CN111611553A - Method for dynamically authorizing software of protected end computer with disconnected network in online mode - Google Patents
Method for dynamically authorizing software of protected end computer with disconnected network in online mode Download PDFInfo
- Publication number
- CN111611553A CN111611553A CN202010459139.8A CN202010459139A CN111611553A CN 111611553 A CN111611553 A CN 111611553A CN 202010459139 A CN202010459139 A CN 202010459139A CN 111611553 A CN111611553 A CN 111611553A
- Authority
- CN
- China
- Prior art keywords
- software
- code
- computer
- disconnected
- authorization
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 238000013475 authorization Methods 0.000 claims abstract description 49
- 230000006855 networking Effects 0.000 claims abstract description 20
- 239000002699 waste material Substances 0.000 description 4
- 238000011161 development Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000002620 method output Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
- G06K17/0025—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a method for dynamically authorizing software of a protected end computer with a disconnected network in an online mode, which comprises the following steps: acquiring a right; acquiring dynamic authorization information by using third-party networking equipment; and authorizing the corresponding protected software on the disconnected computer through the authorization information. The invention obtains dynamic authorization permission on the disconnected network computer, and can control the software to run only on the appointed equipment.
Description
Technical Field
The invention relates to the technical field of computer protection, in particular to a method for dynamically authorizing software of a protected end computer with a disconnected network in an online mode.
Background
For security reasons, the protected local area network and the protected computer must be physically disconnected from the internet, and in this case, software authorization on the protected computer can generally only adopt methods such as static authorization and hardware authorization.
The static authorization mode mainly generates a license according to the serial number of the machine, and the license can be used legally within a certain time period.
Hardware authorization is the time when software is purchased, a software manufacturer provides a hardware entity, and hardware is inserted into a machine needing to use the software to obtain software authorization.
The above is the authorization mode adopted by most software in a protected computer or network at present, the application defects of the two modes in the type of so-called SAAS (software as a service) service are obvious, all operation authorities can be given to the software only at one time, short-term items charged according to calculation processing amount cannot be charged, customers rarely use the software frequently but use the software the same, differentiated services cannot be provided, and customers also need to buy the use authorities at the same cost as other customers even if the software is used the least, so that the waste of company funds and resources is brought.
At present, no method for carrying out user authentication in an internet online mode and then completing dynamic authorization on software on a disconnected computer through a certain algorithm is available, so that dynamic authorization on service type software is realized, and differentiated authorization service is provided for clients.
Disclosure of Invention
The invention aims to provide a method for dynamically authorizing software of a protected end computer with a disconnected network in an online mode, which solves the problem of dynamically obtaining authorized permission on the disconnected network computer and the problem that a control program can only run on a specified device.
In order to solve the technical problem, the invention adopts the following scheme:
a method for dynamically authorizing software of a protected end computer with a disconnected network in an online mode comprises the following steps:
s1: acquiring a right;
s2: acquiring dynamic authorization information by using third-party networking equipment;
s3: and authorizing the corresponding protected software on the disconnected computer through the authorization information in the step S2 to enable the protected computer to be legally used, wherein in the disconnected state of the computer, only the third-party networking equipment is required to obtain the dynamic authorization information and input the authorization information into the protected computer, and the corresponding protected software on the disconnected computer can be legally used, so that the corresponding program can be controlled to only run on the specified computer equipment.
Preferably, in step S1, first, software for implementing the method of the present invention is installed in a computer in the disconnected network environment, the user completes account registration, the user initially logs in after successful internet registration, the background system automatically generates an identification code, the user scans a two-dimensional code or a barcode presented in the disconnected network computer using a third-party networking device, information carried in the two-dimensional code or the barcode is automatically associated with the identification code, and the uniqueness of the third-party networking device is determined.
Preferably, in step S2, corresponding protected software is started on a computer with a network failure, the software automatically generates a two-dimensional code or a barcode, the method for generating the two-dimensional code or the barcode is a mature technical means in the prior art, and is a public technology well known to those skilled in the art.
Preferably, in step S3, after the third-party networking device recognizes the two-dimensional code or barcode and obtains the authorization code, the authorization interface is automatically popped up after a certain time on the network-disconnected computer, and the authorization code is input on the authorization interface, so that the corresponding protected software on the network-disconnected computer can legally run.
Preferably, the downloaded software integrates a software authorization management module for implementing the method of the present invention.
Preferably, the two-dimensional code or the bar code is a dynamic code, the dynamic code improves the security, realizes dynamic authorization of the service type software, and can record key information such as user information, unique codes of a computer, software running state and the like by means of larger information capacity of the two-dimensional code or the bar code.
Preferably, the method further comprises the following steps:
s4: when the software use authority is about to be limited, the software outputs a two-dimensional code or a bar code, a third party identifies the two-dimensional code or the bar code at the moment and obtains a new authorization code, the use limitation of the software can be limited by adopting modes such as charging and the like, such as a mode of using times or using time, a diversified payment mode, dynamic payment according to the requirements of different customers, differential authorization service is provided for the customers, the waste of funds is avoided, and the development of software service industry is greatly promoted;
s5: the software of the present invention can be used continuously by inputting the new authorization code in the step S4 on the authorization interface popped up on the computer with the network disconnected, so that the corresponding protected software on the computer can be protected continuously.
Preferably, the authorization code is a short character string which can be input, so that the information input mode is simplified.
Preferably, the third-party networking device is a mobile phone or other terminals with scanning and identifying functions, and the mobile phone is a portable terminal and has wide applicability.
The invention has the following beneficial effects:
1. the method and the software system provided by the invention can dynamically control the protected end computer and the corresponding software to operate legally according to various charging modes under the condition that the computer is disconnected, effectively protect the benefit of a software copyright party, greatly simplify the interaction with a software provider for a client, dynamically pay according to the requirement and avoid fund waste.
Drawings
FIG. 1 is a block flow diagram of the present invention;
Detailed Description
The present invention will be described in further detail with reference to examples and drawings, but the present invention is not limited to these examples.
In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "longitudinal", "lateral", "horizontal", "inner", "outer", "front", "rear", "top", "bottom", and the like indicate orientations or positional relationships that are based on the orientations or positional relationships shown in the drawings, or that are conventionally placed when the product of the present invention is used, and are used only for convenience in describing and simplifying the description, but do not indicate or imply that the device or element referred to must have a particular orientation, be constructed in a particular orientation, and be operated, and thus should not be construed as limiting the invention.
In the description of the present invention, it should also be noted that, unless otherwise explicitly specified or limited, the terms "disposed," "open," "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Example 1
A method for dynamically authorizing software of a protected end computer with a disconnected network in an online mode comprises the following steps:
as shown in fig. 1, in practical application, the software implementing the method of the present invention is installed on a computer in a network-disconnected environment, the software integrates a software authorization management module implementing the method of the present invention, a user completes account registration, the user initially logs in after internet registration is successful, a background system automatically generates an identification code, the user uses a third-party networking device to scan a two-dimensional code or a bar code presented in the network-disconnected computer, information carried in the two-dimensional code or the bar code is automatically associated with the identification code to determine the uniqueness of the third-party networking device, the third-party networking device is a mobile phone, the mobile phone is a portable terminal, and has wide applicability, a corresponding protected software is started on the network-disconnected computer, the software automatically generates the two-dimensional code, and the generation method of the two-dimensional code is a mature technical means in the prior art and is a public technology well known by a person skilled in the art, according to the invention, a current popular two-dimension code identification mode is adopted, the use habit of a user is met, the two-dimension code is scanned and identified by the mobile phone to obtain the authorization code, and due to the uniqueness of third-party networking equipment, other third-party equipment cannot obtain the authorization code after identifying the two-dimension code; after the mobile phone identifies the two-dimensional code or the bar code to obtain the authorization code, the authorization interface is automatically popped up after a certain time on the off-network computer, and after the authorization code is input on the authorization interface, the corresponding protected software on the off-network computer can legally run; the two-dimension code is a dynamic code, the dynamic code improves the safety, the dynamic authorization of the service type software is realized, key information such as user information, computer unique code, software running state and the like can be recorded by means of larger information capacity of the two-dimension code or the bar code, the two-dimension code is transmitted back to the authorization management system through the network, the background automatically transmits the authorization code to third-party networking equipment according to the content of the license agreement, the interaction procedure between the user and a software provider is simplified, and the software running is conveniently authorized.
When the software using authority for realizing the method is about to be limited, the software for realizing the method outputs a two-dimensional code or a bar code, a third party identifies the two-dimensional code or the bar code at the moment and obtains a new authorization code, the use limitation of the software for realizing the method can be limited by adopting charging and other modes, such as a mode of using times or using time, a diversified payment mode, dynamic payment according to the requirements of different customers, differential authorization service is provided for the customers, the waste of funds is avoided, and the development of software service industry is greatly promoted; the new authorization code is input on the authorization interface popped up on the computer with broken network, so that the software for realizing the method of the invention can be continuously used, and the corresponding protected software on the computer can be continuously protected.
Example 2
If the computer is not protected, the computer does not need to be disconnected from the internet, and the software for realizing the method of the invention can be downloaded and installed on the computer at the moment, the other steps are the same as the above embodiment, and the dynamic authorization of the software can be carried out under the condition of computer networking, and the legal operation of the corresponding protected software on the computer can be realized.
The foregoing is only a preferred embodiment of the present invention, and the present invention is not limited thereto in any way, and any simple modification, equivalent replacement and improvement made to the above embodiment within the spirit and principle of the present invention still fall within the protection scope of the present invention.
Claims (9)
1. A method for dynamically authorizing software of a protected end computer with a disconnected network in an online mode is characterized by comprising the following steps:
s1: acquiring a right;
s2: acquiring dynamic authorization information by using third-party networking equipment;
s3: the corresponding protected software on the disconnected computer is authorized through the authorization information in step S2.
2. The method for dynamically authorizing the software of the protected end computer with the disconnected network in the online manner according to the claim 1, wherein in the step S1, the software for implementing the method of the present invention is installed to the computer in the disconnected network environment, the user completes the account registration, the user initially logs in after the internet registration is successful, the background system automatically generates the identification code, the user scans the two-dimensional code or the bar code presented in the disconnected network computer by using the third-party networking device, the information carried in the two-dimensional code or the bar code is automatically associated with the identification code, and the uniqueness of the third-party networking device is determined.
3. The method according to claim 1, wherein in step S2, the corresponding protected software is started on the network-disconnected computer, the software automatically generates a two-dimensional code or barcode, and the third-party networking device recognizes the two-dimensional code or barcode in step S2 and obtains the authorization code.
4. The method according to claim 1, wherein in step S3, after the third-party networking device recognizes the two-dimensional code or barcode and obtains the authorization code, the authorization code is input on an authorization interface popped up on the network-disconnected computer, so that the corresponding protected software on the network-disconnected computer operates legally.
5. The method for dynamically authorizing software on a protected end computer that is disconnected from a network in an online manner as recited in claim 2, wherein the downloaded software integrates a software authorization management module for implementing the method of the present invention.
6. The method for dynamically authorizing the software of the protected-end computer with the disconnected network in the online manner according to claim 3, wherein the two-dimensional code or the bar code is a dynamic code, and the two-dimensional code or the bar code at least contains key information such as user information, a unique computer code, a software running state and the like.
7. The method for dynamically authorizing software on a protected end computer of a disconnected network in an online manner according to claim 1, further comprising the steps of:
s4: when the software using authority is about to be limited, the software outputs a two-dimensional code or a bar code, and a third party identifies the two-dimensional code or the bar code at the moment through networking to obtain a new authorization code;
s5: and inputting the new authorization code in the step S4 on an authorization interface popped up on the disconnected computer, so that the corresponding protected software on the computer can be continuously protected.
8. The method for dynamically authorizing software on-line to a protected end computer that is disconnected from a network according to claim 3, wherein the authorization code is a short string of characters that can be entered.
9. The method of claim 1, wherein the third-party networking device is a mobile phone or other terminal with a scanning and recognition function.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010459139.8A CN111611553A (en) | 2020-05-27 | 2020-05-27 | Method for dynamically authorizing software of protected end computer with disconnected network in online mode |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010459139.8A CN111611553A (en) | 2020-05-27 | 2020-05-27 | Method for dynamically authorizing software of protected end computer with disconnected network in online mode |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111611553A true CN111611553A (en) | 2020-09-01 |
Family
ID=72200462
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010459139.8A Pending CN111611553A (en) | 2020-05-27 | 2020-05-27 | Method for dynamically authorizing software of protected end computer with disconnected network in online mode |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111611553A (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108548271A (en) * | 2018-04-17 | 2018-09-18 | 奥克斯空调股份有限公司 | Air conditioning monitoring and the method and system of debugging software mandate |
CN109086575A (en) * | 2018-07-26 | 2018-12-25 | 郑州云海信息技术有限公司 | A kind of authorization method and system of software license |
-
2020
- 2020-05-27 CN CN202010459139.8A patent/CN111611553A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108548271A (en) * | 2018-04-17 | 2018-09-18 | 奥克斯空调股份有限公司 | Air conditioning monitoring and the method and system of debugging software mandate |
CN109086575A (en) * | 2018-07-26 | 2018-12-25 | 郑州云海信息技术有限公司 | A kind of authorization method and system of software license |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100433617C (en) | System and method for facilitating electronic financial transactions using a mobile telecommunications device | |
US10049360B2 (en) | Secure communication of payment information to merchants using a verification token | |
US7319987B1 (en) | Tokenless financial access system | |
US6366682B1 (en) | Tokenless electronic transaction system | |
US7558407B2 (en) | Tokenless electronic transaction system | |
CN1279498C (en) | Code identification method and system | |
US6154879A (en) | Tokenless biometric ATM access system | |
US20220021768A1 (en) | Certification and activation of used phones on a wireless carrier network | |
US20030055738A1 (en) | Method and system for effecting an electronic transaction | |
EP2043036B1 (en) | System, method and device for enabling interaction with dynamic security | |
WO2002073483A1 (en) | Electronic money settlement method using mobile communication terminal | |
KR20030034061A (en) | External device and authentication system | |
JP2002352166A (en) | System and terminal for authenticating credit card | |
JP2007527059A (en) | User and method and apparatus for authentication of communications received from a computer system | |
EA011546B1 (en) | System and method for making cashless payments | |
WO1999031621A1 (en) | Tokenless financial access system | |
US20020156728A1 (en) | Method and arrangement for the transmission of an electronic sum of money from a credit reserve by wap | |
EP3096274A2 (en) | Secure transaction system | |
CN111611553A (en) | Method for dynamically authorizing software of protected end computer with disconnected network in online mode | |
CN113706137B (en) | Data processing method and system applied to payment information | |
CN113743938A (en) | Personal credit investigation information query method and device | |
CN111159673A (en) | Identity information verification method, device and equipment | |
CN117714201A (en) | Application program login method, device, terminal and storage medium | |
CN115063910A (en) | Online locking and unlocking method, dynamic coded lock, system and storage medium | |
WO2004079676A1 (en) | Secure transaction system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200901 |