CN115017475A - Method for software off-line authorization - Google Patents
Method for software off-line authorization Download PDFInfo
- Publication number
- CN115017475A CN115017475A CN202210748537.0A CN202210748537A CN115017475A CN 115017475 A CN115017475 A CN 115017475A CN 202210748537 A CN202210748537 A CN 202210748537A CN 115017475 A CN115017475 A CN 115017475A
- Authority
- CN
- China
- Prior art keywords
- software
- module
- configuration file
- function
- registration code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
- G06F8/656—Updates while running
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/71—Version control; Configuration management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
本发明提供了一种软件离线授权的方法,其配置文件通过注册码导入的方式加载进软件,以此实现软件功能权限的开放,后续软件功能扩展也仅需要更新注册码而无需更新软件,其使得用户体验好,且降低了软件商的管理和维护成本。其在软件架构设计时功能时进行模块区分,且各模块功能均由外部的配置文件实现,配置文件支持自定义扩展模块功能,软件发布时安装包内不附带配置文件,配置文件在生成注册码时根据用户所需功能、权限加密并添加至注册码文件中,实现软件功能权限的开放,后续软件功能扩展仅需要更新注册码而无需更新软件。
The present invention provides a method for offline authorization of software. The configuration file is loaded into the software by importing the registration code, so as to realize the opening of the software function authority, and the subsequent software function expansion only needs to update the registration code without updating the software. The user experience is good, and the management and maintenance costs of software vendors are reduced. In the software architecture design, the functions are divided into modules, and the functions of each module are implemented by external configuration files. The configuration files support the function of custom expansion modules. The installation package does not come with configuration files when the software is released, and the configuration files are generated when the registration code is generated. At the same time, according to the functions and permissions required by the user, it is encrypted and added to the registration code file to realize the opening of software function permissions. Subsequent software function expansion only needs to update the registration code without updating the software.
Description
技术领域technical field
本发明涉及软件授权的技术领域,具体为一种软件离线授权的方法。The invention relates to the technical field of software authorization, in particular to a method for offline authorization of software.
背景技术Background technique
软件授权一般都是采用发布注册码给用户的方式来实现软件与电脑的绑定、功能权限开放及限制使用期限。Software authorization generally uses the method of issuing registration codes to users to realize the binding of software and computers, open functional rights and limit the period of use.
目前市面上软件的离线授权功能仅能支持软件和电脑的绑定及限制使用期限,对于软件功能权限的开放及扩展没有较好的控制方法,用户如果需要增加在用软件的某项功能,可能需要重新购买功能增加的软件包,用户体验不好。根据功能的不同,同一款软件被分为多种版本,软件商对软件版本管理和升级维护的成本也成倍增加了。At present, the offline authorization function of software on the market can only support the binding of software and computer and limit the use period. There is no good control method for the opening and expansion of software function permissions. If users need to add a certain function of the software they are using, they may Need to re-purchase the software package with increased functions, and the user experience is not good. According to different functions, the same software is divided into multiple versions, and the cost of software version management and upgrade and maintenance for software vendors has also increased exponentially.
发明内容SUMMARY OF THE INVENTION
针对上述问题,本发明提供了一种软件离线授权的方法,其配置文件通过注册码导入的方式加载进软件,以此实现软件功能权限的开放,后续软件功能扩展也仅需要更新注册码而无需更新软件,其使得用户体验好,且降低了软件商的管理和维护成本。In view of the above problems, the present invention provides a method for offline authorization of software. The configuration file is loaded into the software by importing the registration code, so as to realize the opening of software function rights, and subsequent software function expansion only needs to update the registration code without the need for The software is updated, which makes the user experience better and reduces the management and maintenance cost of the software vendor.
一种软件离线授权的方法,其特征在于:其在软件架构设计时功能时进行模块区分,且各模块功能均由外部的配置文件实现,配置文件支持自定义扩展模块功能,软件发布时安装包内不附带配置文件,配置文件在生成注册码时根据用户所需功能、权限加密并添加至注册码文件中,实现软件功能权限的开放,后续软件功能扩展仅需要更新注册码而无需更新软件。A method for offline authorization of software, characterized in that: it distinguishes modules when functions are used in software architecture design, and each module function is realized by an external configuration file, the configuration file supports self-defined extension module functions, and an installation package is installed when the software is released. There is no configuration file attached. The configuration file is encrypted and added to the registration code file according to the functions and permissions required by the user when the registration code is generated to realize the opening of software function permissions. Subsequent software function expansion only needs to update the registration code without updating the software.
其进一步特征在于:It is further characterized by:
软件拥有多个选配模块,每个模块内集成有若干选配子模块,每个模块内拥有对各种子模块的支持,每个模块有独立的配置文件,软件通过加载配置文件实现各个模块的功能,配置文件定义了各功能模块和各控制器的交互协议,配置文件通过增删控制器协议信息从而达到软件内功能的增减;The software has multiple optional modules, each module integrates several optional sub-modules, each module has support for various sub-modules, each module has an independent configuration file, and the software implements each module by loading the configuration file. The configuration file defines the interaction protocol between each functional module and each controller, and the configuration file can increase or decrease the functions in the software by adding or deleting the controller protocol information;
每个子模块内拥有对各个子功能的支持,每个子模块的子功能有独立的配置文件,软件通过加载配置文件实现模块中子模块的子功能的开启和关闭;Each sub-module has support for each sub-function, and the sub-function of each sub-module has an independent configuration file. The software realizes the opening and closing of the sub-function of the sub-module in the module by loading the configuration file;
用户需提供用于安装软件的电脑唯一码、功能需求、及使用时长限制以生成注册码;The user needs to provide the computer unique code for installing the software, functional requirements, and usage time limit to generate the registration code;
其中电脑唯一码由电脑主板序列号、cpu编号信息拼接后进行AES加密及base64加密后得到,所述功能需求具体为开启对应模块及模块中的对应控制器功能;The computer unique code is obtained by splicing the computer motherboard serial number and cpu number information and performing AES encryption and base64 encryption, and the functional requirements are specifically to enable the corresponding module and the corresponding controller function in the module;
注册码结构由如下部分组成:电脑唯一码、软件使用期限的起始时间、上次软件运行时间、软件使用时长、软件唯一码GUID、功能配置信息;The registration code structure consists of the following parts: the computer unique code, the start time of the software use period, the last software running time, the software use time, the software unique code GUID, and the function configuration information;
所述电脑唯一码用于检测该电脑是否与注册码匹配;所述上次软件运行时间具体为每次软件打开至关闭时进行更新,软件打开时检查当前时间是否晚于记录时间,如果早于记录时间则认为异常,软件禁止运行;The computer unique code is used to detect whether the computer matches the registration code; the last software running time is specifically updated every time the software is opened to close, and when the software is opened, check whether the current time is later than the recording time, if it is earlier than The recording time is considered abnormal, and the software is prohibited from running;
所述软件使用时长和软件使用期限的起始时间、上次软件运行时间三相组合用于限制使用时间,确保授权使用时间不超过用户所购买的时间;The three-phase combination of the software usage time, the start time of the software usage term, and the last software running time is used to limit the usage time to ensure that the authorized usage time does not exceed the time purchased by the user;
所述软件唯一码GUID由注册机自动生成的用于加密配置文件的128位长秘钥;The software unique code GUID is automatically generated by the registration machine and is used to encrypt the 128-bit long key of the configuration file;
所述功能配置信息用于管控软件功能;The function configuration information is used to manage and control software functions;
所述注册码由电脑生成,注册码生成后发送给用户通过软件提示进行导入,导入后在注册码中提取功能配置信息,以注册码中的软件唯一码GUID为秘钥进行AES及base64加密,并将加密后的内容输出为配置文件存放在软件配置文件目录中、且注册码满足如下要求后软件运行:The registration code is generated by a computer. After the registration code is generated, it is sent to the user to import through the software prompt. After the import, the function configuration information is extracted from the registration code, and the software unique code GUID in the registration code is used as the secret key to perform AES and base64 encryption. The encrypted content is output as a configuration file and stored in the software configuration file directory, and the software runs after the registration code meets the following requirements:
a软件读取的本机电脑唯一码和配置文件记录的电脑唯一码一致;a The computer unique code read by the software is consistent with the computer unique code recorded in the configuration file;
b、本机当前时间早于配置文件中软件使用期限起始时间+软件使用时长;b. The current time of the machine is earlier than the start time of the software usage period + the software usage time in the configuration file;
c、本机当前时间晚于上次软件运行时间;c. The current time of the machine is later than the last software running time;
d、软件运行后读取加密的配置文件,如解密正常则初始化各功能模块,异常则认为配置文件损坏,对应功能模块禁用。d. After the software runs, read the encrypted configuration file. If the decryption is normal, initialize each function module. If it is abnormal, the configuration file is considered damaged, and the corresponding function module is disabled.
采用本发明后,软件发布时安装包内不附带配置文件,配置文件在生成注册码时根据用户所需功能、权限加密并添加至注册码文件中,配置文件通过注册码导入的方式加载进软件,以此实现软件功能权限的开放,后续软件功能扩展也仅需要更新注册码而无需更新软件,其使得用户体验好,且降低了软件商的管理和维护成本。After adopting the present invention, the installation package does not attach a configuration file when the software is released, the configuration file is encrypted and added to the registration code file according to the functions and permissions required by the user when the registration code is generated, and the configuration file is loaded into the software by importing the registration code. , so as to realize the opening of software function permissions, and subsequent software function expansion only needs to update the registration code without updating the software, which makes the user experience better and reduces the management and maintenance costs of software vendors.
附图说明Description of drawings
图1为本发明的具体实施例的模块界面显示图一;FIG. 1 is a module interface display diagram 1 of a specific embodiment of the present invention;
图2为本发明的具体实施例的模块界面显示图二;Fig. 2 is the module interface display Fig. 2 of the specific embodiment of the present invention;
图3为本发明的具体实施例的模块界面显示图三;Fig. 3 is the module interface display Fig. 3 of the specific embodiment of the present invention;
图4为本发明的具体实施例的模块界面显示图四;Fig. 4 is the module interface display Fig. 4 of the specific embodiment of the present invention;
图5为本发明的具体实施例的模块界面显示图五;Fig. 5 is the module interface display Fig. 5 of the specific embodiment of the present invention;
图6为本发明的具体实施例的模块界面显示图六。FIG. 6 is a module interface display FIG. 6 of a specific embodiment of the present invention.
具体实施方式Detailed ways
一种软件离线授权的方法:其在软件架构设计时功能时进行模块区分,且各模块功能均由外部的配置文件实现,配置文件支持自定义扩展模块功能,软件发布时安装包内不附带配置文件,配置文件在生成注册码时根据用户所需功能、权限加密并添加至注册码文件中,实现软件功能权限的开放,后续软件功能扩展仅需要更新注册码而无需更新软件。A method for offline authorization of software: it distinguishes modules when designing software architecture, and the functions of each module are realized by external configuration files. When the registration code is generated, the configuration file is encrypted and added to the registration code file according to the functions and permissions required by the user, so as to realize the opening of software function permissions. Subsequent software function expansion only needs to update the registration code without updating the software.
软件拥有多个选配模块,每个模块内集成有若干选配子模块,每个模块内拥有对各种子模块的支持,每个模块有独立的配置文件,软件通过加载配置文件实现各个模块的功能,配置文件定义了各功能模块和各控制器的交互协议,配置文件通过增删控制器协议信息从而达到软件内功能的增减;The software has multiple optional modules, each module integrates several optional sub-modules, each module has support for various sub-modules, each module has an independent configuration file, and the software implements each module by loading the configuration file. The configuration file defines the interaction protocol between each functional module and each controller, and the configuration file can increase or decrease the functions in the software by adding or deleting the controller protocol information;
每个子模块内拥有对各个子功能的支持,每个子模块的子功能有独立的配置文件,软件通过加载配置文件实现模块中子模块的子功能的开启和关闭;Each sub-module has support for each sub-function, and the sub-function of each sub-module has an independent configuration file. The software realizes the opening and closing of the sub-function of the sub-module in the module by loading the configuration file;
用户需提供用于安装软件的电脑唯一码、功能需求、及使用时长限制以生成注册码;The user needs to provide the computer unique code for installing the software, functional requirements, and usage time limit to generate the registration code;
其中电脑唯一码由电脑主板序列号、cpu编号信息拼接后进行AES加密及base64加密后得到,功能需求具体为开启对应模块及模块中的对应控制器功能;The computer unique code is obtained by splicing the computer motherboard serial number and cpu number information after AES encryption and base64 encryption. The functional requirements are specifically to enable the corresponding module and the corresponding controller function in the module;
注册码结构由如下部分组成:电脑唯一码、软件使用期限的起始时间、上次软件运行时间、软件使用时长、软件唯一码GUID、功能配置信息;The registration code structure consists of the following parts: the computer unique code, the start time of the software use period, the last software running time, the software use time, the software unique code GUID, and the function configuration information;
电脑唯一码用于检测该电脑是否与注册码匹配;上次软件运行时间具体为每次软件打开至关闭时进行更新,软件打开时检查当前时间是否晚于记录时间,如果早于记录时间则认为异常,软件禁止运行;The computer unique code is used to detect whether the computer matches the registration code; the last software running time is specifically updated every time the software is opened to close, and when the software is opened, check whether the current time is later than the recording time, and if it is earlier than the recording time, it is considered that Abnormal, the software is prohibited from running;
软件使用时长和软件使用期限的起始时间、上次软件运行时间三相组合用于限制使用时间,确保授权使用时间不超过用户所购买的时间;The three-phase combination of the software usage time, the start time of the software usage period, and the last software running time is used to limit the usage time to ensure that the authorized usage time does not exceed the time purchased by the user;
软件唯一码GUID由注册机自动生成的用于加密配置文件的128位长秘钥;The software unique code GUID is a 128-bit long key that is automatically generated by the registration machine and used to encrypt the configuration file;
功能配置信息用于管控软件功能。Function configuration information is used to manage and control software functions.
注册码由电脑生成,注册码生成后发送给用户通过软件提示进行导入,导入后在注册码中提取功能配置信息,以注册码中的软件唯一码GUID为秘钥进行AES及base64加密,并将加密后的内容输出为配置文件存放在软件配置文件目录中、且注册码满足如下要求后软件运行:The registration code is generated by the computer. After the registration code is generated, it is sent to the user for import through the software prompt. After the import, the function configuration information is extracted from the registration code, and the GUID of the software unique code in the registration code is used as the secret key for AES and base64 encryption. The encrypted content output is that the configuration file is stored in the software configuration file directory, and the software runs after the registration code meets the following requirements:
a软件读取的本机电脑唯一码和配置文件记录的电脑唯一码一致;a The computer unique code read by the software is consistent with the computer unique code recorded in the configuration file;
b、本机当前时间早于配置文件中软件使用期限起始时间+软件使用时长;b. The current time of the machine is earlier than the start time of the software usage period + the software usage time in the configuration file;
c、本机当前时间晚于上次软件运行时间;c. The current time of the machine is later than the last software running time;
d、软件运行后读取加密的配置文件,如解密正常则初始化各功能模块,异常则认为配置文件损坏,对应功能模块禁用。d. After the software runs, read the encrypted configuration file. If the decryption is normal, initialize each function module. If it is abnormal, the configuration file is considered damaged, and the corresponding function module is disabled.
具体实施例,软件拥有A、B、C、D四个模块,每个模块拥有对应的子模块,每个子模块拥有对应的子功能,各模块内拥有对多种子模块的支持,各模块有独立的配置文件,软件通过加载配置文件实现各模块功能,配置文件定义了各功能模块与各控制器的交互协议,配置文件可以通过增删控制器协议信息以达到软件内功能的增减。In a specific embodiment, the software has four modules A, B, C, and D, each module has a corresponding sub-module, each sub-module has a corresponding sub-function, each module has support for a variety of sub-modules, and each module has independent The software realizes the functions of each module by loading the configuration file. The configuration file defines the interaction protocol between each functional module and each controller. The configuration file can increase or decrease the functions in the software by adding or deleting the controller protocol information.
以模块A为例,在配置文件有如下内容时:Taking module A as an example, when the configuration file has the following content:
软件中模块A的模块界面显示如图1、图2所示。The module interface display of module A in the software is shown in Figure 1 and Figure 2.
当需要禁用某子模块时可删除配置文件中部分配置,如删除子模块2全部功能,配置文件内容如下:When a sub-module needs to be disabled, part of the configuration in the configuration file can be deleted, such as deleting all functions of sub-module 2, the content of the configuration file is as follows:
软件中模块A模块界面显示如图3所示。The interface display of module A in the software is shown in Figure 3.
当需要禁用某子功能时,如禁用子模块1子功能1子功能1-1,配置文件内容如下:When a sub-function needs to be disabled, such as disabling sub-module 1, sub-function 1, sub-function 1-1, the content of the configuration file is as follows:
软件中模块A模块界面显示如图4所示。The interface display of module A in the software is shown in Figure 4.
当需要禁用整个子功能时,配置文件如下:When it is necessary to disable an entire sub-feature, the configuration file is as follows:
软件中模块A模块界面显示如图5所示,不存在对应的子功能选项。The interface display of module A in the software is shown in Figure 5, and there is no corresponding sub-function option.
当需要禁用整个模块A功能时,配置文件内容如下:When the entire module A function needs to be disabled, the content of the configuration file is as follows:
[[
nullnull
]]
软件中模块A模块界面显示如图6所示.模块A的界面下没有功能选项。The module interface of module A in the software is displayed as shown in Figure 6. There are no function options under the interface of module A.
其原理如下:软件发布时安装包内不附带配置文件,配置文件在生成注册码时根据用户所需功能、权限加密并添加至注册码文件中,配置文件通过注册码导入的方式加载进软件,以此实现软件功能权限的开放,后续软件功能扩展也仅需要更新注册码而无需更新软件,其使得用户体验好,且降低了软件商的管理和维护成本。。The principle is as follows: when the software is released, the installation package does not come with a configuration file. When the registration code is generated, the configuration file is encrypted and added to the registration code file according to the functions and permissions required by the user. The configuration file is loaded into the software by importing the registration code. In this way, software function rights are opened, and subsequent software function expansion only needs to update the registration code without updating the software, which provides a good user experience and reduces the management and maintenance costs of software vendors. .
对于本领域技术人员而言,显然本发明不限于上述示范性实施例的细节,而且在不背离本发明的精神或基本特征的情况下,能够以其他的具体形式实现本发明。因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本发明的范围由所附权利要求而不是上述说明限定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化囊括在本发明内。不应将权利要求中的任何附图标记视为限制所涉及的权利要求。It will be apparent to those skilled in the art that the present invention is not limited to the details of the above-described exemplary embodiments, but that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics of the invention. Therefore, the embodiments are to be regarded in all respects as illustrative and not restrictive, and the scope of the invention is to be defined by the appended claims rather than the foregoing description, which are therefore intended to fall within the scope of the claims. All changes within the meaning and scope of the equivalents of , are included in the present invention. Any reference signs in the claims shall not be construed as limiting the involved claim.
此外,应当理解,虽然本说明书按照实施方式加以描述,但并非每个实施方式仅包含一个独立的技术方案,说明书的这种叙述方式仅仅是为清楚起见,本领域技术人员应当将说明书作为一个整体,各实施例中的技术方案也可以经适当组合,形成本领域技术人员可以理解的其他实施方式。In addition, it should be understood that although this specification is described in terms of embodiments, not each embodiment only includes an independent technical solution, and this description in the specification is only for the sake of clarity, and those skilled in the art should take the specification as a whole , the technical solutions in each embodiment can also be appropriately combined to form other implementations that can be understood by those skilled in the art.
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210748537.0A CN115017475A (en) | 2022-06-29 | 2022-06-29 | Method for software off-line authorization |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210748537.0A CN115017475A (en) | 2022-06-29 | 2022-06-29 | Method for software off-line authorization |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115017475A true CN115017475A (en) | 2022-09-06 |
Family
ID=83077953
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210748537.0A Pending CN115017475A (en) | 2022-06-29 | 2022-06-29 | Method for software off-line authorization |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115017475A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008234675A (en) * | 2008-04-17 | 2008-10-02 | Cyberlink Corp | Software execution method |
CN102413129A (en) * | 2011-11-11 | 2012-04-11 | 浪潮(北京)电子信息产业有限公司 | Software system registration method and system |
CN106919810A (en) * | 2017-02-22 | 2017-07-04 | 广州广电运通金融电子股份有限公司 | Registration code generating method and device, software registration method and device |
CN113660205A (en) * | 2021-07-12 | 2021-11-16 | 浙江瑞银电子有限公司 | Software authorization code encryption method |
-
2022
- 2022-06-29 CN CN202210748537.0A patent/CN115017475A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008234675A (en) * | 2008-04-17 | 2008-10-02 | Cyberlink Corp | Software execution method |
CN102413129A (en) * | 2011-11-11 | 2012-04-11 | 浪潮(北京)电子信息产业有限公司 | Software system registration method and system |
CN106919810A (en) * | 2017-02-22 | 2017-07-04 | 广州广电运通金融电子股份有限公司 | Registration code generating method and device, software registration method and device |
CN113660205A (en) * | 2021-07-12 | 2021-11-16 | 浙江瑞银电子有限公司 | Software authorization code encryption method |
Non-Patent Citations (1)
Title |
---|
ENFOCUS: "enfocus SWITCH参考指南 2019 spring", pages 8 - 23, Retrieved from the Internet <URL:https://www.enfocus.com/manuals/UserGuide/SW/19-zhCN/pdf/switch_referenceguide.pdf> * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11178121B2 (en) | Secure software updates | |
US10489562B2 (en) | Modular software protection | |
CN109416720B (en) | Maintaining operating system secrets across resets | |
KR101190479B1 (en) | Ticket authorized secure installation and boot | |
JP4906854B2 (en) | Information processing apparatus, information recording apparatus, information processing system, program update method, program, and integrated circuit | |
US9626513B1 (en) | Trusted modular firmware update using digital certificate | |
US8874922B2 (en) | Systems and methods for multi-layered authentication/verification of trusted platform updates | |
US8621601B2 (en) | Systems for authentication for access to software development kit for a peripheral device | |
US9547757B2 (en) | User terminal, server and controlling method thereof | |
US20060168580A1 (en) | Software-management system, recording medium, and information-processing device | |
RU2388051C2 (en) | Random password, automatically generated by basic input/output (bios) system for protecting data storage device | |
US20120166781A1 (en) | Single security model in booting a computing device | |
US20090089881A1 (en) | Methods of licensing software programs and protecting them from unauthorized use | |
WO2014150478A1 (en) | System and method for managing and diagnosing a computing device equipped with unified extensible firmware interface (uefi)-compliant firmware | |
CN109804598B (en) | Method, system and computer readable medium for information processing | |
WO2005022341A2 (en) | Flash memory distribution of digital content | |
US20170237563A1 (en) | Controlled storage device access | |
JP3867188B2 (en) | Security management system and program recording medium thereof | |
WO2019237304A1 (en) | Key processing method and device | |
US20120047074A1 (en) | Methods of protecting software programs from unauthorized use | |
JP4093494B2 (en) | System and method for controlling access to confidential information | |
US20090119744A1 (en) | Device component roll back protection scheme | |
CN115017475A (en) | Method for software off-line authorization | |
US20220121748A1 (en) | Modifications to firmware functionality | |
JP2003295964A (en) | Data supply system, program and data supply method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |