Invention content
Explanation of nouns:
Encrypt generation module:It is involucrum that software, which is carried out shell processing, using compiler, forms executable code and is wrapped
Shell software;The compiler includes Compilation Method and compiling parameter, and Compilation Method and compiling parameter by the software of involucrum for being made
User does not show, and has encryption meaning not increasing additional encryption measures, is not excluded for additional encryption measure certainly, such as
Encryption Algorithm, password authentication etc..
Encrypting module:By involucrum software, two are wrapped the executable code generated by encryption generation module and at least two
The operation power and the method for operation of shell software are controlled by executable code.Encrypting module of the present invention can be understood as encrypting in discussion
Connection relation.
The object of the present invention is to provide the method and tool software of a kind of connection of software, software includes that PC softwares and movement are whole
Software is held, software is meant that the code collection that program or module or file or code etc. are distinguished with hardware, of the invention
Technical solution is:
A kind of method and tool software of software connection, it is characterized in that:There are a tool software, the tool software will at least
It is a new software that two existing stand alone softwares, which recompilate, and operating instruction collection, the operating instruction are created in compilation process
Collection restricts the operation relationship of described two stand alone softwares, the operation of at least one soft ware authorization another software or one it is soft
Operation of the operation of part dependent on another software.
A kind of method and tool software of software connection, it is characterized in that:There is encrypting module, the encrypting module connection is at least
The operation of two softwares, a software relies upon at least the operation of another software, and the operation of at least one software, which depends on, to be added
Close module.
The method and tool software of a kind of software connection, it is characterized in that:Encrypting module is network encryption mode, i.e.,
SaaS patterns.
The method and tool software of a kind of software connection, it is characterized in that:There are a tool software, the tool software
Including encryption generation module, the tool software includes at least one software that need to be connected i.e. Add-ons, the tool software
By Add-ons and at least another software, that is, target software is by packaging operation one software packaging of generation, meanwhile, it was generating
Encrypting module is embedded in software packaging by Cheng Zhong, tool software, and the tool software, which generates target software, has Add-ons work(
Can software, that is, software packaging, the software packaging run by user after simultaneously or successively obtain software packaging in Add-ons and
The operational effect of two software of target software.
The method and tool software of a kind of software connection, it is characterized in that:Tool software has user interface, uses
Information needed is inputted when user carries out packaging operation.
The method and tool software of a kind of software connection, it is characterized in that:Tool software by the software that need to be connected and
Another software generates software packaging by packaging operation, and the software that need to be connected is Add-ons, and another software is target software,
Target software is generated software, that is, additional function software packaging with Add-ons function by tool software.
The method and tool software of a kind of software connection, it is characterized in that:Add-ons are recommending modules, and tool is soft
Part includes recommending module, and it is soft that target software is generated software, that is, recommendation function packing with recommendation function by the tool software
Part.
The method and tool software of a kind of software connection, it is characterized in that:Add-ons are advertisement insertion module, work
It includes that advertisement is embedded in module to have software, and target software is generated software, that is, advertising function with advertising function by the tool software
Software packaging.
The method and tool software of a kind of software connection, it is characterized in that:Add-ons are instant message applications, work
Have software include instant message applications, the tool software by target software generate with instant communication function software, that is, it is instant
Communication function software packaging.
The method and tool software of a kind of software connection, it is characterized in that:Add-ons are instant message applications, mesh
It is user application software to mark software, and application software is licensed dependent on instant message applications.
The method and tool software of a kind of software connection, it is characterized in that:Add-ons are certain functional software,
Such as:Instant message applications, SNS softwares, social software, webpage, pop-up window, animation, audio and video, Geographic mapping module,
Payment module, advertisement module, recommending module, authorization module etc., browser, readable file, image file, URL link code
Deng.
Above-mentioned Add-ons can be combined with each other, and form Multi-function additional software, such as:Instant message applications+payment module;
Advertisement module+payment module;Instant message applications+advertisement module;Instant message applications+authorization module etc..
The method and tool software of a kind of software connection, it is characterized in that:Target software is certain user software,
Such as:Passenger traffic query software, hotel query software, handset capability optimization software, Games Software, construction budget software, engineering gauge
Calculate software, design software, various client softwares, readable file, picture etc..
The method and tool software of a kind of software connection, it is characterized in that:Add-ons are computer code set,
Such as:Program or module or file or code.
The method and tool software of a kind of software connection, it is characterized in that:Target software is computer code set,
Such as:Program or module or file or code.
The method and tool software, step of a kind of described software connection be:(1)Connection Core Generator software is established,
Tool software includes encryption generation module, and tool software has user interface;(2)Select Add-ons, by Add-ons and
Component inserter software work area;(3)Selection target software, by the workspace of target software and component inserter software;
(4)Button settings are run, that is, set the operation button or shortcut of the software packaging after will generating;(5)Execution tool is soft
Encrypting module is embedded in Add-ons and target software by part setting operation.
Or its step is:(1)Foundation connection Core Generator software, tool software include encryption generation module and add soft
Part, tool software have user interface;(2)Selection target software, by the work of target software and component inserter software
Area;(3)Add-ons are arranged, i.e., sum of parameters to be configured Add-ons operation in the future;(4)Run button settings,
Set the operation button or shortcut of the software packaging after will generating;(5)Tool software setting operation is executed, will be encrypted
Module and Add-ons are embedded in target software.
It includes compiler to encrypt generation module, and compilation step is:(1)Add-ons startup item or Starting mode are extracted, is write
Enter operating instruction collection;(2)Target software is divided into several sections, and to every segment number, operating instruction collection is written into number;(3)
Software segmentation section is upset by certain rule, and rule write-in operating instruction collection will be upset;(4)Operating instruction collection and whole is soft
Part is divided section compiling and is packaged.
The tool software can be client software, can also be server software, and server software uses
WEB or WAP service mode, use after being logged in by user, are responsible for generating packing program by website, are supplied to user after the completion.
Encrypting module of the present invention is meant that:Software packaging publisher is to the method for operation of target software into professional etiquette
Fixed, the direct method of operation of target software is hidden for software user, and software user cannot send out software packaging
Row side is modified the regulation of the method for operation of target software, is encrypted in other words to the operation of former target software power,
Add-ons and purpose software are bound using encrypting module in other words.
Encrypted mode has:A, encryption generation module is provided by third party, and Add-ons and target software are collectively as group
Part encryption is packaged, and Add-ons and target software start button submit encryption generation module to be programmed design, or successively run,
Or run simultaneously or Add-ons run and authorize target software operation after certain number, or meet the certain item of Add-ons
Target software operation is authorized after part.B, Add-ons side is attached target software using encryption generation module, due to being attached
The active of software side is added to connect, Add-ons side can be programmed the source code of oneself, it is possible to Add-ons
Service condition is designed, and is handled the operation result of Add-ons, and handling result controls encrypting module, encrypting module pair
Target software carries out mandate operation.C, target software side is attached Add-ons using encryption generation module, due to being mesh
The active connection of software side is marked, target software side can be programmed the source code of oneself, it is possible to target software
Service condition is designed, and the service condition of target software can be limited by the output parameter of Add-ons, for example, by using instant
The application software that communication software (as Add-ons) develops oneself authorizes, for example application software user must be
Line, and the Instant Messenger signal of user must be in authorization database.
Encrypted principle has:A, for software development side, pass point can be set in software, to obj, dll,
ActiveX etc. is called, or is directly encrypted and is compiled into executable file;B, using Shell Encryption tool, to needing to encrypt
Software carry out uniform packing encryption, it is characterized in that be not related to being encrypted software programming source code, only to the two of software composition into
Byte processed upsets recombination by certain rule, and when operation need to be restored by meta-rule, in this way if the also meta-rule without encrypting module is soft
Part will be unable to run;C, encrypting module is divided into two functional units of encryption unit and decryption unit, encryption unit is embedded in target
Software, decryption unit are embedded in Add-ons, and decryption unit and encryption unit, which are worked in coordination, could maintain target software and add soft
The operation of part.
Encrypting module generally comprises Encryption Algorithm and encryption factor, can be formulated by user, and third party's encrypting module provides
Person can also provide different ID numbers and user from password protection module is set, to distinguish different encrypting module users.
Encryption factor can be preserved in many ways, i.e. SaaS patterns, such as Chinese patent bulletin 201010577492.
It should be noted that:For Add-ons if it is program or module, target software is also program or module, passes through encryption
Module can restrict the operation relationship of Add-ons and target software;Add-ons are if it is file(Such as word document)Or code
(Such as URL link code), target software is program or module, and the operation of target software can only be restricted by encrypting module, for
File is that association is opened, and is that triggering executes for linked code, can freely be closed after File Open or after linked code execution,
The effect of encrypting module is encrypted to target software, and file or triggering linked code are opened simultaneously;Add-ons are if it is program
Or module(Such as instant message applications or browser), target software is file(Such as pdf document), the effect of encrypting module is pair
Pdf document encryption runs Add-ons simultaneously when opening pdf document from decryption, can be certainly if Add-ons are not encrypted
By closing, if Add-ons are encrypted, then Add-ons and the restricting relation of pdf document are formed;Add-ons and target software are equal
It is file, restricting relation can be formed by encrypting module, or only restrict a side;Add-ons or target software are codes(Such as
URL link code), since code is that disposable triggering executes, event terminates after execution, is closed so cannot generally form restriction
System.The type of software and effect can be freely combined according to the requirement of business application.
Above-mentioned accessory software and target software can be interchanged in form.
The beneficial effects of the invention are as follows:The operation of at least two softwares is set to keep restricting relation by encrypting module, such as:It must
It must run or successively run simultaneously, may be implemented in this way must be by the mandate of Add-ons, purpose when using purpose software
Software is the required software of user, if Add-ons are instant message applications, ensures that the communication with user in this way, together
When can also realize a kind of authorization method of purpose software;For another example Add-ons are a kind of by the soft of communication channel recommended user
Part thus may be implemented user and have to recommend other users that could use purpose software;For another example Add-ons are a kind of wide
Module is accused, user thus may be implemented and have to that purpose software could be used in the state of showing advertisement;It is soft just like additional
Part is URL link code, and purpose software is pdf document, and URL link code is directed toward an advertising platform, and PDF texts may be implemented in this way
Part author clicks advertisement by reader and obtains income.The purpose software that user uses i.e. inventive article software mesh to be processed
Mark software.
Specific implementation mode:
Present invention will be further explained below with reference to the attached drawings and examples.
Fig. 1 is encrypting module of the present invention and each software relation schematic diagram.101 encrypting modules are responsible for additional to what need to be connected
Software and target software are associated encryption, make that the operation of target software is restricted by Add-ons or Add-ons are first transported
Row runs after target software or Add-ons and target software while running;102 target softwares;103 be another target software,
The quantity of target software is unrestricted;104 Add-ons;105 be another Add-ons, and the quantity of Add-ons is unrestricted;
106 operation buttons, are responsible for starting Add-ons and target software.
Further, Add-ons are computer code set, such as:Program, module, file, code;Or target software is meter
Calculation machine code collection, such as:Program, module, file, code.Generic-document is transported with suffix name associated program in computer systems
Row, if word file suffix name is DOC, code has specific run mode, is directed toward as URL codes trigger link, in such case
Under can be indicated with file destination suffix name by two files of encrypting module connection, i.e., after packaging file is former file destination
Sew name, packaging file, packaging file association corresponding software operation from after decrypting is clicked by mouse in this way, while appended document must
It must operation.
Fig. 2 is that software packaging of the present invention encrypts schematic diagram.201 operation buttons, are responsible for starting software packaging;202 are packaged mould
Block, including 203 Add-ons, 204 encrypting modules, 205 target softwares.Fortune of the operation of target software dependent on Add-ons
Row, or authorize encrypting module that target software is allowed to run after meeting the certain service condition of Add-ons.
The function of encrypting module is to bind the operation relationship of Add-ons and target software, and encrypting module can be one general
It reads, untrue presence, carrying out the essence of packaging operation to Add-ons and target software is existed to Add-ons and target software
It is functionally attached and is integrally recompilated, Compilation Method is determined by tool software, and Compilation Method is not for user
Showing or unreadable, so being interpreted as encrypting, i.e., Compilation Method is a kind of encryption method, and Compilation Method is by compiling language
Speech composition, compiler language are made of instruction code.
Fig. 3 is another encryption principle schematic diagram of the present invention.301 operation buttons, are responsible for software and start;302 Add-ons;
303 decryption units;304 encryption units;305 target softwares.303 decryption units and 304 encryption units form encrypting module 306;
304 encryption units are embedded in 305 target softwares and form encryption target software 307;303 decryption units are embedded in 302 Add-ons;By
301 operation buttons start Add-ons 302, and Add-ons 302 start encryption unit 303, here there are two types of Starting mode, or it is straight
Startup is connect, or starts decryption unit after meeting Add-ons and imposing a condition, 303 decryption units and 304 encryption units exchange number
According to the operation for maintaining target software 305.
Fig. 4 is present invention connection Core Generator software(Third party)It is packaged flow chart.401 connection Core Generator softwares, i.e.,
Tool software of the present invention, the tool software include encryption generation module, and the tool software provides for third party, i.e., attached
Add the source code of software and target software be all for the tool software it is closed, it is unknowable, it is known that be only respective
Start button and output to the setting of Add-ons as a result, so be only limitted to the original function of Add-ons.401 connections generate work
Tool software provides user interface after starting, user's interaction has selection interface, 402 selection interfaces, selection interface to include at least:
403 addition extra software options, i.e., be added to tool software working directory by Add-ons;404 addition target software options, i.e.,
Target software is added to tool software working directory;405 operation button settings, i.e., the software packaging that setting will generate are pressed
Button icon and shortcut;406 generate software packaging, that is, connect Core Generator software and connect Add-ons and target software
Encrypting module is connect and is embedded in, simplest link order is that the startup shortcut of Add-ons and the startup of target software is fast
Prompt mode does batch file, is started by autoexec order after generating software packaging;407 are supplied to user.
Fig. 5 is present invention connection Core Generator software(Add-ons side)It is packaged flow chart.501 connection Core Generators are soft
Part, i.e., tool software of the present invention, the tool software include encryption generation module, and the tool software is Add-ons side
Exploitation, i.e., the source code of Add-ons is open for the tool software, can be programmed, so to Add-ons
Setting can require programming and setting according to the tool software.501 connection Core Generator softwares provide user's interaction after starting
Interface, user's interaction have selection interface, 502 addition target softwares that target software or component are added to the tool software
Working directory;503 selection interfaces, selection interface include at least:504 Add-ons are arranged, you can with as required to Add-ons
It is configured, such as executing the operation target software that Add-ons require could run, or be arranged what target software was unconditionally run
Number or time etc.;505 operation button settings, i.e., the button icon and shortcut of the software packaging that setting will generate;
506 generate software packaging, that is, connect Core Generator software and be attached Add-ons and target software and be embedded in encrypting module;
507 are supplied to user.
Fig. 6 is that Add-ons of the present invention are advertisement module embodiment advertisement module schematic diagrams.601 be advertisement module, 601
Advertisement module includes:602 communication units, are responsible for and advertisement distributing system carries out data exchange and transmission, or unidirectionally receive advertisement
The ad data that delivery system is sent, 603 storage units are responsible for keeping in ad data, 604 display modules, responsible pair
Ad data is shown that the mode of display can be the static WML pages and dynamic asp page face, ad display types can be:
(1)Word carousel;(2)Image ad(3)Flash ad;(4)GIF advertisements;(5)Audio-visual advertisement;(6)Pop-up advertisement;(7)
Floating ad, above-mentioned advertisement type can by webpage or resource that URL link to advertising distributors is specified, including website or
Sales platform.
602 communication units:Bottom communication is based on ICP/IP protocol, and data transmission can be based on udp protocol.
603 storage units:The writing, reading of ad data instructs, and the temporary of ad data is provided, in addition it can provide
The offline display of advertisement.
604 display units:It supports static and Dynamic Announce, supports URL link, support event to trigger URL, can realize URL
Initial trigger(URL, which is just triggered to position to network address, when i.e. display unit works shows content), agreement can be HyperText
Transfer Protocol agreements.In addition to illustrate that:The agreement that display unit uses inherently is based on ICP/IP protocol,
So inherently having communication function, as a kind of embodiment, display unit is directly embedded into media, and display unit passes through interconnection
FidonetFido is pointing directly at the direction address of advertisement distributing system offer.
605 encrypting modules, be responsible for connection advertisement module 601 and target software 606,607 be advertisement distributing system, be responsible for
601 releasing advertisements of advertisement module.
Advertisement module includes at least display unit, and the display unit uses HyperText Transfer Protocol
Agreement, display type JPG, JIF, HTML code webpage(htm,html)Or dynamic web page(php,asp,asp.net,
jsp)Or javascript or iframe modes are called.Display unit is pointing directly at advertisement distributing system by Internet protocol
The direction address of offer, advertisement distributing system, which provides, turns link, and records link number and settled accounts for advertising expense.
Advertisement module using connection Core Generator Software Create software packaging, that is, has advertisement work(by the target software owner
The target software of energy.
Advertisement module connection Core Generator software is provided by ad distribution platform, or provides the online generating mode of WEB page.
Advertisement module includes at least display unit, and display unit is the indispensable unit of advertisement, and storage unit can lack
It saves, or advertising display data is stored in any position other than advertisement module.
A kind of method and tool software of software connection, it is characterized in that:The software or Add-ons of connection are advertisement modules,
The operation of the advertisement module determines the operation of target software.
A kind of method and tool software of software connection, it is characterized in that:Target software, which is program or client, can perceive file,
Advertisement module is display unit, and the display unit includes display image and URL link code, using hypertext transfer protocol.
As a kind of embodiment, advertisement module only retains Flash ad or GIF advertisements, advertising pictures pass through URL link
To ad distribution platform, target software is a pdf document, and advertisement module and pdf document, such PDF are connected by encrypting module
If reader clicks advertisement, link and be directed toward ad distribution platform, ad distribution platform can be directed toward advertisement by turning link
The network address of publisher, while click behavior is recorded, the ad click expense of advertisement publishers is taken off, and ad click expense is paid
PDF author realizes a kind of profit model.In this case, the advertisement module and pdf document connected by encrypting module is one
A packaging file self solves ciphertext part packet, file suffixes name is pdf document form, is just pressed in this case without being arranged to start
Button can be directly linked PDF program display file contents by mouse click.
Fig. 7 be Add-ons of the present invention when being recommending module target software pass through the method program flow for recommending to obtain mandate
Figure.
Current numerous softwares are free, and especially mobile terminal software, an object of the present invention are exactly to realize freely
Software realizes as advertisement interface and gets a profit that freeware is to have enough users as the key factor at advertisement interface
Group, the method used here is the recommendation of user, i.e., is freely used by software is authorized by recommending to obtain, and such as setting recommends 2
People can authorize, then increase user with 2 n times side, if setting recommends 3 people that can authorize, increase user with 3 n times side, with this
Analogize, is set as n and is then increased in a manner of the n times side of n.
In user terminal, the operation of software packaging and the authorisation step of target software are:
701 software installations;702 running softwares;
703 authorize detection, if having authorized Y,:704 software normal operations.
703 authorize detection, if unauthorized N,:705 recommended users, recommended user can by SMS, microblogging,
Mailbox, instant message applications etc.;
706 recommend to count, if meeting setting number, 707 authorize, software normal operation.
706 recommend to count, if not meeting setting number, 708 selections, selection continues 705 recommended users, or selection
709 trial editions run or terminate, and trial edition can be set as that limited number can be run.
Setting recommendation determining program, specific method are:Recommending data storage unit is set, increases recommending data newly and storage is single
Have recommending data in member to be compared, fail if any recommendation or recommendation is not allowed then.
Fig. 8 is Add-ons of the present invention recommending module recommended user's program flow diagram when being recommending module.801 recommend to use
Family, program execute recommended user's instruction;
802 selection channels, 803 short messages 804 are mails, microblogging, instant messaging, other soft for the mobile terminals such as mobile phone
Part can be PC softwares, can also be the mobile terminal softwares such as mobile phone;
If selecting 803 short breaths, then follow the steps 807 extractions and send recommendation, recommendation includes at least software
Download address and link;
If selection 804, executes 805 and log in detection, 807 steps are executed if having logged in, are held if being not logged in
806 login step of row;
808 extraction return information values, program executes the return information value for reading short breath transmission success or not, or reads mail
It sends, microblogging is issued, instant messaging is sent, the return information value of other softwares, specific method:A, pass through related software interface letter
Number is realized;B, the user interface show value of related software is directly read, the user interface show value, which will be related software, to be executed
As a result inform that user sends the inevitable step of success or not, it is possible to soft from the user interface layer Direct Acquisition of any software
Part implementing result output identification value is not influenced by window stacking.The user interface that user interface, that is, software provides is
A kind of open code and instruction.
809 return information values judge, 810 are executed if success and recommends success count, and 816 are executed if failure and is recommended
Failure, into 814 selections;
811 recommend to count, if meeting setting number, 813 authorize, if not meeting setting number, into 814 choosings
It selects;814 selections, can select recommended user's step again, return to 801 recommended users or the operation of 815 trial editions or terminate.
Fig. 9 be Add-ons of the present invention when being recommending module using recommendation Core Generator software(I.e. a kind of connection generates work
Has software)The embodiment that target software is generated into software packaging.It is to beat target software to recommend the function of Core Generator software
It is bundled into the software packaging with recommendation function, is a tool software, the tool software includes at least recommending module, in addition also
Including encryption generation module, the tool software have user interface, are supplied to user's operation.Generation step is:901 recommend
Core Generator running software;The target software of required packing, i.e., be added to and recommend Core Generator software by 902 addition target softwares
Working directory in;903 be selection interface, that is, the user interface for recommending Core Generator software to provide;903 selection interface packets
It includes:904 number settings on probation, that is, the finite number of time for allowing user to use;905 recommend number setting, i.e. setting to obtain mandate
Recommended amount;906 recommend channel setting, i.e., communication channel is set, including short message, mail, microblogging, instant messaging etc.;907 targets
Software icon, the i.e. required icon of selection target software, the icon mark formed after generating software packaging, and be packaged soft
The icon mark of the shortcut of part operation or the button icon mark of software packaging operation;908 advertisements, you can to recommend
Core Generator software users interactive interface is embedded in advertisement, and advertisement can be prefabricated advertisement, can also be the advertisement of on-line normalization,
908 advertisements are not required, can be default;909 generate software packaging, i.e., recommending module and target software are attached and are beaten
It wraps together;910 are supplied to user;911 be encryption generation module, it is contemplated that user may skip recommended program and directly run mesh
Software is marked, target software can be encrypted by encrypting module, i.e., must could open target software by recommending module
Operation.
The recommendation Core Generator software can also use WEB or WAP service mode, that is, provide website, will recommend to generate
Tool software is placed on website operation, and user can generate required software packaging with Website login webpage on website.
Figure 10 is Add-ons of the present invention software packaging operation schematic diagram when being recommending module.1001 operation buttons;1002
Recommending module;1003 target softwares;1004 encrypting modules;1005 encryption target softwares, i.e. target software and encrypting module are common
Complete program function, target software and encrypting module constantly exchange data with maintain program operation or target software and plus
Close module maintains program operation by exchanging data at least once, runs 1002 recommending modules after 1001 operation buttons startups, pushes away
It recommends module output order and starts encryption Cheng Jiami 1005, it is contemplated that crack difficulty, recommending module can export one group of instruction and start
Encipheror packet further synchronizes recommending module output order with one group of random number and encrypting module input is enabled, i.e., instruction and
It must be consistent by enabling.
Software cryptography is existing mature technology, and specific Encryption Algorithm is exemplified below:Encryption Algorithm is unpredictable, irreversible
, Encryption Algorithm a house dog program can generally be arranged in a program a number or character transformation at an integer, than
One as having in one section of application program:A=Fx (3), program will obtain the value of variables A according to constant 3, can be former journey
Sequence is rewritten in this way:A=Fx (DogConvert (1) -12342), then would not occur constant 3 in original program, and take with
DogConvert (1) -12342, in this way, only software programming person just knows that the constant actually called is 3, and if cannot take
Business device Encryption Algorithm, DogConvert functions cannot return to correct result, as a result formula A=Fx (DogConvert (1)-
12342) result also certainly will not be correct.
Another encryption method is that at least one byte section in target software is transplanted to encrypting module, and transplanting rule is by one
Encryption factor controls, and encryption factor has unique key, key to be controlled by recommending module.
Figure 11 is a kind of embodiment of target software remote authorization of inventive article software realization.Work of the present invention
Has software(Connect Core Generator software)It is a kind of mandate Core Generator software, the mandate Core Generator software is by target software
Developer develop or third party provide, if it is third party provide, third party authorize Core Generator software have exclusive sequence number and
Exclusive condition code and user password are used for distinguishing different tool software users, on the one hand the mandate Core Generator generates mesh
Software client is marked, user is supplied to, on the other hand generates corresponding authorization service module, be supplied to target software supplier
For carrying out remote authorization to the user of oneself.1101 target software vendor servers are responsible for providing user service, including:
1102 pass point service modules, 1103 authorization service modules, 1104 authorize customer data block;1105 clients, including:1106 award
Module is weighed, 1107 encrypting modules, 1108 target softwares, 1108 target softwares include 1109 pass points.1106 authorization modules include
Communication unit and User ID authentication unit, communication unit are carried out by internet protocol 1101 target software vendor servers of negotiation
Data exchange after the operation of 1105 clients, carries out authorization check step first, and authorization message is supplied from 1101 target softwares
Quotient's server, the authorized decryption unit for starting encrypting module 1107 afterwards of authorization module, 1108 target softwares are by being embedded in it
In the explanation of encrypting module 1107 run;1104 mandate clients are additionally provided in 1101 target software vendor servers
Database, the purpose is to provide to authorize customer data to authorization service module 1103, so that Differentiated services are in different clients.
In order to further protect target software, or the self-protection measure taken as target software exploitation side,
Increase by 1102 pass point service modules and 1109 pass points, 1102 pass point service modules and 1109 pass points are cooperatings
's.Pass point is set in the operational process of target software first, is inserted into inquiry instruction in pass point, inquiry instruction is to pass point
Service module is operated, and pass point service module is equipped with Encryption Algorithm, generates return value by algorithm, return value assignment, which is returned, to be added
Close, target software normal operation, target software cannot be run if return value does not meet Encryption Algorithm.It in addition also can be by mesh
A part of program of mark software is placed in 1102 pass point service modules, is called by 1109 pass points, if called successfully
Then target software normal operation.Or Shell Encryption directly is carried out to target software( SHELL ), decryption unit is placed on target software
Client objectives running software is supported in vendor server end by server end decryption unit.
1102 pass point service modules and 1109 pass points are not required, and can be lacked in the not high application of security requirements
It saves.
A kind of method and tool software of software connection, it is characterized in that:The software or Add-ons of connection are authorization modules,
Authorization module is responsible for the mandate of target software
Figure 12 is a kind of embodiments that Add-ons of the present invention are instant message applications.1201 target software suppliers
End, 1201 target software supplier ends include:1202 pass point service modules, 1203 instant message applications, 1204 authorize client
Database;1205 instant communication servers;1206 clients, 1206 clients include:1207 instant message applications, 1208 encryptions
Module, 1209 target softwares, 1209 target softwares include 1210 pass points;1206 clients by 1207 instant message applications,
1209 target softwares are formed by connecting by the binding of 1208 encrypting modules.The mandate of target software realized by instant message applications,
Simplest mode is:It will authorize client's Instant Messenger signal that target software supplier instant messaging buddy list is added, and define
Buddy list authorizes client's list, can be realized by instant message applications provider API.
1202 pass point service modules and 1210 pass points can be default.
Instant messaging generates strapping tool software(One kind of the i.e. described connection Core Generator software)By instant messaging service
Fang Kaifa is provided, and different sequence numbers or User ID can be arranged, and can provide different cipher modes and condition code, this
Sample can form a kind of soft ware authorization solution that instant messaging service side provides, and can be with additional pay module or chain
It connects, on-line payment target software usage charges, by target software supplier authoring system online authority to pay user immediately.
A kind of method and tool software of software connection, it is characterized in that:The software or Add-ons of connection are instant messagings
Software, instant message applications are also responsible for the mandate of target software.
Figure 13 is present invention encryption generation module fundamental diagram.It includes compiler to encrypt generation module, and compiler can be with
It is developed by software developer, compiling mode, algorithm, parameter can be formulated voluntarily, and encryption measures can be increased, and compiler can be foot
This program can also be the program that compiling is completed, and is compiled to another software using compiler after forming packaging file general
It can not understand, modify and be not easy to software packaging for software packaging user, so even if without volume
Outer encryption measures also have encrypted meaning for software packaging, i.e. user can not be to the running software side in packet
Formula is modified.In addition, for existing developing instrument software, generally included compiler, and provide in user's compilation process into
Row encryption measures.
1301 compilers are responsible for handling target software and Add-ons, and extract target software and Add-ons
Startup item;Add-ons are artificially partitioned into several by 1302 Add-ons, including Add-ons startup item by compiler
Section, as Add-ons segmentation 1, Add-ons segmentation 2, Add-ons divide n;1303 be the software packaging generated, including two
Part, one be operation collection, the other is software divide library, operation collection comprising Add-ons startup item, target software startup item,
Operating instruction collection;Software segmentation has several sections of the summation that target software and Add-ons are artificially divided in library, such as additional soft
Part segmentation 2, Add-ons segmentation 1, target software segmentation 2, target software divide 1, until n, these softwares are divided by compiler
Upset by certain rule, and numbered for each segmentation, upsets rule and segmentation number record and concentrated in operating instruction;1304 are
Target software, including target software startup item, several sections are artificially partitioned by compiler by target software, such as target software point
Cut 1, target software segmentation 2, target software segmentation n;After the software packaging that compiled device compiling generates has startup item, software to start
By setting operation Add-ons and target software, at this moment operation control comes from operating instruction collection order, will upset originally by rule
Add-ons segmentation and target software segmentation reconnect assembling restore, such target software and Add-ons can be transported normally
Row.In this way, software packaging user at least can not isolated operation target software.
A monitoring function can be arranged in operating instruction concentration, monitor the operating status of Add-ons and target software respectively,
Following logical relation can be set:Add-ons and target software must be run simultaneously;Add-ons are first run;Target software is first
Operation;Add-ons operation result starts target software;Add-ons are closed target software and are unconditionally closed;Add-ons are closed
Target software is run as usual;Target software is closed Add-ons and is closed;Target software is closed Add-ons and is run as usual.
The software packaging generated is the structure from decrypted packet, you can execution part is decrypted code, enclosure part be by
Encrypted program.
Compilation step is:(1)Add-ons startup item is extracted, operating instruction collection is written;(2)Target software is extracted to start
, operating instruction collection is written;(3)Add-ons are divided into several sections, and to every segment number, operating instruction is written into number
Collection;(4)Target software is divided into several sections, and to every segment number, operating instruction collection is written into number;(5)Software is divided
Section is upset by certain rule, and will upset rule write-in operating instruction collection;(6)Operating instruction collection and whole softwares are divided section to compile
Packing is translated, and startup item is set.
A kind of method and tool software of software connection, it is characterized in that:There are a tool software, the tool software will at least
It is a new software that two existing stand alone softwares, which recompilate, and operating instruction collection, the operating instruction are created in compilation process
Collection restricts the operation relationship of described two stand alone softwares, the operation of at least one soft ware authorization another software or one it is soft
Operation of the operation of part dependent on another software, only there are one start buttons for new software.
For target software be one can be with the file of relating operation for, such as pdf document, then target software does not set startup
, it being directly linked and is run by file, Add-ons generally have startup item setting, if Add-ons are a URL link codes,
Then there is triggering to be arranged.
Figure 14 is the fundamental diagram that present invention encryption generation module starts target software with Add-ons operation result.
In view of the particularity of Add-ons operation result, or connection Core Generator software and Add-ons are the same developers,
I.e. Add-ons original code is transparent to connection Core Generator software, can be configured to Add-ons when being packaged, and is compiled
The process of translating can generate two operating instruction collection, and one is Add-ons operating instruction collection, the other is target software operation refers to
Collection is enabled, when software packaging is run, Add-ons operating instruction collection is run first, reruns after Add-ons operation result
Target software operating instruction collection.
Figure 15 is the fundamental diagram that present invention encryption generation module only encrypts target software.In view of Add-ons are not required to
The case where encrypting can only extract the startup item of Add-ons, such as Add-ons are advertisement modules, can require user only
Advertisement is had a look, target software can be run as usual after closing.
Figure 16 is the embodiment that the present invention connects customizing browser with encrypting module and pdf document forms advertisement mode.
In figure:1601 be advertisement distributing system;1602 be customizing browser, and it is smaller that customizing browser can be customized to window size
Floating frame, customizing browser include the URL link be directed toward advertisement distributing system and provided, and can realize URL initial triggers(Browse
URL just triggers positioning to network address and shows content when device is opened), agreement can be HyperText Transfer Protocol associations
View;1603 be advertisement position 1,1604 be advertisement position n, and customizing browser 1602 includes at least an advertisement position;1605 be encryption mould
Block;1606 be pdf document.
PDF author can register in advertisement distributing system and contract first, and open account of receipts, will be on PDF works files
Advertisement distributing system website is reached, website is led to customizing browser 1602 and pdf document 1606 using connection Core Generator software
It crosses the connection of encrypting module 1605 and is packed into new PDF formal files, the PDF formal files can be placed on arbitrary website for reading
It is propagated between person's download or reader, when reader opens the PDF formal files, customizing browser works at the same time,
If PDF readers click some advertisement position, advertisement distributing system, which will click on, to be turned to link to advertising distributors' network address, ad distribution
System records click behavior, and advertising distributors are registered in advertisement distributing system, and a certain number of advertising expenses that prestored, this
The click advertising expense of advertising distributors can be included in PDF author's account by sample advertisement distributing system.
The pdf document refers to a kind of file that can be read, and specific implementation need not limit to a kind of this file format, also may be used
To be audio and video, picture etc., as long as essence is to meet a kind of demand properties of reader.It is characterized in that:Target software is
Program or client can perceive file, and advertisement module is customizing browser or display unit, and the display unit includes display image
With URL link code, using hypertext transfer protocol.
As a kind of performance, encrypting module connects pdf document and one and is directed toward the URL link generation of advertisement distributing system
Code triggers URL link code simultaneously when reader opens PDF formal files, and URL link code has directly invoked computer system
Some generic browsers show the website of advertisement distributing system, select to click on advertisement distributing system website by PDF readers
Advertisement position, certainly, PDF readers can freely close generic browser.
The connection Core Generator software of above application mode such as can first be generated with recommendation with multinest, i.e., multiple generation
Purpose Software Create is had the target software of recommendation function by tool software, then will be had with instant messaging Core Generator software and be pushed away
The target software for recommending function generates the target software with instant communication function, and such target software just has recommendation and Instant Messenger
Interrogate two kinds of attachment functions.
Programming language of the present invention can be existing any language form, such as VC++, C, Delphi, FORTRAN,
Pascal,FOXPRO,Clipper,EXE ;WIN16:C,C++(Visual,C++Builder,Borland),Visual
BASIC ; WIN32:C,C++(Visual, Borland), FORTRAN(LAHEY,Visual), Java, Visual
BASIC,VisualFoxpro, PowerBuilder,Delphi,JavaScript,VBScript installshield,
VB.net,VC.net; Linux: C,C++,Java ;Microsoft XML Web services platforms;The method of html,
ASP.NET methods;Mac OS X operating systems;Mobile phone operating system:Windows Mobile, Symbian, Android,
IOS, mobile phone Mac OS X operating systems etc..Especially set out is:The exploitation of android application layers can rely on java, and bottom can
To be called with c, jni.
Server, client programming may be used on programming framework, control mode can also be used and use or call script journey
The mode of sequence is programmed to server request method, or using cloud computing mode, i.e. SaaS patterns.
Transmission mode is based on TCP/UDP agreements or other any transmission of network modes, uses IPV4 at present, uses in the future
IPV6.Symmetric cryptography, asymmetric encryption and Hash encryptions, such as DES, SSL or the side SET may be used in network transmission process
Formula is encrypted.