CN102779043B - A kind of method and tool software of software connection - Google Patents

A kind of method and tool software of software connection Download PDF

Info

Publication number
CN102779043B
CN102779043B CN201210220987.9A CN201210220987A CN102779043B CN 102779043 B CN102779043 B CN 102779043B CN 201210220987 A CN201210220987 A CN 201210220987A CN 102779043 B CN102779043 B CN 102779043B
Authority
CN
China
Prior art keywords
software
ons
add
module
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210220987.9A
Other languages
Chinese (zh)
Other versions
CN102779043A (en
Inventor
吴东辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yuntu Chongqing Business Information Consulting Service Co ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201210220987.9A priority Critical patent/CN102779043B/en
Priority to CN201810656034.4A priority patent/CN108845805B/en
Publication of CN102779043A publication Critical patent/CN102779043A/en
Application granted granted Critical
Publication of CN102779043B publication Critical patent/CN102779043B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

The present invention relates to software field, more particularly to the method and tool software of a kind of connection of software.It is characterized in that:There is a tool software, it is a new software that the tool software, which recompilates at least two existing stand alone softwares, operating instruction collection is created in compilation process, the operating instruction collection specifies the operation order of described two stand alone softwares, the operating instruction collection restricts the operation relationship of described two stand alone softwares, and only there are one start buttons for new software.The beneficial effects of the invention are as follows:The operation of at least two softwares is set to keep restricting relation by encrypting module, such as:It must run or successively run simultaneously, may be implemented in this way must be by the mandate of Add-ons when using purpose software.

Description

A kind of method and tool software of software connection
Technical field
The present invention relates to software field, more particularly to the method and tool software of a kind of connection of software.
Background technology
Software generally refers to complete the program of a certain function, and described program is run in a certain environment or platform, and general one The software of kind of function is isolated operation, and the different software of function may adhere to different developers, and developer's phase separately Mutually it is unfamiliar with the development technique of other side, it is sometimes desirable to which the different software of at least two must simultaneously or successively be run, such as a certain work( Energy software is the purpose software that user needs, and needs to link up using instant message applications during use and service, preferred plan It is to allow the two softwares while running, and instant message applications operation is the necessary condition of purpose running software, it in this way can be with The presence for ensureing purpose software user, can technically bind the two softwares, use proper technology to connect in other words The two softwares, or a tool software is provided and is bundled to the connection of the two softwares together;For another example:Purpose software can with it is wide It accuses and shows that software connection is packaged;Purpose software promotes software with recommendation and connects packing;Etc., the case where needing this pattern is very More.Since different software generally adheres to different developers separately, so the technical solution of connection is realized by skinning technique, It is not necessarily related to the development technique of other side, is not related to the source code of other side, processing only is attached to the shell of software.It is existing There is the software packaging of technology that can be bundled to the component of one or several softwares together, but can not achieve between several softwares Mutually restrict operation;Existing Shell Encryption technology is to carry out Shell Encryption to target software with tool software(It is commonly called as " packet Shell "), i.e., it is not related to the programming code explanation of target software, target software needs decrypting process or cooperation encryption after encryption Lock could be run, and encryption lock is a kind of internal hardware for preserving decryption program, is wrapped with the decryption program cooperation in encryption lock The target software of shell can normal operation, no encryption lock cannot run by the target software of involucrum, thus protect Target software is not illegally used, and encryption lock protection is target software, is not the function of connection software proposed by the present invention.This The purpose of invention is to use shell processing method, connects at least two softwares by encrypting module, and make the fortune of two software Row keeps restricting relation, such as:It must run or successively run simultaneously.The i.e. present invention connection of the purpose software that user uses generates work Having software target software to be processed, software, that is, software packaging of generation, software packaging is the structure from decrypted packet in structure, Executable part is decrypted code, and enclosure part is encrypted program.
Further, the meaning of software can be here:Program or module or file or code, typical code such as URL Linked code.
Invention content
Explanation of nouns:
Encrypt generation module:It is involucrum that software, which is carried out shell processing, using compiler, forms executable code and is wrapped Shell software;The compiler includes Compilation Method and compiling parameter, and Compilation Method and compiling parameter by the software of involucrum for being made User does not show, and has encryption meaning not increasing additional encryption measures, is not excluded for additional encryption measure certainly, such as Encryption Algorithm, password authentication etc..
Encrypting module:By involucrum software, two are wrapped the executable code generated by encryption generation module and at least two The operation power and the method for operation of shell software are controlled by executable code.Encrypting module of the present invention can be understood as encrypting in discussion Connection relation.
The object of the present invention is to provide the method and tool software of a kind of connection of software, software includes that PC softwares and movement are whole Software is held, software is meant that the code collection that program or module or file or code etc. are distinguished with hardware, of the invention Technical solution is:
A kind of method and tool software of software connection, it is characterized in that:There are a tool software, the tool software will at least It is a new software that two existing stand alone softwares, which recompilate, and operating instruction collection, the operating instruction are created in compilation process Collection restricts the operation relationship of described two stand alone softwares, the operation of at least one soft ware authorization another software or one it is soft Operation of the operation of part dependent on another software.
A kind of method and tool software of software connection, it is characterized in that:There is encrypting module, the encrypting module connection is at least The operation of two softwares, a software relies upon at least the operation of another software, and the operation of at least one software, which depends on, to be added Close module.
The method and tool software of a kind of software connection, it is characterized in that:Encrypting module is network encryption mode, i.e., SaaS patterns.
The method and tool software of a kind of software connection, it is characterized in that:There are a tool software, the tool software Including encryption generation module, the tool software includes at least one software that need to be connected i.e. Add-ons, the tool software By Add-ons and at least another software, that is, target software is by packaging operation one software packaging of generation, meanwhile, it was generating Encrypting module is embedded in software packaging by Cheng Zhong, tool software, and the tool software, which generates target software, has Add-ons work( Can software, that is, software packaging, the software packaging run by user after simultaneously or successively obtain software packaging in Add-ons and The operational effect of two software of target software.
The method and tool software of a kind of software connection, it is characterized in that:Tool software has user interface, uses Information needed is inputted when user carries out packaging operation.
The method and tool software of a kind of software connection, it is characterized in that:Tool software by the software that need to be connected and Another software generates software packaging by packaging operation, and the software that need to be connected is Add-ons, and another software is target software, Target software is generated software, that is, additional function software packaging with Add-ons function by tool software.
The method and tool software of a kind of software connection, it is characterized in that:Add-ons are recommending modules, and tool is soft Part includes recommending module, and it is soft that target software is generated software, that is, recommendation function packing with recommendation function by the tool software Part.
The method and tool software of a kind of software connection, it is characterized in that:Add-ons are advertisement insertion module, work It includes that advertisement is embedded in module to have software, and target software is generated software, that is, advertising function with advertising function by the tool software Software packaging.
The method and tool software of a kind of software connection, it is characterized in that:Add-ons are instant message applications, work Have software include instant message applications, the tool software by target software generate with instant communication function software, that is, it is instant Communication function software packaging.
The method and tool software of a kind of software connection, it is characterized in that:Add-ons are instant message applications, mesh It is user application software to mark software, and application software is licensed dependent on instant message applications.
The method and tool software of a kind of software connection, it is characterized in that:Add-ons are certain functional software, Such as:Instant message applications, SNS softwares, social software, webpage, pop-up window, animation, audio and video, Geographic mapping module, Payment module, advertisement module, recommending module, authorization module etc., browser, readable file, image file, URL link code Deng.
Above-mentioned Add-ons can be combined with each other, and form Multi-function additional software, such as:Instant message applications+payment module; Advertisement module+payment module;Instant message applications+advertisement module;Instant message applications+authorization module etc..
The method and tool software of a kind of software connection, it is characterized in that:Target software is certain user software, Such as:Passenger traffic query software, hotel query software, handset capability optimization software, Games Software, construction budget software, engineering gauge Calculate software, design software, various client softwares, readable file, picture etc..
The method and tool software of a kind of software connection, it is characterized in that:Add-ons are computer code set, Such as:Program or module or file or code.
The method and tool software of a kind of software connection, it is characterized in that:Target software is computer code set, Such as:Program or module or file or code.
The method and tool software, step of a kind of described software connection be:(1)Connection Core Generator software is established, Tool software includes encryption generation module, and tool software has user interface;(2)Select Add-ons, by Add-ons and Component inserter software work area;(3)Selection target software, by the workspace of target software and component inserter software; (4)Button settings are run, that is, set the operation button or shortcut of the software packaging after will generating;(5)Execution tool is soft Encrypting module is embedded in Add-ons and target software by part setting operation.
Or its step is:(1)Foundation connection Core Generator software, tool software include encryption generation module and add soft Part, tool software have user interface;(2)Selection target software, by the work of target software and component inserter software Area;(3)Add-ons are arranged, i.e., sum of parameters to be configured Add-ons operation in the future;(4)Run button settings, Set the operation button or shortcut of the software packaging after will generating;(5)Tool software setting operation is executed, will be encrypted Module and Add-ons are embedded in target software.
It includes compiler to encrypt generation module, and compilation step is:(1)Add-ons startup item or Starting mode are extracted, is write Enter operating instruction collection;(2)Target software is divided into several sections, and to every segment number, operating instruction collection is written into number;(3) Software segmentation section is upset by certain rule, and rule write-in operating instruction collection will be upset;(4)Operating instruction collection and whole is soft Part is divided section compiling and is packaged.
The tool software can be client software, can also be server software, and server software uses WEB or WAP service mode, use after being logged in by user, are responsible for generating packing program by website, are supplied to user after the completion.
Encrypting module of the present invention is meant that:Software packaging publisher is to the method for operation of target software into professional etiquette Fixed, the direct method of operation of target software is hidden for software user, and software user cannot send out software packaging Row side is modified the regulation of the method for operation of target software, is encrypted in other words to the operation of former target software power, Add-ons and purpose software are bound using encrypting module in other words.
Encrypted mode has:A, encryption generation module is provided by third party, and Add-ons and target software are collectively as group Part encryption is packaged, and Add-ons and target software start button submit encryption generation module to be programmed design, or successively run, Or run simultaneously or Add-ons run and authorize target software operation after certain number, or meet the certain item of Add-ons Target software operation is authorized after part.B, Add-ons side is attached target software using encryption generation module, due to being attached The active of software side is added to connect, Add-ons side can be programmed the source code of oneself, it is possible to Add-ons Service condition is designed, and is handled the operation result of Add-ons, and handling result controls encrypting module, encrypting module pair Target software carries out mandate operation.C, target software side is attached Add-ons using encryption generation module, due to being mesh The active connection of software side is marked, target software side can be programmed the source code of oneself, it is possible to target software Service condition is designed, and the service condition of target software can be limited by the output parameter of Add-ons, for example, by using instant The application software that communication software (as Add-ons) develops oneself authorizes, for example application software user must be Line, and the Instant Messenger signal of user must be in authorization database.
Encrypted principle has:A, for software development side, pass point can be set in software, to obj, dll, ActiveX etc. is called, or is directly encrypted and is compiled into executable file;B, using Shell Encryption tool, to needing to encrypt Software carry out uniform packing encryption, it is characterized in that be not related to being encrypted software programming source code, only to the two of software composition into Byte processed upsets recombination by certain rule, and when operation need to be restored by meta-rule, in this way if the also meta-rule without encrypting module is soft Part will be unable to run;C, encrypting module is divided into two functional units of encryption unit and decryption unit, encryption unit is embedded in target Software, decryption unit are embedded in Add-ons, and decryption unit and encryption unit, which are worked in coordination, could maintain target software and add soft The operation of part.
Encrypting module generally comprises Encryption Algorithm and encryption factor, can be formulated by user, and third party's encrypting module provides Person can also provide different ID numbers and user from password protection module is set, to distinguish different encrypting module users.
Encryption factor can be preserved in many ways, i.e. SaaS patterns, such as Chinese patent bulletin 201010577492.
It should be noted that:For Add-ons if it is program or module, target software is also program or module, passes through encryption Module can restrict the operation relationship of Add-ons and target software;Add-ons are if it is file(Such as word document)Or code (Such as URL link code), target software is program or module, and the operation of target software can only be restricted by encrypting module, for File is that association is opened, and is that triggering executes for linked code, can freely be closed after File Open or after linked code execution, The effect of encrypting module is encrypted to target software, and file or triggering linked code are opened simultaneously;Add-ons are if it is program Or module(Such as instant message applications or browser), target software is file(Such as pdf document), the effect of encrypting module is pair Pdf document encryption runs Add-ons simultaneously when opening pdf document from decryption, can be certainly if Add-ons are not encrypted By closing, if Add-ons are encrypted, then Add-ons and the restricting relation of pdf document are formed;Add-ons and target software are equal It is file, restricting relation can be formed by encrypting module, or only restrict a side;Add-ons or target software are codes(Such as URL link code), since code is that disposable triggering executes, event terminates after execution, is closed so cannot generally form restriction System.The type of software and effect can be freely combined according to the requirement of business application.
Above-mentioned accessory software and target software can be interchanged in form.
The beneficial effects of the invention are as follows:The operation of at least two softwares is set to keep restricting relation by encrypting module, such as:It must It must run or successively run simultaneously, may be implemented in this way must be by the mandate of Add-ons, purpose when using purpose software Software is the required software of user, if Add-ons are instant message applications, ensures that the communication with user in this way, together When can also realize a kind of authorization method of purpose software;For another example Add-ons are a kind of by the soft of communication channel recommended user Part thus may be implemented user and have to recommend other users that could use purpose software;For another example Add-ons are a kind of wide Module is accused, user thus may be implemented and have to that purpose software could be used in the state of showing advertisement;It is soft just like additional Part is URL link code, and purpose software is pdf document, and URL link code is directed toward an advertising platform, and PDF texts may be implemented in this way Part author clicks advertisement by reader and obtains income.The purpose software that user uses i.e. inventive article software mesh to be processed Mark software.
Description of the drawings
Fig. 1 is encrypting module of the present invention and each software relation schematic diagram.
Fig. 2 is that software packaging of the present invention encrypts schematic diagram.
Fig. 3 is another encryption principle schematic diagram of the present invention.
Fig. 4 is present invention connection Core Generator software(Third party)It is packaged flow chart.
Fig. 5 is present invention connection Core Generator software(Add-ons side)It is packaged flow chart.
Fig. 6 is that Add-ons of the present invention are advertisement module embodiment advertisement module schematic diagrams.
Fig. 7 be Add-ons of the present invention when being recommending module target software pass through the method program flow for recommending to obtain mandate Figure.
Fig. 8 is Add-ons of the present invention recommending module recommended user's program flow diagram when being recommending module.
Fig. 9 be Add-ons of the present invention when being recommending module using recommendation Core Generator software(I.e. a kind of connection generates work Has software)The embodiment that target software is generated into software packaging.
Figure 10 is Add-ons of the present invention software packaging operation schematic diagram when being recommending module.
Figure 11 is a kind of embodiment of target software remote authorization of inventive article software realization.
Figure 12 is a kind of embodiments that Add-ons of the present invention are instant message applications.
Figure 13 is present invention encryption generation module fundamental diagram.
Figure 14 is the fundamental diagram that present invention encryption generation module starts target software with Add-ons operation result.
Figure 15 is the fundamental diagram that present invention encryption generation module only encrypts target software.
Figure 16 is the embodiment that the present invention connects customizing browser with encrypting module and pdf document forms advertisement mode.
Specific implementation mode:
Present invention will be further explained below with reference to the attached drawings and examples.
Fig. 1 is encrypting module of the present invention and each software relation schematic diagram.101 encrypting modules are responsible for additional to what need to be connected Software and target software are associated encryption, make that the operation of target software is restricted by Add-ons or Add-ons are first transported Row runs after target software or Add-ons and target software while running;102 target softwares;103 be another target software, The quantity of target software is unrestricted;104 Add-ons;105 be another Add-ons, and the quantity of Add-ons is unrestricted; 106 operation buttons, are responsible for starting Add-ons and target software.
Further, Add-ons are computer code set, such as:Program, module, file, code;Or target software is meter Calculation machine code collection, such as:Program, module, file, code.Generic-document is transported with suffix name associated program in computer systems Row, if word file suffix name is DOC, code has specific run mode, is directed toward as URL codes trigger link, in such case Under can be indicated with file destination suffix name by two files of encrypting module connection, i.e., after packaging file is former file destination Sew name, packaging file, packaging file association corresponding software operation from after decrypting is clicked by mouse in this way, while appended document must It must operation.
Fig. 2 is that software packaging of the present invention encrypts schematic diagram.201 operation buttons, are responsible for starting software packaging;202 are packaged mould Block, including 203 Add-ons, 204 encrypting modules, 205 target softwares.Fortune of the operation of target software dependent on Add-ons Row, or authorize encrypting module that target software is allowed to run after meeting the certain service condition of Add-ons.
The function of encrypting module is to bind the operation relationship of Add-ons and target software, and encrypting module can be one general It reads, untrue presence, carrying out the essence of packaging operation to Add-ons and target software is existed to Add-ons and target software It is functionally attached and is integrally recompilated, Compilation Method is determined by tool software, and Compilation Method is not for user Showing or unreadable, so being interpreted as encrypting, i.e., Compilation Method is a kind of encryption method, and Compilation Method is by compiling language Speech composition, compiler language are made of instruction code.
Fig. 3 is another encryption principle schematic diagram of the present invention.301 operation buttons, are responsible for software and start;302 Add-ons; 303 decryption units;304 encryption units;305 target softwares.303 decryption units and 304 encryption units form encrypting module 306; 304 encryption units are embedded in 305 target softwares and form encryption target software 307;303 decryption units are embedded in 302 Add-ons;By 301 operation buttons start Add-ons 302, and Add-ons 302 start encryption unit 303, here there are two types of Starting mode, or it is straight Startup is connect, or starts decryption unit after meeting Add-ons and imposing a condition, 303 decryption units and 304 encryption units exchange number According to the operation for maintaining target software 305.
Fig. 4 is present invention connection Core Generator software(Third party)It is packaged flow chart.401 connection Core Generator softwares, i.e., Tool software of the present invention, the tool software include encryption generation module, and the tool software provides for third party, i.e., attached Add the source code of software and target software be all for the tool software it is closed, it is unknowable, it is known that be only respective Start button and output to the setting of Add-ons as a result, so be only limitted to the original function of Add-ons.401 connections generate work Tool software provides user interface after starting, user's interaction has selection interface, 402 selection interfaces, selection interface to include at least: 403 addition extra software options, i.e., be added to tool software working directory by Add-ons;404 addition target software options, i.e., Target software is added to tool software working directory;405 operation button settings, i.e., the software packaging that setting will generate are pressed Button icon and shortcut;406 generate software packaging, that is, connect Core Generator software and connect Add-ons and target software Encrypting module is connect and is embedded in, simplest link order is that the startup shortcut of Add-ons and the startup of target software is fast Prompt mode does batch file, is started by autoexec order after generating software packaging;407 are supplied to user.
Fig. 5 is present invention connection Core Generator software(Add-ons side)It is packaged flow chart.501 connection Core Generators are soft Part, i.e., tool software of the present invention, the tool software include encryption generation module, and the tool software is Add-ons side Exploitation, i.e., the source code of Add-ons is open for the tool software, can be programmed, so to Add-ons Setting can require programming and setting according to the tool software.501 connection Core Generator softwares provide user's interaction after starting Interface, user's interaction have selection interface, 502 addition target softwares that target software or component are added to the tool software Working directory;503 selection interfaces, selection interface include at least:504 Add-ons are arranged, you can with as required to Add-ons It is configured, such as executing the operation target software that Add-ons require could run, or be arranged what target software was unconditionally run Number or time etc.;505 operation button settings, i.e., the button icon and shortcut of the software packaging that setting will generate; 506 generate software packaging, that is, connect Core Generator software and be attached Add-ons and target software and be embedded in encrypting module; 507 are supplied to user.
Fig. 6 is that Add-ons of the present invention are advertisement module embodiment advertisement module schematic diagrams.601 be advertisement module, 601 Advertisement module includes:602 communication units, are responsible for and advertisement distributing system carries out data exchange and transmission, or unidirectionally receive advertisement The ad data that delivery system is sent, 603 storage units are responsible for keeping in ad data, 604 display modules, responsible pair Ad data is shown that the mode of display can be the static WML pages and dynamic asp page face, ad display types can be: (1)Word carousel;(2)Image ad(3)Flash ad;(4)GIF advertisements;(5)Audio-visual advertisement;(6)Pop-up advertisement;(7) Floating ad, above-mentioned advertisement type can by webpage or resource that URL link to advertising distributors is specified, including website or Sales platform.
602 communication units:Bottom communication is based on ICP/IP protocol, and data transmission can be based on udp protocol.
603 storage units:The writing, reading of ad data instructs, and the temporary of ad data is provided, in addition it can provide The offline display of advertisement.
604 display units:It supports static and Dynamic Announce, supports URL link, support event to trigger URL, can realize URL Initial trigger(URL, which is just triggered to position to network address, when i.e. display unit works shows content), agreement can be HyperText Transfer Protocol agreements.In addition to illustrate that:The agreement that display unit uses inherently is based on ICP/IP protocol, So inherently having communication function, as a kind of embodiment, display unit is directly embedded into media, and display unit passes through interconnection FidonetFido is pointing directly at the direction address of advertisement distributing system offer.
605 encrypting modules, be responsible for connection advertisement module 601 and target software 606,607 be advertisement distributing system, be responsible for 601 releasing advertisements of advertisement module.
Advertisement module includes at least display unit, and the display unit uses HyperText Transfer Protocol Agreement, display type JPG, JIF, HTML code webpage(htm,html)Or dynamic web page(php,asp,asp.net, jsp)Or javascript or iframe modes are called.Display unit is pointing directly at advertisement distributing system by Internet protocol The direction address of offer, advertisement distributing system, which provides, turns link, and records link number and settled accounts for advertising expense.
Advertisement module using connection Core Generator Software Create software packaging, that is, has advertisement work(by the target software owner The target software of energy.
Advertisement module connection Core Generator software is provided by ad distribution platform, or provides the online generating mode of WEB page.
Advertisement module includes at least display unit, and display unit is the indispensable unit of advertisement, and storage unit can lack It saves, or advertising display data is stored in any position other than advertisement module.
A kind of method and tool software of software connection, it is characterized in that:The software or Add-ons of connection are advertisement modules, The operation of the advertisement module determines the operation of target software.
A kind of method and tool software of software connection, it is characterized in that:Target software, which is program or client, can perceive file, Advertisement module is display unit, and the display unit includes display image and URL link code, using hypertext transfer protocol.
As a kind of embodiment, advertisement module only retains Flash ad or GIF advertisements, advertising pictures pass through URL link To ad distribution platform, target software is a pdf document, and advertisement module and pdf document, such PDF are connected by encrypting module If reader clicks advertisement, link and be directed toward ad distribution platform, ad distribution platform can be directed toward advertisement by turning link The network address of publisher, while click behavior is recorded, the ad click expense of advertisement publishers is taken off, and ad click expense is paid PDF author realizes a kind of profit model.In this case, the advertisement module and pdf document connected by encrypting module is one A packaging file self solves ciphertext part packet, file suffixes name is pdf document form, is just pressed in this case without being arranged to start Button can be directly linked PDF program display file contents by mouse click.
Fig. 7 be Add-ons of the present invention when being recommending module target software pass through the method program flow for recommending to obtain mandate Figure.
Current numerous softwares are free, and especially mobile terminal software, an object of the present invention are exactly to realize freely Software realizes as advertisement interface and gets a profit that freeware is to have enough users as the key factor at advertisement interface Group, the method used here is the recommendation of user, i.e., is freely used by software is authorized by recommending to obtain, and such as setting recommends 2 People can authorize, then increase user with 2 n times side, if setting recommends 3 people that can authorize, increase user with 3 n times side, with this Analogize, is set as n and is then increased in a manner of the n times side of n.
In user terminal, the operation of software packaging and the authorisation step of target software are:
701 software installations;702 running softwares;
703 authorize detection, if having authorized Y,:704 software normal operations.
703 authorize detection, if unauthorized N,:705 recommended users, recommended user can by SMS, microblogging, Mailbox, instant message applications etc.;
706 recommend to count, if meeting setting number, 707 authorize, software normal operation.
706 recommend to count, if not meeting setting number, 708 selections, selection continues 705 recommended users, or selection 709 trial editions run or terminate, and trial edition can be set as that limited number can be run.
Setting recommendation determining program, specific method are:Recommending data storage unit is set, increases recommending data newly and storage is single Have recommending data in member to be compared, fail if any recommendation or recommendation is not allowed then.
Fig. 8 is Add-ons of the present invention recommending module recommended user's program flow diagram when being recommending module.801 recommend to use Family, program execute recommended user's instruction;
802 selection channels, 803 short messages 804 are mails, microblogging, instant messaging, other soft for the mobile terminals such as mobile phone Part can be PC softwares, can also be the mobile terminal softwares such as mobile phone;
If selecting 803 short breaths, then follow the steps 807 extractions and send recommendation, recommendation includes at least software Download address and link;
If selection 804, executes 805 and log in detection, 807 steps are executed if having logged in, are held if being not logged in 806 login step of row;
808 extraction return information values, program executes the return information value for reading short breath transmission success or not, or reads mail It sends, microblogging is issued, instant messaging is sent, the return information value of other softwares, specific method:A, pass through related software interface letter Number is realized;B, the user interface show value of related software is directly read, the user interface show value, which will be related software, to be executed As a result inform that user sends the inevitable step of success or not, it is possible to soft from the user interface layer Direct Acquisition of any software Part implementing result output identification value is not influenced by window stacking.The user interface that user interface, that is, software provides is A kind of open code and instruction.
809 return information values judge, 810 are executed if success and recommends success count, and 816 are executed if failure and is recommended Failure, into 814 selections;
811 recommend to count, if meeting setting number, 813 authorize, if not meeting setting number, into 814 choosings It selects;814 selections, can select recommended user's step again, return to 801 recommended users or the operation of 815 trial editions or terminate.
Fig. 9 be Add-ons of the present invention when being recommending module using recommendation Core Generator software(I.e. a kind of connection generates work Has software)The embodiment that target software is generated into software packaging.It is to beat target software to recommend the function of Core Generator software It is bundled into the software packaging with recommendation function, is a tool software, the tool software includes at least recommending module, in addition also Including encryption generation module, the tool software have user interface, are supplied to user's operation.Generation step is:901 recommend Core Generator running software;The target software of required packing, i.e., be added to and recommend Core Generator software by 902 addition target softwares Working directory in;903 be selection interface, that is, the user interface for recommending Core Generator software to provide;903 selection interface packets It includes:904 number settings on probation, that is, the finite number of time for allowing user to use;905 recommend number setting, i.e. setting to obtain mandate Recommended amount;906 recommend channel setting, i.e., communication channel is set, including short message, mail, microblogging, instant messaging etc.;907 targets Software icon, the i.e. required icon of selection target software, the icon mark formed after generating software packaging, and be packaged soft The icon mark of the shortcut of part operation or the button icon mark of software packaging operation;908 advertisements, you can to recommend Core Generator software users interactive interface is embedded in advertisement, and advertisement can be prefabricated advertisement, can also be the advertisement of on-line normalization, 908 advertisements are not required, can be default;909 generate software packaging, i.e., recommending module and target software are attached and are beaten It wraps together;910 are supplied to user;911 be encryption generation module, it is contemplated that user may skip recommended program and directly run mesh Software is marked, target software can be encrypted by encrypting module, i.e., must could open target software by recommending module Operation.
The recommendation Core Generator software can also use WEB or WAP service mode, that is, provide website, will recommend to generate Tool software is placed on website operation, and user can generate required software packaging with Website login webpage on website.
Figure 10 is Add-ons of the present invention software packaging operation schematic diagram when being recommending module.1001 operation buttons;1002 Recommending module;1003 target softwares;1004 encrypting modules;1005 encryption target softwares, i.e. target software and encrypting module are common Complete program function, target software and encrypting module constantly exchange data with maintain program operation or target software and plus Close module maintains program operation by exchanging data at least once, runs 1002 recommending modules after 1001 operation buttons startups, pushes away It recommends module output order and starts encryption Cheng Jiami 1005, it is contemplated that crack difficulty, recommending module can export one group of instruction and start Encipheror packet further synchronizes recommending module output order with one group of random number and encrypting module input is enabled, i.e., instruction and It must be consistent by enabling.
Software cryptography is existing mature technology, and specific Encryption Algorithm is exemplified below:Encryption Algorithm is unpredictable, irreversible , Encryption Algorithm a house dog program can generally be arranged in a program a number or character transformation at an integer, than One as having in one section of application program:A=Fx (3), program will obtain the value of variables A according to constant 3, can be former journey Sequence is rewritten in this way:A=Fx (DogConvert (1) -12342), then would not occur constant 3 in original program, and take with DogConvert (1) -12342, in this way, only software programming person just knows that the constant actually called is 3, and if cannot take Business device Encryption Algorithm, DogConvert functions cannot return to correct result, as a result formula A=Fx (DogConvert (1)- 12342) result also certainly will not be correct.
Another encryption method is that at least one byte section in target software is transplanted to encrypting module, and transplanting rule is by one Encryption factor controls, and encryption factor has unique key, key to be controlled by recommending module.
Figure 11 is a kind of embodiment of target software remote authorization of inventive article software realization.Work of the present invention Has software(Connect Core Generator software)It is a kind of mandate Core Generator software, the mandate Core Generator software is by target software Developer develop or third party provide, if it is third party provide, third party authorize Core Generator software have exclusive sequence number and Exclusive condition code and user password are used for distinguishing different tool software users, on the one hand the mandate Core Generator generates mesh Software client is marked, user is supplied to, on the other hand generates corresponding authorization service module, be supplied to target software supplier For carrying out remote authorization to the user of oneself.1101 target software vendor servers are responsible for providing user service, including: 1102 pass point service modules, 1103 authorization service modules, 1104 authorize customer data block;1105 clients, including:1106 award Module is weighed, 1107 encrypting modules, 1108 target softwares, 1108 target softwares include 1109 pass points.1106 authorization modules include Communication unit and User ID authentication unit, communication unit are carried out by internet protocol 1101 target software vendor servers of negotiation Data exchange after the operation of 1105 clients, carries out authorization check step first, and authorization message is supplied from 1101 target softwares Quotient's server, the authorized decryption unit for starting encrypting module 1107 afterwards of authorization module, 1108 target softwares are by being embedded in it In the explanation of encrypting module 1107 run;1104 mandate clients are additionally provided in 1101 target software vendor servers Database, the purpose is to provide to authorize customer data to authorization service module 1103, so that Differentiated services are in different clients.
In order to further protect target software, or the self-protection measure taken as target software exploitation side, Increase by 1102 pass point service modules and 1109 pass points, 1102 pass point service modules and 1109 pass points are cooperatings 's.Pass point is set in the operational process of target software first, is inserted into inquiry instruction in pass point, inquiry instruction is to pass point Service module is operated, and pass point service module is equipped with Encryption Algorithm, generates return value by algorithm, return value assignment, which is returned, to be added Close, target software normal operation, target software cannot be run if return value does not meet Encryption Algorithm.It in addition also can be by mesh A part of program of mark software is placed in 1102 pass point service modules, is called by 1109 pass points, if called successfully Then target software normal operation.Or Shell Encryption directly is carried out to target software( SHELL ), decryption unit is placed on target software Client objectives running software is supported in vendor server end by server end decryption unit.
1102 pass point service modules and 1109 pass points are not required, and can be lacked in the not high application of security requirements It saves.
A kind of method and tool software of software connection, it is characterized in that:The software or Add-ons of connection are authorization modules, Authorization module is responsible for the mandate of target software
Figure 12 is a kind of embodiments that Add-ons of the present invention are instant message applications.1201 target software suppliers End, 1201 target software supplier ends include:1202 pass point service modules, 1203 instant message applications, 1204 authorize client Database;1205 instant communication servers;1206 clients, 1206 clients include:1207 instant message applications, 1208 encryptions Module, 1209 target softwares, 1209 target softwares include 1210 pass points;1206 clients by 1207 instant message applications, 1209 target softwares are formed by connecting by the binding of 1208 encrypting modules.The mandate of target software realized by instant message applications, Simplest mode is:It will authorize client's Instant Messenger signal that target software supplier instant messaging buddy list is added, and define Buddy list authorizes client's list, can be realized by instant message applications provider API.
1202 pass point service modules and 1210 pass points can be default.
Instant messaging generates strapping tool software(One kind of the i.e. described connection Core Generator software)By instant messaging service Fang Kaifa is provided, and different sequence numbers or User ID can be arranged, and can provide different cipher modes and condition code, this Sample can form a kind of soft ware authorization solution that instant messaging service side provides, and can be with additional pay module or chain It connects, on-line payment target software usage charges, by target software supplier authoring system online authority to pay user immediately.
A kind of method and tool software of software connection, it is characterized in that:The software or Add-ons of connection are instant messagings Software, instant message applications are also responsible for the mandate of target software.
Figure 13 is present invention encryption generation module fundamental diagram.It includes compiler to encrypt generation module, and compiler can be with It is developed by software developer, compiling mode, algorithm, parameter can be formulated voluntarily, and encryption measures can be increased, and compiler can be foot This program can also be the program that compiling is completed, and is compiled to another software using compiler after forming packaging file general It can not understand, modify and be not easy to software packaging for software packaging user, so even if without volume Outer encryption measures also have encrypted meaning for software packaging, i.e. user can not be to the running software side in packet Formula is modified.In addition, for existing developing instrument software, generally included compiler, and provide in user's compilation process into Row encryption measures.
1301 compilers are responsible for handling target software and Add-ons, and extract target software and Add-ons Startup item;Add-ons are artificially partitioned into several by 1302 Add-ons, including Add-ons startup item by compiler Section, as Add-ons segmentation 1, Add-ons segmentation 2, Add-ons divide n;1303 be the software packaging generated, including two Part, one be operation collection, the other is software divide library, operation collection comprising Add-ons startup item, target software startup item, Operating instruction collection;Software segmentation has several sections of the summation that target software and Add-ons are artificially divided in library, such as additional soft Part segmentation 2, Add-ons segmentation 1, target software segmentation 2, target software divide 1, until n, these softwares are divided by compiler Upset by certain rule, and numbered for each segmentation, upsets rule and segmentation number record and concentrated in operating instruction;1304 are Target software, including target software startup item, several sections are artificially partitioned by compiler by target software, such as target software point Cut 1, target software segmentation 2, target software segmentation n;After the software packaging that compiled device compiling generates has startup item, software to start By setting operation Add-ons and target software, at this moment operation control comes from operating instruction collection order, will upset originally by rule Add-ons segmentation and target software segmentation reconnect assembling restore, such target software and Add-ons can be transported normally Row.In this way, software packaging user at least can not isolated operation target software.
A monitoring function can be arranged in operating instruction concentration, monitor the operating status of Add-ons and target software respectively, Following logical relation can be set:Add-ons and target software must be run simultaneously;Add-ons are first run;Target software is first Operation;Add-ons operation result starts target software;Add-ons are closed target software and are unconditionally closed;Add-ons are closed Target software is run as usual;Target software is closed Add-ons and is closed;Target software is closed Add-ons and is run as usual.
The software packaging generated is the structure from decrypted packet, you can execution part is decrypted code, enclosure part be by Encrypted program.
Compilation step is:(1)Add-ons startup item is extracted, operating instruction collection is written;(2)Target software is extracted to start , operating instruction collection is written;(3)Add-ons are divided into several sections, and to every segment number, operating instruction is written into number Collection;(4)Target software is divided into several sections, and to every segment number, operating instruction collection is written into number;(5)Software is divided Section is upset by certain rule, and will upset rule write-in operating instruction collection;(6)Operating instruction collection and whole softwares are divided section to compile Packing is translated, and startup item is set.
A kind of method and tool software of software connection, it is characterized in that:There are a tool software, the tool software will at least It is a new software that two existing stand alone softwares, which recompilate, and operating instruction collection, the operating instruction are created in compilation process Collection restricts the operation relationship of described two stand alone softwares, the operation of at least one soft ware authorization another software or one it is soft Operation of the operation of part dependent on another software, only there are one start buttons for new software.
For target software be one can be with the file of relating operation for, such as pdf document, then target software does not set startup , it being directly linked and is run by file, Add-ons generally have startup item setting, if Add-ons are a URL link codes, Then there is triggering to be arranged.
Figure 14 is the fundamental diagram that present invention encryption generation module starts target software with Add-ons operation result. In view of the particularity of Add-ons operation result, or connection Core Generator software and Add-ons are the same developers, I.e. Add-ons original code is transparent to connection Core Generator software, can be configured to Add-ons when being packaged, and is compiled The process of translating can generate two operating instruction collection, and one is Add-ons operating instruction collection, the other is target software operation refers to Collection is enabled, when software packaging is run, Add-ons operating instruction collection is run first, reruns after Add-ons operation result Target software operating instruction collection.
Figure 15 is the fundamental diagram that present invention encryption generation module only encrypts target software.In view of Add-ons are not required to The case where encrypting can only extract the startup item of Add-ons, such as Add-ons are advertisement modules, can require user only Advertisement is had a look, target software can be run as usual after closing.
Figure 16 is the embodiment that the present invention connects customizing browser with encrypting module and pdf document forms advertisement mode. In figure:1601 be advertisement distributing system;1602 be customizing browser, and it is smaller that customizing browser can be customized to window size Floating frame, customizing browser include the URL link be directed toward advertisement distributing system and provided, and can realize URL initial triggers(Browse URL just triggers positioning to network address and shows content when device is opened), agreement can be HyperText Transfer Protocol associations View;1603 be advertisement position 1,1604 be advertisement position n, and customizing browser 1602 includes at least an advertisement position;1605 be encryption mould Block;1606 be pdf document.
PDF author can register in advertisement distributing system and contract first, and open account of receipts, will be on PDF works files Advertisement distributing system website is reached, website is led to customizing browser 1602 and pdf document 1606 using connection Core Generator software It crosses the connection of encrypting module 1605 and is packed into new PDF formal files, the PDF formal files can be placed on arbitrary website for reading It is propagated between person's download or reader, when reader opens the PDF formal files, customizing browser works at the same time, If PDF readers click some advertisement position, advertisement distributing system, which will click on, to be turned to link to advertising distributors' network address, ad distribution System records click behavior, and advertising distributors are registered in advertisement distributing system, and a certain number of advertising expenses that prestored, this The click advertising expense of advertising distributors can be included in PDF author's account by sample advertisement distributing system.
The pdf document refers to a kind of file that can be read, and specific implementation need not limit to a kind of this file format, also may be used To be audio and video, picture etc., as long as essence is to meet a kind of demand properties of reader.It is characterized in that:Target software is Program or client can perceive file, and advertisement module is customizing browser or display unit, and the display unit includes display image With URL link code, using hypertext transfer protocol.
As a kind of performance, encrypting module connects pdf document and one and is directed toward the URL link generation of advertisement distributing system Code triggers URL link code simultaneously when reader opens PDF formal files, and URL link code has directly invoked computer system Some generic browsers show the website of advertisement distributing system, select to click on advertisement distributing system website by PDF readers Advertisement position, certainly, PDF readers can freely close generic browser.
The connection Core Generator software of above application mode such as can first be generated with recommendation with multinest, i.e., multiple generation Purpose Software Create is had the target software of recommendation function by tool software, then will be had with instant messaging Core Generator software and be pushed away The target software for recommending function generates the target software with instant communication function, and such target software just has recommendation and Instant Messenger Interrogate two kinds of attachment functions.
Programming language of the present invention can be existing any language form, such as VC++, C, Delphi, FORTRAN, Pascal,FOXPRO,Clipper,EXE ;WIN16:C,C++(Visual,C++Builder,Borland),Visual BASIC ; WIN32:C,C++(Visual, Borland), FORTRAN(LAHEY,Visual), Java, Visual BASIC,VisualFoxpro, PowerBuilder,Delphi,JavaScript,VBScript installshield, VB.net,VC.net; Linux: C,C++,Java ;Microsoft XML Web services platforms;The method of html, ASP.NET methods;Mac OS X operating systems;Mobile phone operating system:Windows Mobile, Symbian, Android, IOS, mobile phone Mac OS X operating systems etc..Especially set out is:The exploitation of android application layers can rely on java, and bottom can To be called with c, jni.
Server, client programming may be used on programming framework, control mode can also be used and use or call script journey The mode of sequence is programmed to server request method, or using cloud computing mode, i.e. SaaS patterns.
Transmission mode is based on TCP/UDP agreements or other any transmission of network modes, uses IPV4 at present, uses in the future IPV6.Symmetric cryptography, asymmetric encryption and Hash encryptions, such as DES, SSL or the side SET may be used in network transmission process Formula is encrypted.

Claims (10)

1. a kind of tool model of software connection, it is characterized in that:There are a tool model, the tool model to have at least two Stand alone software to recompilate be a new software, create operating instruction collection in compilation process, extraction target software and additional soft The startup item of part is written operating instruction collection, target software and Add-ons is divided into several sections, and to every segment number, will compile Number write-in operating instruction collection, software segmentation section upset by certain rule, and will upset rule write-in operating instruction collection, operation is referred to It enables collection and whole softwares divide section compiling to be packaged, and startup item is set, the operating instruction collection restricts described two stand alone softwares Operation relationship, the operation of at least one soft ware authorization another software or the operation of a software are soft dependent on another The operation of part, only there are one start buttons for new software.
2. a kind of tool model of software connection according to claim 1, it is characterized in that:There are encrypting module, the encryption Module connects at least two softwares, and the operation of a software relies upon at least the operation of another software, at least one software Operation depends on encrypting module.
3. a kind of tool model of software connection according to claim 2, it is characterized in that:The tool model includes encryption Generation module, the tool model include at least one Add-ons that need to be connected, and the tool model is by Add-ons and extremely Another few target software generates a software packaging by packaging operation, meanwhile, in generating process, tool model will encrypt mould Block is embedded in software packaging, and target software is generated the software packaging with Add-ons function, the packing by the tool model Software obtains the operational effect of two software of Add-ons and target software simultaneously or successively after being run by user.
4. a kind of tool model of software connection according to claim 1 or 2 or 3, it is characterized in that:At least one software is One of following software:Social software, animation, audio and video, Geographic mapping module, payment module, advertisement module, pushes away webpage Recommend module, authorization module.
5. a kind of tool model of software connection according to claim 4, it is characterized in that:The software or Add-ons of connection It is authorization module, authorization module is responsible for the mandate of target software.
6. a kind of tool model of software connection according to claim 4, it is characterized in that:The software or Add-ons of connection It is instant message applications, instant message applications is also responsible for the mandate of target software.
7. a kind of tool model of software connection according to claim 4, it is characterized in that:The software or Add-ons of connection It is advertisement module, the operation of the advertisement module determines the operation of target software.
8. a kind of connection method of the tool model of software connection according to claim 1 or 2 or 3, step are:(1) Connection Core Generator software is established, tool software includes encryption generation module, and user interface is arranged in tool software;(2)Choosing Add-ons are selected, by Add-ons and component inserter software work area;(3)Selection target software, by target software and group The workspace of part inserter software;(4)Run button settings, i.e. the operation button or quick of software packaging after setting generation Mode;(5)Tool software setting operation is executed, encrypting module is embedded in Add-ons and target software.
9. a kind of connection method of the tool model of software connection according to claim 1 or 2 or 3, step are:(1) Connection Core Generator software is established, tool software includes encryption generation module and Add-ons, and tool software is arranged user and interacts Interface;(2)Selection target software, by the workspace of target software and component inserter software;(3)Add-ons are arranged, i.e., Sum of parameters is wanted to be configured Add-ons operation in the future;(4)Run button settings, i.e. software packaging after setting generation Operation button or shortcut;(5)Tool software setting operation is executed, encrypting module and Add-ons insertion target is soft Part.
10. a kind of connection method of the tool model of software connection according to claim 8 or claim 9, it is characterized in that:Encryption life Include compiler at module, compiler compilation step is:(1)Add-ons startup item is extracted, operating instruction collection is written;(2)It carries Target software startup item is taken, operating instruction collection is written;(3)Target software is divided into several sections, and to every segment number, will be numbered Operating instruction collection is written;(4)Software segmentation section is upset by certain rule, and rule write-in operating instruction collection will be upset;(5)It will Operating instruction collection and whole softwares are divided section compiling and are packaged, and startup item is arranged.
CN201210220987.9A 2012-06-29 2012-06-29 A kind of method and tool software of software connection Active CN102779043B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201210220987.9A CN102779043B (en) 2012-06-29 2012-06-29 A kind of method and tool software of software connection
CN201810656034.4A CN108845805B (en) 2012-06-29 2012-06-29 Software connection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210220987.9A CN102779043B (en) 2012-06-29 2012-06-29 A kind of method and tool software of software connection

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201810656034.4A Division CN108845805B (en) 2012-06-29 2012-06-29 Software connection method

Publications (2)

Publication Number Publication Date
CN102779043A CN102779043A (en) 2012-11-14
CN102779043B true CN102779043B (en) 2018-09-21

Family

ID=47123964

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201810656034.4A Active CN108845805B (en) 2012-06-29 2012-06-29 Software connection method
CN201210220987.9A Active CN102779043B (en) 2012-06-29 2012-06-29 A kind of method and tool software of software connection

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201810656034.4A Active CN108845805B (en) 2012-06-29 2012-06-29 Software connection method

Country Status (1)

Country Link
CN (2) CN108845805B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104410966A (en) * 2014-11-27 2015-03-11 成都远为天胜科技有限公司 Secure wireless communication method
CN111314454A (en) * 2020-02-12 2020-06-19 深圳市信锐网科技术有限公司 Application access method and device, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1309349A (en) * 2001-03-22 2001-08-22 北京北大天正科技发展有限公司 Method for on-line customization of software
CN101271504A (en) * 2008-05-04 2008-09-24 北京深思洛克数据保护中心 Method for removing software permission
CN101311903A (en) * 2007-05-22 2008-11-26 国际商业机器公司 Method and device for reusing component of software system based on component
CN101504616A (en) * 2009-03-23 2009-08-12 金蝶软件(中国)有限公司 Method and apparatus for login of Windows application program through Web application
CN101604369A (en) * 2008-06-13 2009-12-16 京瓷美达株式会社 Information concealing method and information concealment device
CN101630194A (en) * 2008-07-18 2010-01-20 联想(北京)有限公司 Terminal equipment and startup method of application programs
CN101930377A (en) * 2009-06-22 2010-12-29 深圳市融创天下科技发展有限公司 Link library compiling method by dynamically acquiring UID
CN102024226A (en) * 2009-09-22 2011-04-20 英业达股份有限公司 System for downloading expansion software functions of addition assembly and method thereof

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020184611A1 (en) * 2001-05-30 2002-12-05 Palm, Inc. Design system and method having improved display of code
US8032909B2 (en) * 2001-07-05 2011-10-04 Digimarc Corporation Watermarking and electronic program guides
CN101561762A (en) * 2008-04-18 2009-10-21 鸿富锦精密工业(深圳)有限公司 Software installation procedure packing system and method
CN101840334B (en) * 2010-04-16 2013-04-17 中国电子科技集团公司第二十八研究所 Software component service packaging method
CN102156643A (en) * 2011-04-25 2011-08-17 青岛海信传媒网络技术有限公司 Software integration method and system thereof
CN102520958A (en) * 2011-12-20 2012-06-27 上海互联网软件有限公司 Software production line system and software production method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1309349A (en) * 2001-03-22 2001-08-22 北京北大天正科技发展有限公司 Method for on-line customization of software
CN101311903A (en) * 2007-05-22 2008-11-26 国际商业机器公司 Method and device for reusing component of software system based on component
CN101271504A (en) * 2008-05-04 2008-09-24 北京深思洛克数据保护中心 Method for removing software permission
CN101604369A (en) * 2008-06-13 2009-12-16 京瓷美达株式会社 Information concealing method and information concealment device
CN101630194A (en) * 2008-07-18 2010-01-20 联想(北京)有限公司 Terminal equipment and startup method of application programs
CN101504616A (en) * 2009-03-23 2009-08-12 金蝶软件(中国)有限公司 Method and apparatus for login of Windows application program through Web application
CN101930377A (en) * 2009-06-22 2010-12-29 深圳市融创天下科技发展有限公司 Link library compiling method by dynamically acquiring UID
CN102024226A (en) * 2009-09-22 2011-04-20 英业达股份有限公司 System for downloading expansion software functions of addition assembly and method thereof

Also Published As

Publication number Publication date
CN108845805A (en) 2018-11-20
CN108845805B (en) 2021-09-14
CN102779043A (en) 2012-11-14

Similar Documents

Publication Publication Date Title
Prusty Building blockchain projects
US8626842B2 (en) Content transaction management server device, content-providing server device, and terminal device and control program
JP4512153B2 (en) System for distributing content securely
US20010051928A1 (en) Protection of software by personalization, and an arrangement, method, and system therefor
CN110381135A (en) Interface creation method, service request method, device, computer equipment and medium
US20090083632A1 (en) Representing user interactions as a synchronous action in a business process flow
WO2011044529A1 (en) Various methods and apparatuses for securing an application container
CN103281187B (en) Safety certifying method, equipment and system
Tygar et al. WWW electronic commerce and Java Trojan horses
CN102799997B (en) A kind of dissemination method and system of Internet advertising
CN110750243A (en) Project code development method and system
US20200118120A1 (en) Methods and systems for providing a customized network
CN110232286B (en) E-commerce data chaining method and equipment applying intelligent contracts
Zheng et al. Decentralized application (dapp)
Adamik et al. Smartexchange: Decentralised trustless cryptocurrency exchange
US8132252B2 (en) System and method for securely transmitting data using video validation
CN102779043B (en) A kind of method and tool software of software connection
Morin et al. Commercialization of electronic information
CN102799836B (en) A kind of method that software is promoted
Hanson‐Heine et al. Blockchain technology in quantum chemistry: A tutorial review for running simulations on a blockchain
Mikkelsen et al. Technical implementation and feasibility
CN114785533B (en) Address book data safety control method and device, electronic equipment and storage medium
Curran et al. Common Problems Faced When Developing Applications for Mobile Devices
Tappenden et al. Agile development of secure Web-based applications
Borek et al. Integrating a model-driven approach and formal verification for the development of secure service applications

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20221130

Address after: 276000 Building 8, Shuangchuang Industrial Park, Feixian Economic Development Zone, Linyi City, Shandong Province

Patentee after: Shandong Warren Communication Technology Co.,Ltd.

Address before: 226001 No. 919, building 1, Wangfu building, 6 Renmin East Road, Jiangsu, Nantong

Patentee before: Wu Donghui

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20221230

Address after: 276000 Building 4, Shuangchuang Industrial Park, Xuyou Road, Feixian Economic Development Zone, Linyi City, Shandong Province

Patentee after: Shandong Baiwokang Biotechnology Co.,Ltd.

Address before: 276000 Building 8, Shuangchuang Industrial Park, Feixian Economic Development Zone, Linyi City, Shandong Province

Patentee before: Shandong Warren Communication Technology Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20231218

Address after: Room 11-5, Building 16, No. 6 Kuifu Avenue, Kuizhou Street, Fengjie County, Chongqing 404600

Patentee after: Yuntu (Chongqing) Business Information Consulting Service Co.,Ltd.

Address before: 276000 Building 4, Shuangchuang Industrial Park, Xuyou Road, Feixian Economic Development Zone, Linyi City, Shandong Province

Patentee before: Shandong Baiwokang Biotechnology Co.,Ltd.

TR01 Transfer of patent right