CN111611553A - Method for dynamically authorizing software of protected end computer with disconnected network in online mode - Google Patents

Method for dynamically authorizing software of protected end computer with disconnected network in online mode Download PDF

Info

Publication number
CN111611553A
CN111611553A CN202010459139.8A CN202010459139A CN111611553A CN 111611553 A CN111611553 A CN 111611553A CN 202010459139 A CN202010459139 A CN 202010459139A CN 111611553 A CN111611553 A CN 111611553A
Authority
CN
China
Prior art keywords
software
code
computer
disconnected
authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010459139.8A
Other languages
Chinese (zh)
Inventor
杨军
任春雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010459139.8A priority Critical patent/CN111611553A/en
Publication of CN111611553A publication Critical patent/CN111611553A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a method for dynamically authorizing software of a protected end computer with a disconnected network in an online mode, which comprises the following steps: acquiring a right; acquiring dynamic authorization information by using third-party networking equipment; and authorizing the corresponding protected software on the disconnected computer through the authorization information. The invention obtains dynamic authorization permission on the disconnected network computer, and can control the software to run only on the appointed equipment.

Description

Method for dynamically authorizing software of protected end computer with disconnected network in online mode
Technical Field
The invention relates to the technical field of computer protection, in particular to a method for dynamically authorizing software of a protected end computer with a disconnected network in an online mode.
Background
For security reasons, the protected local area network and the protected computer must be physically disconnected from the internet, and in this case, software authorization on the protected computer can generally only adopt methods such as static authorization and hardware authorization.
The static authorization mode mainly generates a license according to the serial number of the machine, and the license can be used legally within a certain time period.
Hardware authorization is the time when software is purchased, a software manufacturer provides a hardware entity, and hardware is inserted into a machine needing to use the software to obtain software authorization.
The above is the authorization mode adopted by most software in a protected computer or network at present, the application defects of the two modes in the type of so-called SAAS (software as a service) service are obvious, all operation authorities can be given to the software only at one time, short-term items charged according to calculation processing amount cannot be charged, customers rarely use the software frequently but use the software the same, differentiated services cannot be provided, and customers also need to buy the use authorities at the same cost as other customers even if the software is used the least, so that the waste of company funds and resources is brought.
At present, no method for carrying out user authentication in an internet online mode and then completing dynamic authorization on software on a disconnected computer through a certain algorithm is available, so that dynamic authorization on service type software is realized, and differentiated authorization service is provided for clients.
Disclosure of Invention
The invention aims to provide a method for dynamically authorizing software of a protected end computer with a disconnected network in an online mode, which solves the problem of dynamically obtaining authorized permission on the disconnected network computer and the problem that a control program can only run on a specified device.
In order to solve the technical problem, the invention adopts the following scheme:
a method for dynamically authorizing software of a protected end computer with a disconnected network in an online mode comprises the following steps:
s1: acquiring a right;
s2: acquiring dynamic authorization information by using third-party networking equipment;
s3: and authorizing the corresponding protected software on the disconnected computer through the authorization information in the step S2 to enable the protected computer to be legally used, wherein in the disconnected state of the computer, only the third-party networking equipment is required to obtain the dynamic authorization information and input the authorization information into the protected computer, and the corresponding protected software on the disconnected computer can be legally used, so that the corresponding program can be controlled to only run on the specified computer equipment.
Preferably, in step S1, first, software for implementing the method of the present invention is installed in a computer in the disconnected network environment, the user completes account registration, the user initially logs in after successful internet registration, the background system automatically generates an identification code, the user scans a two-dimensional code or a barcode presented in the disconnected network computer using a third-party networking device, information carried in the two-dimensional code or the barcode is automatically associated with the identification code, and the uniqueness of the third-party networking device is determined.
Preferably, in step S2, corresponding protected software is started on a computer with a network failure, the software automatically generates a two-dimensional code or a barcode, the method for generating the two-dimensional code or the barcode is a mature technical means in the prior art, and is a public technology well known to those skilled in the art.
Preferably, in step S3, after the third-party networking device recognizes the two-dimensional code or barcode and obtains the authorization code, the authorization interface is automatically popped up after a certain time on the network-disconnected computer, and the authorization code is input on the authorization interface, so that the corresponding protected software on the network-disconnected computer can legally run.
Preferably, the downloaded software integrates a software authorization management module for implementing the method of the present invention.
Preferably, the two-dimensional code or the bar code is a dynamic code, the dynamic code improves the security, realizes dynamic authorization of the service type software, and can record key information such as user information, unique codes of a computer, software running state and the like by means of larger information capacity of the two-dimensional code or the bar code.
Preferably, the method further comprises the following steps:
s4: when the software use authority is about to be limited, the software outputs a two-dimensional code or a bar code, a third party identifies the two-dimensional code or the bar code at the moment and obtains a new authorization code, the use limitation of the software can be limited by adopting modes such as charging and the like, such as a mode of using times or using time, a diversified payment mode, dynamic payment according to the requirements of different customers, differential authorization service is provided for the customers, the waste of funds is avoided, and the development of software service industry is greatly promoted;
s5: the software of the present invention can be used continuously by inputting the new authorization code in the step S4 on the authorization interface popped up on the computer with the network disconnected, so that the corresponding protected software on the computer can be protected continuously.
Preferably, the authorization code is a short character string which can be input, so that the information input mode is simplified.
Preferably, the third-party networking device is a mobile phone or other terminals with scanning and identifying functions, and the mobile phone is a portable terminal and has wide applicability.
The invention has the following beneficial effects:
1. the method and the software system provided by the invention can dynamically control the protected end computer and the corresponding software to operate legally according to various charging modes under the condition that the computer is disconnected, effectively protect the benefit of a software copyright party, greatly simplify the interaction with a software provider for a client, dynamically pay according to the requirement and avoid fund waste.
Drawings
FIG. 1 is a block flow diagram of the present invention;
Detailed Description
The present invention will be described in further detail with reference to examples and drawings, but the present invention is not limited to these examples.
In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "longitudinal", "lateral", "horizontal", "inner", "outer", "front", "rear", "top", "bottom", and the like indicate orientations or positional relationships that are based on the orientations or positional relationships shown in the drawings, or that are conventionally placed when the product of the present invention is used, and are used only for convenience in describing and simplifying the description, but do not indicate or imply that the device or element referred to must have a particular orientation, be constructed in a particular orientation, and be operated, and thus should not be construed as limiting the invention.
In the description of the present invention, it should also be noted that, unless otherwise explicitly specified or limited, the terms "disposed," "open," "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Example 1
A method for dynamically authorizing software of a protected end computer with a disconnected network in an online mode comprises the following steps:
as shown in fig. 1, in practical application, the software implementing the method of the present invention is installed on a computer in a network-disconnected environment, the software integrates a software authorization management module implementing the method of the present invention, a user completes account registration, the user initially logs in after internet registration is successful, a background system automatically generates an identification code, the user uses a third-party networking device to scan a two-dimensional code or a bar code presented in the network-disconnected computer, information carried in the two-dimensional code or the bar code is automatically associated with the identification code to determine the uniqueness of the third-party networking device, the third-party networking device is a mobile phone, the mobile phone is a portable terminal, and has wide applicability, a corresponding protected software is started on the network-disconnected computer, the software automatically generates the two-dimensional code, and the generation method of the two-dimensional code is a mature technical means in the prior art and is a public technology well known by a person skilled in the art, according to the invention, a current popular two-dimension code identification mode is adopted, the use habit of a user is met, the two-dimension code is scanned and identified by the mobile phone to obtain the authorization code, and due to the uniqueness of third-party networking equipment, other third-party equipment cannot obtain the authorization code after identifying the two-dimension code; after the mobile phone identifies the two-dimensional code or the bar code to obtain the authorization code, the authorization interface is automatically popped up after a certain time on the off-network computer, and after the authorization code is input on the authorization interface, the corresponding protected software on the off-network computer can legally run; the two-dimension code is a dynamic code, the dynamic code improves the safety, the dynamic authorization of the service type software is realized, key information such as user information, computer unique code, software running state and the like can be recorded by means of larger information capacity of the two-dimension code or the bar code, the two-dimension code is transmitted back to the authorization management system through the network, the background automatically transmits the authorization code to third-party networking equipment according to the content of the license agreement, the interaction procedure between the user and a software provider is simplified, and the software running is conveniently authorized.
When the software using authority for realizing the method is about to be limited, the software for realizing the method outputs a two-dimensional code or a bar code, a third party identifies the two-dimensional code or the bar code at the moment and obtains a new authorization code, the use limitation of the software for realizing the method can be limited by adopting charging and other modes, such as a mode of using times or using time, a diversified payment mode, dynamic payment according to the requirements of different customers, differential authorization service is provided for the customers, the waste of funds is avoided, and the development of software service industry is greatly promoted; the new authorization code is input on the authorization interface popped up on the computer with broken network, so that the software for realizing the method of the invention can be continuously used, and the corresponding protected software on the computer can be continuously protected.
Example 2
If the computer is not protected, the computer does not need to be disconnected from the internet, and the software for realizing the method of the invention can be downloaded and installed on the computer at the moment, the other steps are the same as the above embodiment, and the dynamic authorization of the software can be carried out under the condition of computer networking, and the legal operation of the corresponding protected software on the computer can be realized.
The foregoing is only a preferred embodiment of the present invention, and the present invention is not limited thereto in any way, and any simple modification, equivalent replacement and improvement made to the above embodiment within the spirit and principle of the present invention still fall within the protection scope of the present invention.

Claims (9)

1. A method for dynamically authorizing software of a protected end computer with a disconnected network in an online mode is characterized by comprising the following steps:
s1: acquiring a right;
s2: acquiring dynamic authorization information by using third-party networking equipment;
s3: the corresponding protected software on the disconnected computer is authorized through the authorization information in step S2.
2. The method for dynamically authorizing the software of the protected end computer with the disconnected network in the online manner according to the claim 1, wherein in the step S1, the software for implementing the method of the present invention is installed to the computer in the disconnected network environment, the user completes the account registration, the user initially logs in after the internet registration is successful, the background system automatically generates the identification code, the user scans the two-dimensional code or the bar code presented in the disconnected network computer by using the third-party networking device, the information carried in the two-dimensional code or the bar code is automatically associated with the identification code, and the uniqueness of the third-party networking device is determined.
3. The method according to claim 1, wherein in step S2, the corresponding protected software is started on the network-disconnected computer, the software automatically generates a two-dimensional code or barcode, and the third-party networking device recognizes the two-dimensional code or barcode in step S2 and obtains the authorization code.
4. The method according to claim 1, wherein in step S3, after the third-party networking device recognizes the two-dimensional code or barcode and obtains the authorization code, the authorization code is input on an authorization interface popped up on the network-disconnected computer, so that the corresponding protected software on the network-disconnected computer operates legally.
5. The method for dynamically authorizing software on a protected end computer that is disconnected from a network in an online manner as recited in claim 2, wherein the downloaded software integrates a software authorization management module for implementing the method of the present invention.
6. The method for dynamically authorizing the software of the protected-end computer with the disconnected network in the online manner according to claim 3, wherein the two-dimensional code or the bar code is a dynamic code, and the two-dimensional code or the bar code at least contains key information such as user information, a unique computer code, a software running state and the like.
7. The method for dynamically authorizing software on a protected end computer of a disconnected network in an online manner according to claim 1, further comprising the steps of:
s4: when the software using authority is about to be limited, the software outputs a two-dimensional code or a bar code, and a third party identifies the two-dimensional code or the bar code at the moment through networking to obtain a new authorization code;
s5: and inputting the new authorization code in the step S4 on an authorization interface popped up on the disconnected computer, so that the corresponding protected software on the computer can be continuously protected.
8. The method for dynamically authorizing software on-line to a protected end computer that is disconnected from a network according to claim 3, wherein the authorization code is a short string of characters that can be entered.
9. The method of claim 1, wherein the third-party networking device is a mobile phone or other terminal with a scanning and recognition function.
CN202010459139.8A 2020-05-27 2020-05-27 Method for dynamically authorizing software of protected end computer with disconnected network in online mode Pending CN111611553A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010459139.8A CN111611553A (en) 2020-05-27 2020-05-27 Method for dynamically authorizing software of protected end computer with disconnected network in online mode

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010459139.8A CN111611553A (en) 2020-05-27 2020-05-27 Method for dynamically authorizing software of protected end computer with disconnected network in online mode

Publications (1)

Publication Number Publication Date
CN111611553A true CN111611553A (en) 2020-09-01

Family

ID=72200462

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010459139.8A Pending CN111611553A (en) 2020-05-27 2020-05-27 Method for dynamically authorizing software of protected end computer with disconnected network in online mode

Country Status (1)

Country Link
CN (1) CN111611553A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108548271A (en) * 2018-04-17 2018-09-18 奥克斯空调股份有限公司 Air conditioning monitoring and the method and system of debugging software mandate
CN109086575A (en) * 2018-07-26 2018-12-25 郑州云海信息技术有限公司 A kind of authorization method and system of software license

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108548271A (en) * 2018-04-17 2018-09-18 奥克斯空调股份有限公司 Air conditioning monitoring and the method and system of debugging software mandate
CN109086575A (en) * 2018-07-26 2018-12-25 郑州云海信息技术有限公司 A kind of authorization method and system of software license

Similar Documents

Publication Publication Date Title
CN100433617C (en) System and method for facilitating electronic financial transactions using a mobile telecommunications device
US10049360B2 (en) Secure communication of payment information to merchants using a verification token
US7319987B1 (en) Tokenless financial access system
US6366682B1 (en) Tokenless electronic transaction system
US7558407B2 (en) Tokenless electronic transaction system
CN1279498C (en) Code identification method and system
US6154879A (en) Tokenless biometric ATM access system
US20220021768A1 (en) Certification and activation of used phones on a wireless carrier network
US20030055738A1 (en) Method and system for effecting an electronic transaction
EP2043036B1 (en) System, method and device for enabling interaction with dynamic security
WO2002073483A1 (en) Electronic money settlement method using mobile communication terminal
KR20030034061A (en) External device and authentication system
JP2002352166A (en) System and terminal for authenticating credit card
JP2007527059A (en) User and method and apparatus for authentication of communications received from a computer system
EA011546B1 (en) System and method for making cashless payments
WO1999031621A1 (en) Tokenless financial access system
US20020156728A1 (en) Method and arrangement for the transmission of an electronic sum of money from a credit reserve by wap
EP3096274A2 (en) Secure transaction system
CN111611553A (en) Method for dynamically authorizing software of protected end computer with disconnected network in online mode
CN113706137B (en) Data processing method and system applied to payment information
CN113743938A (en) Personal credit investigation information query method and device
CN111159673A (en) Identity information verification method, device and equipment
CN117714201A (en) Application program login method, device, terminal and storage medium
CN115063910A (en) Online locking and unlocking method, dynamic coded lock, system and storage medium
WO2004079676A1 (en) Secure transaction system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200901