CN111460393A - Method for preventing system from bypassing software license time management and control - Google Patents
Method for preventing system from bypassing software license time management and control Download PDFInfo
- Publication number
- CN111460393A CN111460393A CN202010193501.1A CN202010193501A CN111460393A CN 111460393 A CN111460393 A CN 111460393A CN 202010193501 A CN202010193501 A CN 202010193501A CN 111460393 A CN111460393 A CN 111460393A
- Authority
- CN
- China
- Prior art keywords
- time
- license
- earlier
- current system
- software
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 230000008676 import Effects 0.000 claims abstract description 18
- 238000004519 manufacturing process Methods 0.000 claims abstract description 17
- 238000012795 verification Methods 0.000 claims abstract description 11
- 230000008901 benefit Effects 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/105—Arrangements for software license management or administration, e.g. for managing licenses at corporate level
Abstract
The invention provides a method for preventing a system from bypassing software license time management and control, which comprises an importing method and a system time verification recording method; the importing method comprises the following steps: a1, importing a license to the system, verifying whether the license is valid and acquiring license generation time; a2, acquiring the current system time; a3, judging whether the license making time is earlier than the current system time; a4, creating a database table if the license production time is earlier than the current system time, and recording license import time as access time into the database table; a5, normally entering the software system. The invention creates the method for preventing the system from bypassing the license time control of the software, effectively prevents the user from recalling the system time so as to bypass the license time control, and ensures the benefit of a software provider.
Description
Technical Field
The invention belongs to the field of software security, and particularly relates to a method for preventing a system from bypassing software license time management and control.
Background
At present, the validity control of software license is to record a deadline in the license, then periodically compare the current system time with the deadline of the license in a software system, if the system time checked out by the software system is greater than the deadline, the license is considered to be expired and the software system stops service, and the problem is that if the software system does not have a license networking detection mechanism and a user calls back the system time, the system time checked out by the software system is always less than the deadline, so that the license cannot be expired, the software system cannot stop service, and thus a software provider can suffer loss.
Summary of the invention
In view of this, the present invention provides a method for preventing a system from bypassing software license time management and control, which checks the system time according to the production time in the license when the license is introduced, determines the accuracy of the system time during each access, and updates the last access time with the current access time and updates the access time at regular time.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
a method for preventing a system from bypassing software license time management and control comprises an importing method and a system time verification recording method;
the importing method comprises the following steps:
a1, importing a license to the system, verifying whether the license is valid and acquiring license generation time;
a2, acquiring the current system time;
a3, judging whether the license making time is earlier than the current system time;
a4, creating a database table if the license production time is earlier than the current system time, and recording license import time as access time into the database table;
a5, normally entering a software system;
the system time verification recording method comprises the following steps:
b1, acquiring the current system time;
b2, acquiring the last access time from the database table created before;
b3, judging whether the last access time is earlier than the current system time;
b4, creating a database table if the last access time is earlier than the current system time, and updating the access time in the database table by using the current system time.
Further, in step a4, a hidden file is created when the license production time is earlier than the current system time, and the license import time is recorded as the access time in the hidden file.
Further, when a hidden file is also created when the license production time is earlier than the current system time and the license import time is also recorded as the access time in the hidden file in step a4, step B2 acquires the last access time from the previously created hidden file.
Further, in step a3, when the license production time is not earlier than the current system time, the license import fails, and a system time error is indicated.
Further, in step B3, when the last access time is not earlier than the current system time, the user is prohibited from accessing the system, and a system time error is prompted.
Compared with the prior art, the method for preventing the system from bypassing software license time management and control has the following advantages:
the invention creates the method for preventing the system from bypassing the license time control of the software, effectively prevents the user from recalling the system time so as to bypass the license time control, and ensures the benefit of a software provider.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and, together with the description, serve to explain the invention without limitation. In the drawings:
fig. 1 is a schematic diagram illustrating an import flow of a method for preventing a system from bypassing license time management and control of software according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a system time verification recording flow of a method for preventing a system from bypassing software license time management and control according to an embodiment of the present invention.
Detailed Description
It should be noted that the embodiments and features of the embodiments of the present invention may be combined with each other without conflict.
In the description of the present invention, it is to be understood that the terms "central," "longitudinal," "lateral," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," and the like are used in the orientation or positional relationship indicated in the drawings, which are merely for convenience in describing the invention and to simplify the description, and are not intended to indicate or imply that the referenced device or element must have a particular orientation, be constructed and operated in a particular orientation, and are therefore not to be construed as limiting the invention. Furthermore, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first," "second," etc. may explicitly or implicitly include one or more of that feature. In the description of the invention, the meaning of "a plurality" is two or more unless otherwise specified.
In the description of the invention, it is to be noted that, unless otherwise explicitly specified or limited, the terms "mounted", "connected" and "connected" are to be construed broadly, e.g. as being fixed or detachable or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the creation of the present invention can be understood by those of ordinary skill in the art through specific situations.
The invention will be described in detail with reference to the following embodiments with reference to the attached drawings.
As shown in fig. 1 and fig. 2, a method for preventing a system from bypassing software license time management and control includes an importing method and a system time verification recording method;
the importing method comprises the following steps:
a1, importing a license to the system, verifying whether the license is valid and acquiring license generation time;
a2, acquiring the current system time;
a3, judging whether the license making time is earlier than the current system time;
a4, creating a database table if the license production time is earlier than the current system time, and recording license import time as access time into the database table;
a5, normally entering a software system;
the system time verification recording method comprises the following steps:
b1, acquiring the current system time;
b2, acquiring the last access time from the database table created before;
b3, judging whether the last access time is earlier than the current system time;
b4, creating a database table if the last access time is earlier than the current system time, and updating the access time in the database table by using the current system time.
A hidden file is also created when the license production time is earlier than the current system time in step a4, and the license import time is also recorded as the access time in the hidden file.
When a hidden file is also created when the license production time is earlier than the current system time and the license import time is also recorded as the access time in the hidden file in step a4, step B2 acquires the last access time from the previously created hidden file.
In step a3, when the license production time is not earlier than the current system time, the license import fails, and a system time error is indicated.
In step B3, the user is prohibited from accessing the system when the last access time is not earlier than the current system time, indicating a system time error.
The invention mainly prevents the callback system time from bypassing the time control of license by means of calibrating the system time when the license is imported and recording the access time when the license is accessed each time.
The specific embodiment of the invention is as follows:
1. when the license is manufactured, the time of a license manufacturing system is ensured to be accurate, and then the time of manufacturing the license is recorded in the license.
2. When a user imports a license, a software system firstly judges whether the making time in the license is earlier than the current system time, and if the current system time is accurate, the making time in the license is certainly earlier than the current system time. If not, the current system time is incorrect, and the import is stopped. This step calls back system time before license is introduced. (tolerance time can be added to prevent time inconsistency between the license system and the current software system, such as 1 day, and license production time is 1 day later than the current system time at most), if the time is earlier than the current system time, the import is successful, a table can be established in a database or a hidden file can be created, and the system access time is recorded, and the access time of the step is the license import time.
3. When the user uses the software system, the current system time and the last access time are acquired each time the software system is accessed (in the database or the hidden file created in the second step), if the current system time is earlier than the last access time, the system time is considered to be called back, and further processing can be performed, such as access prohibition, unless the user recovers the normal system time, and if the current system time is later than the last access time, the system time is normal and the access time is updated by the current system time.
4. The software system creates a timing task, the time interval is self-defined (not larger than 1 day as far as possible), the timing task acquires the current system time and the last access time (in the database or the hidden file created in the second step), if the current system time is earlier than the last access time, the system time is considered to be called back, and further processing can be carried out, such as access prohibition, unless the user recovers the normal system time, and if the current system time is later than the last access time, the system time is normal and the access time is updated by the current system time. (this step is to prevent the user from accessing the software system infrequently, resulting in access times that are not updated in a timely manner)
As shown in the system time verification record flow chart of fig. 2, the timer task flow is the same as the access time verification record flow, and only the trigger verification record flow is performed in the timing task.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and should not be taken as limiting the invention, so that any modifications, equivalents, improvements and the like, which are within the spirit and principle of the present invention, should be included in the scope of the present invention.
Claims (5)
1. The method for preventing the system from bypassing software license time management and control is characterized in that: the method comprises an importing method and a system time verification recording method;
the importing method comprises the following steps:
a1, importing a license to the system, verifying whether the license is valid and acquiring license generation time;
a2, acquiring the current system time;
a3, judging whether the license making time is earlier than the current system time;
a4, creating a database table if the license production time is earlier than the current system time, and recording license import time as access time into the database table;
a5, normally entering a software system;
the system time verification recording method comprises the following steps:
b1, acquiring the current system time;
b2, acquiring the last access time from the database table created before;
b3, judging whether the last access time is earlier than the current system time;
b4, creating a database table if the last access time is earlier than the current system time, and updating the access time in the database table by using the current system time.
2. The method for preventing the system from bypassing the license time control of the software according to claim 1, wherein: a hidden file is also created when the license production time is earlier than the current system time in step a4, and the license import time is also recorded as the access time in the hidden file.
3. The method for preventing the system from bypassing the license time control of the software according to claim 2, wherein: when a hidden file is also created when the license production time is earlier than the current system time and the license import time is also recorded as the access time in the hidden file in step a4, step B2 acquires the last access time from the previously created hidden file.
4. The method for preventing the system from bypassing the license time control of the software according to claim 1, wherein: in step a3, when the license production time is not earlier than the current system time, the license import fails, and a system time error is indicated.
5. The method for preventing the system from bypassing the license time control of the software according to claim 1, wherein: in step B3, the user is prohibited from accessing the system when the last access time is not earlier than the current system time, indicating a system time error.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010193501.1A CN111460393A (en) | 2020-03-18 | 2020-03-18 | Method for preventing system from bypassing software license time management and control |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010193501.1A CN111460393A (en) | 2020-03-18 | 2020-03-18 | Method for preventing system from bypassing software license time management and control |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111460393A true CN111460393A (en) | 2020-07-28 |
Family
ID=71684326
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010193501.1A Pending CN111460393A (en) | 2020-03-18 | 2020-03-18 | Method for preventing system from bypassing software license time management and control |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111460393A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100086130A1 (en) * | 2007-01-17 | 2010-04-08 | Peking University Founder Group Co., Ltd. | Digital Content Rights Management Method and System |
CN104143053A (en) * | 2013-05-08 | 2014-11-12 | 北大方正集团有限公司 | Digital content protection device and digital content protection method both based on mobile storage device |
CN109086575A (en) * | 2018-07-26 | 2018-12-25 | 郑州云海信息技术有限公司 | A kind of authorization method and system of software license |
CN109284586A (en) * | 2018-08-27 | 2019-01-29 | 武汉达梦数据库有限公司 | A kind of soft ware authorization license implementation method and device |
CN109598104A (en) * | 2018-11-28 | 2019-04-09 | 武汉虹旭信息技术有限责任公司 | Soft ware authorization based on timestamp and secret authentication file protects system and method |
CN109933957A (en) * | 2017-12-19 | 2019-06-25 | 镇江飞协软件开发有限公司 | A kind of method and device of software deadline verifying |
CN110633074A (en) * | 2019-09-19 | 2019-12-31 | 北京猎户星空科技有限公司 | Use control method and device of software development kit |
CN110825639A (en) * | 2019-11-08 | 2020-02-21 | 西安雷风电子科技有限公司 | Tamper-resistant time software License verification method |
-
2020
- 2020-03-18 CN CN202010193501.1A patent/CN111460393A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100086130A1 (en) * | 2007-01-17 | 2010-04-08 | Peking University Founder Group Co., Ltd. | Digital Content Rights Management Method and System |
CN104143053A (en) * | 2013-05-08 | 2014-11-12 | 北大方正集团有限公司 | Digital content protection device and digital content protection method both based on mobile storage device |
CN109933957A (en) * | 2017-12-19 | 2019-06-25 | 镇江飞协软件开发有限公司 | A kind of method and device of software deadline verifying |
CN109086575A (en) * | 2018-07-26 | 2018-12-25 | 郑州云海信息技术有限公司 | A kind of authorization method and system of software license |
CN109284586A (en) * | 2018-08-27 | 2019-01-29 | 武汉达梦数据库有限公司 | A kind of soft ware authorization license implementation method and device |
CN109598104A (en) * | 2018-11-28 | 2019-04-09 | 武汉虹旭信息技术有限责任公司 | Soft ware authorization based on timestamp and secret authentication file protects system and method |
CN110633074A (en) * | 2019-09-19 | 2019-12-31 | 北京猎户星空科技有限公司 | Use control method and device of software development kit |
CN110825639A (en) * | 2019-11-08 | 2020-02-21 | 西安雷风电子科技有限公司 | Tamper-resistant time software License verification method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9578027B1 (en) | Multiple data store authentication | |
EP3591564B1 (en) | Event attestation for an electronic device | |
US9749332B2 (en) | Electronic device with addiction-prevention function and method thereof | |
US8064583B1 (en) | Multiple data store authentication | |
CN103475485B (en) | Identity authentication supporting platform and authentication method based on digital certificate interconnection and interworking | |
EP3534634A1 (en) | System and method for identity protection using mobile device signaling network derived location pattern recognition | |
US8011014B2 (en) | System and method for password validation based on password's value and manner of entering the password | |
CN107193683B (en) | Database backup verification method and device | |
WO2016106973A1 (en) | Password authentication method and device | |
CN102625309A (en) | Access control method and device | |
CN106021964A (en) | Intelligent medical information management system | |
CN111460393A (en) | Method for preventing system from bypassing software license time management and control | |
CN109801409A (en) | Voice method for unlocking, electronic equipment | |
CN107957871A (en) | A kind of front and back end synchronization canonical method of calibration based on JSR303 | |
CN111002778A (en) | Vehicle body horizontal adjusting method and device, vehicle-mounted equipment and readable storage medium | |
CN111367793A (en) | API quality detection system and method based on block chain intelligent contract | |
CN111274237A (en) | Medical data checking and correcting system and method | |
CN108259163A (en) | The authorization method of terminal device | |
CN100576136C (en) | Usage license data are connected the method for service data transmission network with relevant equipment | |
KR100653139B1 (en) | Certification method | |
CN107454569B (en) | Bicycle, cloud platform and method for calibrating position information of bicycle | |
US20120060228A1 (en) | Completely automated computer implemented system and method for piracy control based on update requests | |
CN1972187A (en) | A method for implementing fingerprint network memory | |
CN113312602B (en) | Method and system for realizing fingerprint sharing | |
CN108259424A (en) | The authority checking method of terminal device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200728 |
|
RJ01 | Rejection of invention patent application after publication |