CN108256297B - Trial authorization verification method of software - Google Patents

Trial authorization verification method of software Download PDF

Info

Publication number
CN108256297B
CN108256297B CN201611243120.XA CN201611243120A CN108256297B CN 108256297 B CN108256297 B CN 108256297B CN 201611243120 A CN201611243120 A CN 201611243120A CN 108256297 B CN108256297 B CN 108256297B
Authority
CN
China
Prior art keywords
software
login
trial
time
days
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611243120.XA
Other languages
Chinese (zh)
Other versions
CN108256297A (en
Inventor
陈家制
葛俊鹏
汪秀兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Borui Tongyun Technology Co.,Ltd.
Original Assignee
Beijing Bray Tongyun Culture Communication Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Bray Tongyun Culture Communication Co ltd filed Critical Beijing Bray Tongyun Culture Communication Co ltd
Priority to CN201611243120.XA priority Critical patent/CN108256297B/en
Publication of CN108256297A publication Critical patent/CN108256297A/en
Application granted granted Critical
Publication of CN108256297B publication Critical patent/CN108256297B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention relates to a trial authorization verification method of software, which comprises the following steps: the method comprises the steps that a first terminal device receives a software trial starting instruction; the use start instruction includes a software ID; acquiring software installation time prestored in the system according to the software ID; determining whether the current time for receiving the software trial starting instruction is later than the software installation time; if the time is later than the software installation time, determining whether a login record of the current date exists in the historical login records stored in the system according to the current time; if yes, generating login verification confirmation information and/or calling login interface display data to display; if not, acquiring a temporary authorization time threshold; the temporary authorization time threshold includes a number of days allowed for login; determining whether the number of valid login days in the historical login record reaches the number of allowed login days; and if the number of days for allowing login is not reached, generating login verification confirmation information and/or calling login interface display data to display.

Description

Trial authorization verification method of software
Technical Field
The invention relates to the technical field of communication, in particular to a trial authorization verification method of software.
Background
To help users understand software functionality while ensuring the rights of software copyrights, most software provides a trial function and sets a trial period.
Conventional software trial period settings typically start from the time of software installation until the number of days for which a trial is set. Due to the particularity of the terminal device, some software bound with the terminal device is already installed when leaving a factory, and trial activation is also performed due to test requirements, so that the following situations can occur in the software trial period:
firstly, the terminal equipment still has a period of time to the hand of the user, so that the trial period is ended when the user uses the terminal equipment for the first time, or the available trial period is shortened;
secondly, when the software is activated for the first time and the system time for starting trial is inconsistent with the time zone when the user uses the software, the user needs to modify the system time, and the trial period is ended due to the fact that the system time of the terminal equipment is modified;
and thirdly, the software is reinstalled after the terminal equipment software is uninstalled, and the calculation is restarted, so that the user can obtain the indefinite software use trial period and the benefit of a software developer is damaged.
Disclosure of Invention
The invention aims to provide a software trial authorization verification method aiming at the defects of the prior art, which can effectively calculate the time of software trial authorization, not only meets the normal trial requirement of a user, but also ensures the benefit of a software developer.
In view of this, an embodiment of the present invention provides a method for verifying trial authorization of software, including:
the method comprises the steps that a first terminal device receives a software trial starting instruction; the use initiation instruction includes a software ID;
acquiring software installation time prestored in a system according to the software ID;
determining whether the current time for receiving the software trial start instruction is later than the software installation time;
if the software installation time is later than the software installation time, determining whether a login record of the current date exists in historical login records stored in the system according to the current time;
if yes, generating login verification confirmation information and/or calling login interface display data to display;
if not, acquiring a temporary authorization time threshold; the temporary authorization time threshold comprises a number of days allowed for login;
determining whether the number of valid login days in the historical login record reaches the number of allowed login days;
and if the number of days allowed to log in is not reached, generating login verification confirmation information and/or calling login interface display data to display.
Preferably, if the number of allowed login days is not reached, the method further comprises:
and adding the current date into the historical login record.
Preferably, if the current time is not later than the software installation time, the method further comprises:
and generating and displaying prompt information of login authentication failure.
Further preferably, if the current time is not later than the software installation time, the method further comprises:
generating a temporary authorization termination instruction and sending the temporary authorization termination instruction to the server; the temporary authorization termination instruction comprises International Mobile Equipment Identity (IMEI) information of the first terminal equipment;
and the server deletes the IMEI information of the first terminal equipment in the temporary data list according to the temporary authorization termination instruction.
Further preferably, before the first terminal device receives the software trial start instruction, the method further includes:
the first terminal equipment receives a software starting instruction, and acquires IMEI information of the first terminal equipment according to the software starting instruction;
sending an access request message to the server; the access request message carries IMEI information of the first terminal equipment;
the application server carries out query matching in the database server according to the IMEI information of the first terminal equipment;
and when the same IMEI information does not exist in the database server through inquiry and matching, generating the software trial starting instruction and sending the software trial starting instruction to the first terminal equipment.
The trial authorization verification method for the software provided by the embodiment of the invention can effectively calculate the trial authorization time of the software, not only meets the normal trial requirement of a user, but also ensures the benefit of a software developer.
Drawings
Fig. 1 is a flowchart of a trial authorization verification method for software according to an embodiment of the present invention;
fig. 2 is a flowchart of a method for generating a software trial start instruction according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a flowchart of a trial authorization verification method for software according to an embodiment of the present invention, as shown in fig. 1, including:
110, receiving a software trial starting instruction by first terminal equipment;
specifically, the use start instruction includes a software ID. This is performed on the basis that the software has been installed in the first terminal device. The terminal device in this example is preferably a mobile terminal, including a smart phone, a tablet computer, and the like.
The generation of the software trial start instruction may be different in the case of a network connection and in the case of no network connection.
In the case of having a network connection, the generation of the software trial start instruction may be implemented by performing the following steps 111-114, as shown in fig. 2 in particular.
Step 111, the first terminal equipment receives a software starting instruction, and acquires IMEI information of the first terminal equipment according to the software starting instruction;
specifically, before each user terminal leaves the factory, a manufacturer that manufactures the Mobile terminal allocates an International Mobile Equipment Identity (IMEI) to each Mobile terminal, where the IMEI is a mark for distinguishing the Mobile terminal, is stored in the Mobile terminal, and can be used to monitor stolen or invalid Mobile terminals. When the manufacturer allocates the IMEI, it should ensure that the IMEI of each mobile terminal is different.
Step 112, sending an access request message to a server;
specifically, the first terminal device sends out an access request message according to the software starting instruction. The access request message carries the IMEI information of the first terminal device.
Step 113, the application server performs query matching in a database server according to the IMEI information of the first terminal equipment;
in particular, in the embodiment of the present invention, a method for performing authorization verification on software bound to hardware is preferred, so that the software authorization verification on the terminal device can be performed through a unique identification code of the terminal device. IMEI information of authorized terminal equipment is stored in a database server in advance.
After the application server receives the access request message, the access request message is analyzed, and relevant information is extracted from the access request message. Wherein the application service may extract IMEI information of the first user terminal from the access request message, identifying whether the IMEI information is already recorded in the database server.
And step 114, when the same IMEI information does not exist in the database server through inquiry and matching, generating a software trial starting instruction and sending the instruction to the first terminal equipment.
Specifically, if the same IMEI information exists in the database server in a query matching manner, the software is authorized for the first terminal device, and the authorization confirmation information is directly returned, so that the first terminal device can directly start the software according to the authorization confirmation information.
In the case of no network connection, when the first terminal device receives a software start instruction input by a user, it will first inquire whether the local memory of the first terminal device has the key of the software. If so, it indicates that the software is authorized for use, and if not, it indicates that the software is not authorized. Only unauthorized cases are discussed herein.
And when the key of the software is not inquired in the local memory, the first terminal equipment generates a software trial starting instruction according to the received software starting instruction.
Whether or not there is a network connection, after the first terminal device receives an input or generated software trial start instruction, the verification of the trial authorization for the software may be performed as follows.
Step 120, acquiring the software installation time prestored in the system according to the software ID;
specifically, when the software is installed, the system of the user terminal automatically records the installation time of the software, including the first installation time. If the user uninstalls the software and then installs the software for the second time, the first installation time is still recorded in the system. And acquiring the software installation time stored in the system according to the software ID corresponding to the software trial starting instruction. The software installation time referred to herein preferably refers to the first installation time of the software.
Step 130, determining whether the current time for receiving the software trial starting instruction is later than the software installation time;
specifically, upon receiving the trial start instruction, the system records the time of receiving the trial start instruction, which is referred to herein as the current time. The situation that the trial period is bypassed by modifying the system time to the software installation date by the user can be avoided by judging whether the receiving time of the software trial starting instruction is later than the software installation time. If the receiving time of the software trial start instruction is earlier than the software installation time, the user can be considered to be certain to modify the system time.
If the software trial start instruction is received later than the software installation time, step 140 is executed, and if the software trial start instruction is not received later than the software installation time, step 190 is executed.
Step 140, determining whether the historical login records stored in the system have the login records of the current date according to the current time;
specifically, a history log is stored in the system, including the date of each log-in prior to the current log-in. The purpose of the query is to determine whether a date of the day has been logged in. If the current date has been logged in, the current date is within the valid trial period. Therefore, if there is a log-in record of the current date in the history log-in record, step 150 is executed to generate log-in verification confirmation information and/or call the log-in interface display data for display, so as to directly perform authorized log-in a trial manner.
If not, go to step 160, obtain the temporary authorization time threshold;
specifically, the temporary authorization threshold refers to a specified trial period duration set by a software developer. In general, the trial period duration refers to a continuous period of time, such as 15 consecutive days from the installation of the software or from the first login of the software.
In this example, however, the temporary authorization time threshold is specified as the number of days that trial logins are allowed, which may not be consecutive. In an application scenario in which software and hardware are bound, a manufacturer or a vendor of a terminal device needs to pre-install software, and may also need to perform login detection on the pre-installed software, which may cause that if the trial period is calculated according to a conventional method, the trial period may have ended when the terminal device reaches the user's hand, and normal trial of the user is affected. It is preferred in this example to use discrete numbers of days as the temporary authorisation time threshold, for example to provide a trial period of 15 days, indicating that the user may use the software on trial for any 15 days.
Step 170, determining whether the number of valid login days in the history login record reaches the number of allowed login days;
specifically, whether the trial termination condition has been reached is determined based on the valid login days recorded in the history login record.
If the number of days allowed for login is not reached, step 180 is executed, login verification confirmation information is generated and/or login interface display data is called to be displayed, and the current date is added into the historical login record.
If the number of allowed login days is reached, this indicates that the trial has ended, at which point step 190 is performed.
And 190, generating and displaying login authentication failure prompt information.
Further, in the case of having a network connection, the first terminal device generates a temporary authorization termination instruction to send to the server. The temporary authorization termination instruction comprises IMEI information of the first terminal equipment, and the server deletes the IMEI information of the first terminal equipment in the temporary data list according to the temporary authorization termination instruction, so that the trial authorization of the software of the first terminal equipment is recorded and managed at the server side.
The trial authorization verification method of the software provided by the embodiment of the invention is a trial authorization verification method of the software, provides a new software trial time management mode, and can effectively calculate the trial authorization time of the software, thereby meeting the normal trial requirement of a user and ensuring the benefit of a software developer.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied in hardware, a software module executed by a processor, or a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (3)

1. A method for verifying trial authorization of software, the method comprising:
the method comprises the steps that a first terminal device receives a software trial starting instruction; the trial starting instruction comprises a software ID; the software is pre-installed on the first terminal equipment;
acquiring software installation time prestored in a system according to the software ID;
determining whether the current time for receiving the software trial start instruction is later than the software installation time;
if the software installation time is later than the software installation time, determining whether a login record of the current date exists in historical login records stored in the system according to the current time;
if yes, generating login verification confirmation information and/or calling login interface display data to display;
if not, acquiring a temporary authorization time threshold; the temporary authorization time threshold comprises a number of days allowed for login;
determining whether the number of valid login days in the historical login record reaches the number of allowed login days;
if the number of days allowed to log in is not reached, generating login verification confirmation information and/or calling login interface display data to display;
wherein if the current time is not later than the software installation time, the method further comprises:
generating and displaying prompt information of login authentication failure; and
generating a temporary authorization termination instruction and sending the temporary authorization termination instruction to the server; the temporary authorization termination instruction comprises international mobile equipment identity (IME I) information of the first terminal equipment;
and the server deletes the IMEI information of the first terminal equipment in the temporary data list according to the temporary authorization termination instruction.
2. The method of claim 1, wherein if the number of allowed login days is not reached, the method further comprises:
and adding the current date into the historical login record.
3. The method for verifying the trial authorization of the software according to claim 1, wherein before the first terminal device receives the software trial start instruction, the method further comprises:
the first terminal equipment receives a software starting instruction, and acquires IMEI information of the first terminal equipment according to the software starting instruction;
sending an access request message to the server; the access request message carries IMEI information of the first terminal equipment;
the application server carries out inquiry and matching in a database server according to the IMEI information of the first terminal equipment;
and when the same IMEI information does not exist in the database server through inquiry and matching, generating the software trial starting instruction and sending the software trial starting instruction to the first terminal equipment.
CN201611243120.XA 2016-12-29 2016-12-29 Trial authorization verification method of software Active CN108256297B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611243120.XA CN108256297B (en) 2016-12-29 2016-12-29 Trial authorization verification method of software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611243120.XA CN108256297B (en) 2016-12-29 2016-12-29 Trial authorization verification method of software

Publications (2)

Publication Number Publication Date
CN108256297A CN108256297A (en) 2018-07-06
CN108256297B true CN108256297B (en) 2020-07-14

Family

ID=62719775

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611243120.XA Active CN108256297B (en) 2016-12-29 2016-12-29 Trial authorization verification method of software

Country Status (1)

Country Link
CN (1) CN108256297B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114626067A (en) * 2021-06-25 2022-06-14 江苏航天龙梦信息技术有限公司 Temporary firmware control method

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6742129B1 (en) * 1999-12-08 2004-05-25 Carrier Corporation Software security mechanism
JP4302035B2 (en) * 2004-10-07 2009-07-22 株式会社日立製作所 Time stamp service system, time stamp information verification server device, and computer software
CN102034059B (en) * 2010-12-02 2013-09-04 东莞宇龙通信科技有限公司 Method and device for managing application program and terminal
CN103365675A (en) * 2012-04-02 2013-10-23 鸿富锦精密工业(深圳)有限公司 Demoware processing system and method
US9591608B2 (en) * 2014-01-31 2017-03-07 Qualcomm Incorporated Methods and systems for discovery of home node B gateway support of positioning

Also Published As

Publication number Publication date
CN108256297A (en) 2018-07-06

Similar Documents

Publication Publication Date Title
CN109784031B (en) Account identity verification processing method and device
US10902848B2 (en) Method for providing telematics service using voice recognition and telematics server using the same
CN109063423B (en) Application software authorization method and system
CN104980926B (en) The long-range control method and device of mobile terminal
CN105337997B (en) Login method of application client and related equipment
CN104092542A (en) Account login method, device and system
CN108259163B (en) Authorization method of terminal equipment
US20150304317A1 (en) Data Access Method And Device
CN113542399B (en) Remote control method and device for vehicle, vehicle and storage medium
CN110691085B (en) Login method, login device, password management system and computer readable medium
CN108737971B (en) Identity authentication method, equipment and storage medium
CN111490981A (en) Access management method and device, bastion machine and readable storage medium
CN104023032A (en) Application limited unloading method based on dependable execution environment technology, server and terminal
CN111181728A (en) Data processing method and device
CN105608369A (en) Application software installation method and apparatus
CN102833247A (en) Method for anti-sweeping ciphers in user login system and device thereof
CN108881132B (en) Application authorization method, client, server and computer readable medium
CN107526580B (en) Terminal application identification method and device
CN108256297B (en) Trial authorization verification method of software
CN108259424B (en) Authorization verification method of terminal equipment
KR101879843B1 (en) Authentication mehtod and system using ip address and short message service
US10735423B2 (en) User authentication and authorization system for a mobile application
CN110351296B (en) Application login method and device and related equipment thereof
CN112328986A (en) User identity authentication method, device, server and storage medium
CN109389720B (en) Intelligent door lock permission processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100020 Beijing, East Third Ring Road, North Road, a building, floor 1702, room 17, room 26

Patentee after: Beijing Borui Tongyun Technology Co.,Ltd.

Address before: 100020 Beijing, East Third Ring Road, North Road, a building, floor 1702, room 17, room 26

Patentee before: BEIJING BRAY TONGYUN CULTURE COMMUNICATION Co.,Ltd.