. according to Claim 8 or 9 described a kind of the softwares method and the tool software that connect, it is characterized in that: encrypt generation module and comprise compiler, the compiler compile step is: (1) is extracted that Add-ons starts or Starting mode, is write the operating instruction collection; (2) target software is divided into plurality of sections, and, numbering is write the operating instruction collection every segment number; (3) the software section of cutting apart is upset by certain rule, and will be upset rule and write the operating instruction collection; (4) with operating instruction collection and all software section of cutting apart compiling packings.
CN201210220987.9A 2012-06-29 2012-06-29 A kind of method and tool software of software connection Active CN102779043B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810656034.4A CN108845805B (en) 2012-06-29 2012-06-29 Software connection method
CN201210220987.9A CN102779043B (en) 2012-06-29 2012-06-29 A kind of method and tool software of software connection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210220987.9A CN102779043B (en) 2012-06-29 2012-06-29 A kind of method and tool software of software connection

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201810656034.4A Division CN108845805B (en) 2012-06-29 2012-06-29 Software connection method

Publications (2)

Publication Number Publication Date
CN102779043A true CN102779043A (en) 2012-11-14
CN102779043B CN102779043B (en) 2018-09-21

Family

ID=47123964

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201210220987.9A Active CN102779043B (en) 2012-06-29 2012-06-29 A kind of method and tool software of software connection
CN201810656034.4A Active CN108845805B (en) 2012-06-29 2012-06-29 Software connection method

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201810656034.4A Active CN108845805B (en) 2012-06-29 2012-06-29 Software connection method

Country Status (1)

Country Link
CN (2) CN102779043B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104410966A (en) * 2014-11-27 2015-03-11 成都远为天胜科技有限公司 Secure wireless communication method

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111314454A (en) * 2020-02-12 2020-06-19 深圳市信锐网科技术有限公司 Application access method and device, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1309349A (en) * 2001-03-22 2001-08-22 北京北大天正科技发展有限公司 Method for on-line customization of software
CN101271504A (en) * 2008-05-04 2008-09-24 北京深思洛克数据保护中心 Method for removing software permission
CN101311903A (en) * 2007-05-22 2008-11-26 国际商业机器公司 Method and device for reusing component of software system based on component
CN101504616A (en) * 2009-03-23 2009-08-12 金蝶软件(中国)有限公司 Method and apparatus for login of Windows application program through Web application
CN101604369A (en) * 2008-06-13 2009-12-16 京瓷美达株式会社 Information concealing method and information concealment device
CN101630194A (en) * 2008-07-18 2010-01-20 联想(北京)有限公司 Terminal equipment and startup method of application programs
CN101930377A (en) * 2009-06-22 2010-12-29 深圳市融创天下科技发展有限公司 Link library compiling method by dynamically acquiring UID
CN102024226A (en) * 2009-09-22 2011-04-20 英业达股份有限公司 System for downloading expansion software functions of addition assembly and method thereof

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020184611A1 (en) * 2001-05-30 2002-12-05 Palm, Inc. Design system and method having improved display of code
US8032909B2 (en) * 2001-07-05 2011-10-04 Digimarc Corporation Watermarking and electronic program guides
CN101561762A (en) * 2008-04-18 2009-10-21 鸿富锦精密工业(深圳)有限公司 Software installation procedure packing system and method
CN101840334B (en) * 2010-04-16 2013-04-17 中国电子科技集团公司第二十八研究所 Software component service packaging method
CN102156643A (en) * 2011-04-25 2011-08-17 青岛海信传媒网络技术有限公司 Software integration method and system thereof
CN102520958A (en) * 2011-12-20 2012-06-27 上海互联网软件有限公司 Software production line system and software production method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1309349A (en) * 2001-03-22 2001-08-22 北京北大天正科技发展有限公司 Method for on-line customization of software
CN101311903A (en) * 2007-05-22 2008-11-26 国际商业机器公司 Method and device for reusing component of software system based on component
CN101271504A (en) * 2008-05-04 2008-09-24 北京深思洛克数据保护中心 Method for removing software permission
CN101604369A (en) * 2008-06-13 2009-12-16 京瓷美达株式会社 Information concealing method and information concealment device
CN101630194A (en) * 2008-07-18 2010-01-20 联想(北京)有限公司 Terminal equipment and startup method of application programs
CN101504616A (en) * 2009-03-23 2009-08-12 金蝶软件(中国)有限公司 Method and apparatus for login of Windows application program through Web application
CN101930377A (en) * 2009-06-22 2010-12-29 深圳市融创天下科技发展有限公司 Link library compiling method by dynamically acquiring UID
CN102024226A (en) * 2009-09-22 2011-04-20 英业达股份有限公司 System for downloading expansion software functions of addition assembly and method thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104410966A (en) * 2014-11-27 2015-03-11 成都远为天胜科技有限公司 Secure wireless communication method

Also Published As

Publication number Publication date
CN108845805B (en) 2021-09-14
CN108845805A (en) 2018-11-20
CN102779043B (en) 2018-09-21

Similar Documents

Publication Publication Date Title
JP6138978B2 (en) Advertising privacy management
US6115471A (en) Member-exclusive service system and method through internet
CN1714356B (en) Method and system for performing digital authorization management by standard indication engine
TWI648680B (en) System of smart contract, method for making the contract and computer-readable storage device
CN101488143A (en) Novel web application and local application interaction mode
CN102799997B (en) A kind of dissemination method and system of Internet advertising
CN105308605A (en) Secure automatic authorized access to any application through a third party
Garrigues et al. Promoting the development of secure mobile agent applications
KR20110013184A (en) System for providing code block for separating execution based contents, method thereof and computer recordable medium storing the method
Corradi et al. Mobile agents integrity in e-commerce applications
CN110232286B (en) E-commerce data chaining method and equipment applying intelligent contracts
CN102779043A (en) Software connection method and tool software
JP2011253211A (en) Application control method, application control program, server device, client device and application control system
KR101733520B1 (en) Method for protecting application and method for executing application thereof
CN102799836A (en) Software promotion method
Garrigues et al. Securing dynamic itineraries for mobile agent applications
CN101217357A (en) A document encryption downloading system and method
Kim et al. Digital forensic approaches for metaverse ecosystems
Sriman et al. Enhanced transaction confirmation performances without gas by using Ethereum blockchain
JP5798959B2 (en) Package generation device, package generation method, and program
Mikkelsen et al. Technical implementation and feasibility
Ramos San Juan Development of a web service for managing the storing of encrypted data in a public distributed ledger
JP2018005915A (en) Method and system for providing application package, and method and system for executing application
Kohli et al. Certainty factor based analysis for measuring users satisfaction with search engine
Borek et al. Integrating a model-driven approach and formal verification for the development of secure service applications

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20221130

Address after: 276000 Building 8, Shuangchuang Industrial Park, Feixian Economic Development Zone, Linyi City, Shandong Province

Patentee after: Shandong Warren Communication Technology Co.,Ltd.

Address before: 226001 No. 919, building 1, Wangfu building, 6 Renmin East Road, Jiangsu, Nantong

Patentee before: Wu Donghui

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20221230

Address after: 276000 Building 4, Shuangchuang Industrial Park, Xuyou Road, Feixian Economic Development Zone, Linyi City, Shandong Province

Patentee after: Shandong Baiwokang Biotechnology Co.,Ltd.

Address before: 276000 Building 8, Shuangchuang Industrial Park, Feixian Economic Development Zone, Linyi City, Shandong Province

Patentee before: Shandong Warren Communication Technology Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20231218

Address after: Room 11-5, Building 16, No. 6 Kuifu Avenue, Kuizhou Street, Fengjie County, Chongqing 404600

Patentee after: Yuntu (Chongqing) Business Information Consulting Service Co.,Ltd.

Address before: 276000 Building 4, Shuangchuang Industrial Park, Xuyou Road, Feixian Economic Development Zone, Linyi City, Shandong Province

Patentee before: Shandong Baiwokang Biotechnology Co.,Ltd.

TR01 Transfer of patent right