CN1378172A - System and method for protecting soft ware by storage card - Google Patents

System and method for protecting soft ware by storage card Download PDF

Info

Publication number
CN1378172A
CN1378172A CN01112153A CN01112153A CN1378172A CN 1378172 A CN1378172 A CN 1378172A CN 01112153 A CN01112153 A CN 01112153A CN 01112153 A CN01112153 A CN 01112153A CN 1378172 A CN1378172 A CN 1378172A
Authority
CN
China
Prior art keywords
storage card
identifying information
software
user
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN01112153A
Other languages
Chinese (zh)
Other versions
CN1202492C (en
Inventor
周忠信
吴宗锡
袁贤铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Damaijia Science and Technology Co., Ltd.
Soft Touchplus information Corp
Original Assignee
Soft Touchplus Information Corp
DAMAIJIA SCIENCE AND TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Soft Touchplus Information Corp, DAMAIJIA SCIENCE AND TECHNOLOGY Co Ltd filed Critical Soft Touchplus Information Corp
Priority to CNB01112153XA priority Critical patent/CN1202492C/en
Publication of CN1378172A publication Critical patent/CN1378172A/en
Application granted granted Critical
Publication of CN1202492C publication Critical patent/CN1202492C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

The storage card system for protecting software includes receiving module to receive the input user identifying information; network state detecting module to detect the connection state of network and judge whether the system can be connected to server via network; server registering module to call the register function from the server via network, register in server and read from the server the stored third identifying information; and right managing module to open the software use right to the user. The present invention also discloses the software protecting method of the said system.

Description

Protect the System and method for of software with storage card
The present invention relates to a kind of System and method for of protecting software, particularly a kind of while cooperates with storage card and server, use confirm user's authority protect the System and method for of software with storage card.
Because network has the advantages that fast, the long-range line price of speed is lower and personal information or service can immediately be provided at different users's demand, therefore along with network technology development, the activity that the utilization network carries out various commerce has become a new trend.
Provide in the pattern of service at the various utilization computers and the network technology, have a kind of for businessman can be via the Internet earlier with software download to the employed user computer of user, the user is after paying, can within one section term of life, use this software, and via the Internet and business server line, to obtain the relevant data of software therewith.After term of life expired, the user promptly lost the authority of using this software, then needed to pay once more if desire continues to use.So, via the pattern of above-mentioned similar software resource lease, the user can reduce purchase and the required cost of maintenance software voluntarily significantly.And for businessman, owing to most computing can be carried out at user computer, so the load of businessman's end server can reduce significantly.
Yet,, must set up the protection mechanism of software earlier if want to use network to carry out above-mentioned business.When the user wants whether the user must can differentiate in businessman can use this software, that is whether the user has paid to obtain the authority of use software when user computer uses the software that businessman provides.
In the known technology, businessman protects it to offer user's software mostly so that the mode of authorization code to be provided.That is after user charge, businessman promptly provides user's one authorization code to the user, and the user just can obtain and use the software that businessman provided after the input authorization code.If the user uses the time of software to expire, then must pay once more, to obtain new authorization code to businessman.
Yet the shortcoming of the known guard method of this kind is that the server of businessman's end can't be confirmed action with the computer of user's end, and also have the method that cracks for the mode of protecting software with authorization code now when each user want to use software.So, once authorization code is cracked, the user can with software copy at the most the platform computer use, cause the right of businessman to be subjected to encroaching on significantly reduction with profit.
At the problems referred to above, purpose of the present invention is protected the System and method for of software for providing a kind of with storage card, and it can prevent effectively that unpaid user from continuing to use software.
Another object of the present invention is protected the System and method for of software for providing a kind of with storage card, and it can significantly promote the convenience in the use.
For achieving the above object, protect the system of software to comprise that a receiver module, a network state detection module, a server login a module and an authority management module with storage card according to of the present invention.Receiver module receives the user that the user imported and imports identifying information.The network state detection module detects the connection state of network, protects the system of software whether can carry out line via network and server to differentiate with storage card.Server is logined module and is met first identifying information that storage card is stored when the user imports identifying information; and when protecting the system of software to carry out line via network and server with storage card; be stored in the function of logining of server via calling network, to login server and to read in the server the 3rd identifying information of being stored.Then when the 3rd identifying information met second identifying information that storage card stores, the rights of using of open software were given the user to authority management module.
According to an example of the present invention, when the system that protects software with storage card can't carry out line via network and server, off-line administration module service time promptly began to calculate the off-line service time that the user can use this software.When importing identifying information, the user meets this first identifying information that storage card is stored; protect the system of software to carry out line with storage card via network and server; and when the 3rd identifying information met second identifying information that storage card stores, the off-line of being stored on the storage card promptly was reset service time.
According to another example of the present invention; storage card is also stored a valid period; and, the user meets first identifying information that storage card is stored when importing identifying information; protect the system of software to carry out line with storage card via network and server; and when the 3rd identifying information met second identifying information that storage card stores, aforesaid valid period will reset according to user's Account Data that server is stored.
It is a kind of according to the method for protecting software with storage card of the present invention that the present invention also provides.The user that reception one user of the method elder generation is imported imports identifying information, and detects the connection state of network, holds computer system whether can carry out line via network and server to differentiate the user.When importing identifying information, the user meets first identifying information that storage card is stored, and when the user holds computer system to carry out line via network and server, be stored in one of server via calling network and login function, to login server and to read in the server the 3rd identifying information of being stored.When the 3rd identifying information met second identifying information that storage card stores, the rights of using of software are promptly open gave the user.
Because when carrying out the authentication of software license limit, the System and method for of software of protecting with storage card according to the present invention carries out double authentication with storage card and remote server, can prevent effectively that therefore unpaid user from continuing to use software.
Protect the system of software according to of the present invention with storage card,, therefore can prevent user's the stolen situation generation of authority effectively because when storage card is removed, the user promptly loses the rights of using of software.For example, when the user thinks when away from keyboard, only need take away storage card, other people promptly can't usurp its account number, so can avoid in the known technology, and if user forget from software withdraws from, the then danger that can be usurped by follow-up other user of its account number.
Protect the System and method for of software according to of the present invention with storage card, when network outage, the user still can continue to use a period of time, so significantly promoted the convenience that uses.
Protect the System and method for of software according to of the present invention with storage card, when the network recovery line, valid period and the off-line service time of system on can the self-verifying storage card, and set again.So, user's authority valid period and off-line all can automatically carry out upgrading on the line service time, have significantly promoted the convenience that the user uses software.
Fig. 1 is a synoptic diagram, shows to protect the structure of the system of software according to the preferred embodiment of the present invention with storage card;
Fig. 2 (A) is a synoptic diagram, shows the data that storage card is stored;
Fig. 2 (B) is a synoptic diagram, the data that display server is stored;
Fig. 3 is a process flow diagram, shows the flow process of protecting the method for software according to the preferred embodiment of the invention with storage card; With
Fig. 4 is a process flow diagram, is presented at according to the preferred embodiment of the invention to protect in the method for software with storage card, upgrades date of expiration on the smart card or the flow process of off-line service time.
The drawing reference numeral explanation
1 protects system's 28 interim authorization codes of software with storage card
11 receiver modules 3 are protected the method for software with storage card
12 network state detection modules 301~307 are protected software with storage card
13 servers are logined the step of the method for module
14 authority management modules 401~406 upgrade term of life or off-line
The step of 2 storage card service times
21 first identifying informations, 5 storage card information read devices
211 Personal Identification Numbers, 6 users
22 second identifying informations, 7 softwares
221 card numbers, 8 servers
222 sequence numbers, 81 user's Account Datas
Login module 23 off-line service times 82
24 valid period 83 the 3rd identifying information
25 off-line administration module service time 831 users login card number
26 valid period administration module 832 users login sequence number
27 authorization codes, 9 networks
Hereinafter with reference to relevant drawings, the System and method for of protecting software according to the preferred embodiment of the invention with storage card is described, wherein components identical will be illustrated with identical label.
Please refer to Fig. 1, in a preferred embodiment of the invention, protect the system 1 of software to comprise that a receiver module 11, a network state detection module 12, a server login a module 13 and an authority management module 14 with storage card.Receiver module 11 receives the user that the user imported and imports identifying information.Network state detection module 12 detects the connection state of network 9, protects the system 1 of software whether can carry out line via network 9 and server 8 to differentiate this with storage card.When the system 1 that protects software with storage card can be via network 9 during with server 8 lines, what server logined that module 13 promptly can be via calling network server 8 logins function to login server 8.The rights of using that 14 of authority management modules are in charge of user 6 for software 7.
In the present embodiment; protecting the system 1 of software to be applied to a user with storage card holds in the computer system; this user holds computer system to comprise a CPU (central processing unit) at least; one computer-readable is got memory storage; carry out the necessary relevant apparatus of line with network; and other finish its function the peripherals that should possess, as input equipments such as keyboard and mouse etc., and write down or transmission information with electric signal each other with concrete physical quantity.Above-mentioned receiver module 11, network state detection module 12, server are logined module 13 and authority management module 14 and are got software module in the memory storage for being stored in computer-readable, after it reads via CPU (central processing unit), can reach its function via the running of related hardware and the transmission of electric signal.
Protect the system 1 of software to cooperate with storage card, to read institute's canned data in the storage card 2 with a storage card information read device 5.In the present embodiment, storage card information read device 5 can adopt RS232, PCMCIA, PS/2 or any public interface to carry out signal with the system 1 that protects software with storage card to be connected.In addition, storage card information read device 5 can adopt the mode of contact, is in contact with one another the access action that carries out data with contact and storage card 2, or carries out the exchanges data of wireless type by infrared ray and storage card 2.Those of ordinary skills can select different enforcement means according to the situation or the demand of reality.
Software 7 can be any data slot, for example, but is not limited only to Enterprise Resources Planning software, mapping software, CAD software or document data etc.
Server 8 is webservers that are connected with network, it comprises a CPU (central processing unit) at least, one computer-readable is got memory storage, carry out the necessary relevant apparatus of line with network, and other finish its function the peripherals that should possess, and write down or transmission information with electric signal each other with concrete physical quantity.Foregoing is that those of ordinary skills institute can be unlabored, so locate no longer to be given unnecessary details.
Network 9 can be any communication and connects, and for example, but is not limited only to the Internet, LAN (Local Area Network), broadband network or wireless communication networks etc.
Please refer to Fig. 2 (A), in the present embodiment, storage card 2 is one to be provided with the smart card (smart card) of integrated circuit (IC) chip, and it stores first identifying information 21, second identifying information 22, off-line service time 23 and valid period 24 etc.Wherein, first identifying information 21 can comprise that 22 of 211, the second identifying informations of a PIN (personal identification number, Personal Identification Number) comprise for example card number 221 and sequence number 222 etc.In addition, storage card 2 remains and has stored up authorization code 27 and interim authorization code 28, and wherein authorization code 27 rights of using that can open software 7 are given user 6, and 28 of interim authorization codes can be in a specified time, and the rights of using of open software 7 are given user 6.Be noted that, those of ordinary skills are the situation of visual reality also, can make an amendment to first identifying information 21 and second identifying information, 22 contents, for example first identifying information 21 and second identifying information 22 can be PIN code, or have the data of identification identity function for other.
Present embodiment is with the reason of smart card as storage card, and for the privacy mechanism of smart card is the encryption mechanism that international organization authenticates, it has encryption technology and cracks advantages such as difficulty and transreplication not.Yet those of ordinary skills can adopt other card with data accumulating function to be used as storage card 2, and do not exceed spirit of the present invention and scope.
Owing to be used as storage card 2 with smart card, so storage card 2 except can storing data, has still possessed the module that can carry out specific function with integrated circuit (IC) chip.For example, in the present embodiment, storage card 2 promptly comprise off-line administration module service time 25 and one valid period administration module 26, with management and off-line service time 23 and the valid period 24 set on the storage card.Above-mentioned two administration modules can be stored in ROM (the read-only memory of integrated circuit (IC) chip, ROM (read-only memory)) or EEPROM (electrical erasable programmable ROM, Electrically Erasable Read Only Memory) in, electronic installation for other is called out, and with the microprocessor in the integrated circuit (IC) chip (micro processor) carry out off-line administration module service time 25 with valid period administration module 26 to realize its function.
Please refer to Fig. 2 (B), in the present embodiment, server 8 stores user's Account Data 81, logins module 82 and the 3rd identifying information 83.Wherein user's Account Data 81 can comprise for example users' 6 such as user's name, code and Email individual master data, and as for the record data of paying time, payment amount and the software term of life etc. of software 7.Logining module 82 can be one and provides the user to login the interface, allow the user can be behind input code name and password, can login ASP (active server page to server 8, active server page) program module, or can login the program module of action automatically according to specific identifying information.Those of ordinary skills can change according to the situation or the demand of reality.83 of the 3rd identifying informations comprise that for example the user logins card number 831 and the user logins sequence number 832 etc.
Hereinafter with reference to relevant drawings, further specify and protect the system 1 of software to protect the method for software with storage card according to the preferred embodiment of the present invention.
Please refer to Fig. 3 (A), according to the preferred embodiment of the present invention protect the method 3 of software carry out step 301 earlier with storage card, receive the user that users 6 are imported with receiver module 11 and import identifying information.In this step 301, aforesaid receiver module 11 can receive the user that keyboard that user 6 utilizes computer apparatus imports and import identifying information.If storage card information read device 5 is provided with key groups, then receiver module 11 also can receive the user that user 6 utilizes this key groups to import and import identifying information.Yet those of ordinary skills can carry out various modifications to receiver module 11, to meet the different needs, for example, can adopt a voice identification module to be used as receiver module 11, be converted to electric signal, and then obtain the user and import identifying information with sound with the user.
Then carry out step 302, to judge that the user imports identifying information and whether conforms to first identifying information 21 on the storage card 2.Whether for example, if user 6 is utilization numerical keys on the computor-keyboard to be imported the user and import identifying information, then step 302 can be judged a succession of numeral that user 6 is imported, identical with Personal Identification Number 211 in first identifying information 21.If the step 301 of then getting back to inequality asks the user to re-enter, if the identical next step 303 that then enters.
Step 303 detects the connection state of networks with network state detection module 12, and with server 8 lines.Step 304 item is differentiated at whether carrying out line with server 8.For example, send the IP address of a package, and the response of waiting for server 8 to server 8 by the UNIX common program of carrying out the ping agreement, with test whether can with server 8 lines.After the differentiation of step 304, if can with server 8 lines, then enter step 305, if can't with server 8 lines, then enter step 311, obtaining an interim authorization code 28, and in step 312, with the rights of using of interim authorization code 28 opening softwares 7.
In step 305, server is logined module 13 and is called out to be stored in and login module 82 in the server 8, to login server 8 to read the 3rd identifying information 83.As previously mentioned, login module 82 and can be an ASP program module, or can login the program module of action automatically according to specific identifying information.If the ASP program module, then user 6 must input for example user's code name and password etc., with the action of importing.If login the program module of action automatically, then it can foundation, for example, logins first identifying information that module 13 is transmitted by server, the action of logining automatically.
After logining successfully, step 306 judges whether second identifying information of storing 22 conforms on the 3rd identifying information 83 that server 8 reads and storage card 2.For example, in the present embodiment, the card number 221 that step 306 is relatively stored on the storage card 2 and sequence number 222 whether respectively with server 8 in the user that stored login card number 831 and user to login sequence number 832 identical.If inequality, then enter step 317, refusal user 6 uses software 7.If identical, then enter next step, i.e. step 307.
In step 307, storage card information read device 5 reads an authorization code from storage card 2, and in step 308, gives user 6 with the rights of using of the open software 7 of this authorization code, allows user 6 be used software 7.Relevantly grant the part of user's software license limit with authorization code, owing to be well known to those of ordinary skill in the art, so locate and will not give unnecessary details.
In the present embodiment, after user 6 obtains the rights of using of software 7, except user 6 initiatively withdraws from software 7, still there are two kinds of situations can allow the user lose the authority of using software 7, a kind of is and the network connectivity interruption of server 8 that another kind then is removed for storage card 2 or the user withdraws from software 7.Below describe these two kinds of situations in detail.
In step 309, interrupt as if network connectivity with server 8, then can enter step 313, calculate the off-line service time that the user can use software.In this step, aforesaid off-line administration module service time 25 can be in the time can't carrying out line via network 9 and server 8, begin to calculate user 6 and can use off-line service time 23 of software 7, and look actual needs, be recorded in the storage card 2 this off-line service time 23.Off-line administration module service time 25 calculates the action of off-line service time 23, can be caused by aforesaid network state detection module 12.That is, find promptly to call out off-line administration module service time 25 can't be with server 8 lines the time when network state detection module 12, begin to calculate off-line service time 23.
Except step 309, aforesaid step 312 also then carry out step 313 after finishing.Both difference are, if proceed to step 313, have before the expression successfully and server 8 line mistakes by step 309, and if proceed to step 313 by step 312, then expression from the beginning can't with server 8 lines.Yet in the present embodiment, no matter be above-mentioned any situation, user 6 all can be during certain within, obtain the rights of using of software 7.The benefit of this kind mechanism has following 2 points.At first, can be considered the one section on probation period of user 6 for software 7 off-line service time 23, make its can on probation satisfied after, paying becomes formal member again; If the user is not intended to pay,, also can't uses up the back and continue to use software 7 in the time on probation even then user 6 holds storage card 2.Moreover even network 9 is because some force majeure can't operate, therefore user 6 can can't not use software 7 yet.When network outage, user 6 still can continue to use software 7 within limited off-line service time 23, and utilizes the work that this section period files or back up.So, can take into account businessman and user's security and convenience.
If in step 310 and step 315, storage card 2 is removed or user 6 withdraws from software 7, or in step 314, be zero off-line service time 23, then enters step 316, stops the rights of using of user 6 for software 7.
Please refer to Fig. 4, is under the state of normally line at network, and user 6 can directly utilize network 9 and server 8 to carry out the more new element of the data of storing on the storage card 2.At first, in step 401, the user that receiver module 11 reception users 6 are imported imports identifying information.Then carry out step 402, to judge that the user imports identifying information and whether conforms to first identifying information 21 on the storage card 2.If the step 401 of then getting back to inequality please user 6 be re-entered, if the identical next step 403 that then enters.
In step 403, server is logined module 13 and is called out to be stored in and login module 82 in the server 8, to login server 8 and to read the 3rd identifying information 83.Then step 404 judges whether second identifying information of storing 22 conforms on the 3rd identifying information 83 that server 8 reads and storage card 2.If inequality, then enter step 406, refusal user 6 uses software 7.If identical, then enter step 405, to carry out off-line service time 23 on the storage card 2 or the renewal of valid period 24.
In step 405, because user 6 identity has been passed through the double acknowledge of storage card 2 and server 8, so authority management module 14 can be called out off-line administration module service time 25, off-line service time 23 of being stored with updated stored card 2, or calling valid period administration module 26, reset the valid period 24 that storage card 2 is stored with user's Account Data 81 of being stored according to server 8.
The person of noting, in the present embodiment, as previously mentioned, owing to be used as storage card 2 with smart card, itself promptly has the ability of execution of program modules, so off-line administration module service time 25 with valid period administration module 26 all can be stored on the storage card 2, and carry out with the microprocessor that is built on the storage card 2.Yet, off-line administration module service time 25 with valid period administration module 26 also can be stored in storage card and protect in the system 1 of software.So, i.e. magnetic card that can be general, or any card that only has memory function is used as storage card 2, and is carried out management and the setting of off-line on the storage card 2 service time 23 and valid period 24 by the system 1 that protects software with storage card.
Because when the authentication of carrying out software license limit, to protect the System and method for of software with storage card be to carry out double authentication with storage card and remote server according to of the present invention, so its user that can prevent from effectively not pay continues use software.
Protect the system of software according to of the present invention with storage card,, therefore can prevent user's the stolen situation generation of authority effectively because when storage card is removed, the user promptly loses the rights of using of software.For example, when the user thinks that when away from keyboard, its need are taken away storage card, other people promptly can't usurp its account number, so can avoid in the known technology, and if user forget from software withdraws from, the then danger that can be usurped by follow-up other user of its account number.
Protect the System and method for of software according to of the present invention with storage card, when network outage, the user still can continue to use a period of time, so significantly promoted the convenience that uses.
Protect the System and method for of software according to of the present invention with storage card, when the network recovery line, valid period and the off-line service time of system on can the self-verifying storage card, and set again.So, user's authority valid period and off-line all can automatically carry out upgrading on the line service time, have significantly promoted the convenience that the user uses software.
The above only is an illustrative, but not is restrictive.Anyly do not break away from spirit of the present invention and category, and it is carried out equivalent modifications or change, all should be included in the accompanying Claim book.

Claims (42)

1. protect the system of software with storage card for one kind, cooperate with a storage card and a server, this storage card is stored one first identifying information and one second identifying information, and this server is then stored one the 3rd identifying information,
Should protect the system of software to comprise with storage card:
One receiver module receives the user that a user imported and imports identifying information;
One network state detection module, it detects the connection state of network, protects the system of software whether can carry out line via network and this server to differentiate this with storage card;
One server is logined module, when importing identifying information, this user meets this first identifying information that this storage card is stored, and in the time of should protecting the system of software to carry out line with storage card via network and this server, be stored in the function of logining of this server via calling network, to login this server and to read the 3rd identifying information of being stored in this server; And
One authority management module, when the 3rd identifying information met this second identifying information that this storage card stores, the rights of using of open software were given this user.
2. as claimed in claim 1ly protect the system of software, also comprise with storage card:
One storage card information read device can read this first identifying information and this second identifying information of this storage card storage.
3. as claimed in claim 1ly protect the system of software, wherein with storage card
This storage card is also stored off-line service time, and when this off-line was zero service time, this user promptly was terminated for the rights of using of this software.
4. as claimed in claim 3ly protect the system of software, wherein with storage card
When importing identifying information, this user meets this first identifying information that this storage card is stored; should protect the system of software to carry out line with storage card via network and this server; and when the 3rd identifying information met this second identifying information that this storage card stores, this off-line of being stored on this storage card promptly was reset service time.
5. as claimed in claim 3ly protect the system of software, also comprise with storage card:
One off-line administration module service time when this protects the system of software to carry out line via network and this server with storage card, calculates this off-line service time that this user can use this software.
6. as claimed in claim 1ly protect the system of software, wherein with storage card
This server is also stored user's Account Data;
This storage card is also stored a valid period; And
When importing identifying information, this user meets this first identifying information that this storage card is stored; should protect the system of software to carry out line with storage card via network and this server; and when the 3rd identifying information met this second identifying information that this storage card stores, this valid period will reset according to this user's Account Data that this server is stored.
7. as claimed in claim 1ly protect the system of software with storage card, wherein this first identifying information comprises a Personal Identification Number (PIN, personal identification number).
8. as claimed in claim 1ly protect the system of software with storage card, wherein this second identifying information comprises storage card numbering.
9. as claimed in claim 1ly protect the system of software with storage card, wherein this second identifying information comprises a sequence number (serial number).
10. as claimed in claim 1ly protect the system of software with storage card, wherein the 3rd identifying information comprises storage card numbering.
11. as claimed in claim 1ly protect the system of software with storage card, wherein the 3rd identifying information comprises a sequence number (serial number).
12. method of protecting software with storage card; it is applied to a user and holds computer system, and cooperates with a storage card and a server, and this storage card is stored one first identifying information and one second identifying information; this server is then stored one the 3rd identifying information
Should protect the method for software to comprise the following step with storage card:
Receive the user that a user imported and import identifying information;
Detect the connection state of network, hold computer system whether can carry out line via network and this server to differentiate this user;
When importing identifying information, this user meets this first identifying information that this storage card is stored, and when this user holds computer system to carry out line via network and this server, be stored in one of this server via calling network and login function, to login this server and to read the 3rd identifying information of being stored in this server; And
When the 3rd identifying information met this second identifying information that this storage card stores, the rights of using of open software were given this user.
13. as claimed in claim 12ly protect the method for software, wherein with storage card
It is to read this first identifying information and this second identifying information of this storage card storage with a storage card information read device that this user holds computer system.
14. as claimed in claim 12ly protect the method for software, wherein with storage card
This storage card is also stored off-line service time, and when this off-line was zero service time, this user promptly was terminated for the rights of using of this software.
15. as claimed in claim 14ly protect the method for software, also comprise with storage card:
When this user holds computer system to carry out line via network and this server, calculate this off-line service time that this user can use this software.
16. as claimed in claim 14ly protect the method for software, also comprise with storage card:
When importing identifying information, this user meets this first identifying information that this storage card is stored, this user holds computer system to carry out line via network and this server, and when the 3rd identifying information meets this second identifying information that this storage card stores, reset this off-line service time of being stored on this storage card.
17. as claimed in claim 12ly protect the method for software, wherein with storage card
This server is also stored user's Account Data;
This storage card is also stored a valid period; And
This method also comprises:
When importing identifying information, this user meets this first identifying information that this storage card is stored, this user holds computer system to carry out line via network and this server, and when the 3rd identifying information met this second identifying information that this storage card stores, user's Account Data of storing according to this server reset this valid period.
18. as claimed in claim 12ly protect the method for software with storage card, wherein this first identifying information comprises a Personal Identification Number (PIN, personal identification number).
19. as claimed in claim 12ly protect the method for software with storage card, wherein this second identifying information comprises storage card numbering.
20. as claimed in claim 12ly protect the method for software with storage card, wherein this second identifying information comprises a sequence number (serial number).
21. as claimed in claim 12ly protect the method for software with storage card, wherein the 3rd identifying information comprises storage card numbering.
22. as claimed in claim 12ly protect the method for software with storage card, wherein the 3rd identifying information comprises a sequence number (serial number).
23. a server cooperates with a storage card, holds institute's installed software on the computer apparatus to protect a user, this storage card is stored one first identifying information and one second identifying information,
This server comprises:
One computer-readable is got memory storage, stores one the 3rd identifying information; And
One logins module, accepts calling that this user holds computer apparatus logining this server and to read the 3rd identifying information of being stored in this server,
Wherein
This user holds computer apparatus calling out before this logins module, and receive the user that a user imported earlier and import identifying information, and judge that this user imports identifying information and whether meets this first identifying information that this storage card is stored,
This user holds computer apparatus after calling out this and logining module and read the 3rd identifying information, and when the 3rd identifying information met this second identifying information that this storage card stores, this user promptly obtained the rights of using of software.
24. server as claimed in claim 22, wherein
This storage card is also stored off-line service time, and when this off-line was zero service time, this user promptly was terminated for the rights of using of this software.
25. server as claimed in claim 24, wherein
When importing identifying information, this user meets this first identifying information that this storage card is stored, this user holds computer system to carry out line via network and this server, and when the 3rd identifying information met this second identifying information that this storage card stores, this off-line of being stored on this storage card promptly was reset service time.
26. server as claimed in claim 22, wherein
This server is also stored user's Account Data;
This storage card is also stored a valid period; And
When importing identifying information, this user meets this first identifying information that this storage card is stored, this user holds computer system to carry out line via network and this server, and when the 3rd identifying information met this second identifying information that this storage card stores, this valid period will reset according to user's Account Data that this server is stored.
27. server as claimed in claim 22, wherein this first identifying information comprises a Personal Identification Number (PIN, personal identification number).
28. server as claimed in claim 22, wherein this second identifying information comprises storage card numbering.
29. server as claimed in claim 22, wherein this second identifying information comprises a sequence number (serial number).
30. server as claimed in claim 22, wherein the 3rd identifying information comprises storage card numbering.
31. server as claimed in claim 22, wherein the 3rd identifying information comprises a sequence number (serial number).
32. method of protecting software with storage card; it is applied to a server, and holds computer system to cooperate with a storage card and a user, and this storage card is stored one first identifying information and one second identifying information; this server then comprises logins module and one the 3rd identifying information
Should protect the method for software to comprise the following step with storage card:
When a user who holds computer system to receive as this user imports identifying information and meets this first identifying information that this storage card stores, accept this user and hold computer system to call out this to login module, to login this server; And
Transmit the 3rd identifying information and hold computer system to this user, when the 3rd identifying information met this second identifying information that this storage card stores, the rights of using of open software were given this user.
33. as claimed in claim 31ly protect the method for software, wherein with storage card
This user holds computer system to read this first identifying information and this second identifying information of this storage card storage with a storage card information read device.
34. as claimed in claim 31ly protect the method for software, wherein with storage card
This storage card is also stored off-line service time, and when this off-line was zero service time, this user promptly was terminated for the rights of using of this software.
35. as claimed in claim 33ly protect the method for software, also comprise with storage card:
When this user holds computer system to carry out line via network and this server, calculate this off-line service time that this user can use this software.
36. as claimed in claim 33ly protect the method for software, also comprise with storage card:
When importing identifying information, this user meets this first identifying information that this storage card is stored, this user holds computer system to carry out line via network and this server, and when the 3rd identifying information meets this second identifying information that this storage card stores, reset this off-line service time of being stored on this storage card.
37. as claimed in claim 31ly protect the method for software, wherein with storage card
This server is also stored user's Account Data;
This storage card is also stored a valid period; And
This method also comprises:
When importing identifying information, this user meets this first identifying information that this storage card is stored, this user holds computer system to carry out line via network and this server, and when the 3rd identifying information met this second identifying information that this storage card stores, user's Account Data of storing according to this server reset this valid period.
38. as claimed in claim 31ly protect the method for software with storage card, wherein this first identifying information comprises a Personal Identification Number (PIN, personal identification number).
39. as claimed in claim 31ly protect the method for software with storage card, wherein this second identifying information comprises storage card numbering.
40. as claimed in claim 31ly protect the method for software with storage card, wherein this second identifying information comprises a sequence number (serial number).
41. as claimed in claim 31ly protect the method for software with storage card, wherein the 3rd identifying information comprises storage card numbering.
42. as claimed in claim 31ly protect the method for software with storage card, wherein the 3rd identifying information comprises a sequence number (serial number).
CNB01112153XA 2001-03-30 2001-03-30 System and method for protecting soft ware by storage card Expired - Fee Related CN1202492C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB01112153XA CN1202492C (en) 2001-03-30 2001-03-30 System and method for protecting soft ware by storage card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB01112153XA CN1202492C (en) 2001-03-30 2001-03-30 System and method for protecting soft ware by storage card

Publications (2)

Publication Number Publication Date
CN1378172A true CN1378172A (en) 2002-11-06
CN1202492C CN1202492C (en) 2005-05-18

Family

ID=4659205

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB01112153XA Expired - Fee Related CN1202492C (en) 2001-03-30 2001-03-30 System and method for protecting soft ware by storage card

Country Status (1)

Country Link
CN (1) CN1202492C (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102707984A (en) * 2012-04-27 2012-10-03 北京深思洛克软件技术股份有限公司 Off-line data change processing method applied in application program
CN103080946A (en) * 2010-09-16 2013-05-01 国际商业机器公司 Method, secure device, system and computer program product for securely managing files
CN110314270A (en) * 2019-04-30 2019-10-11 金脑元(武汉)医学生物科技有限公司 Insomnia treatment system and insomnia therapeutic instrument based on cloud server

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI396080B (en) * 2009-05-15 2013-05-11 Hon Hai Prec Ind Co Ltd Electronic device and method for recording on use time thereof

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103080946A (en) * 2010-09-16 2013-05-01 国际商业机器公司 Method, secure device, system and computer program product for securely managing files
US9811646B2 (en) 2010-09-16 2017-11-07 International Business Machines Corporation Method, secure device, system and computer program product for securely managing files
CN102707984A (en) * 2012-04-27 2012-10-03 北京深思洛克软件技术股份有限公司 Off-line data change processing method applied in application program
CN110314270A (en) * 2019-04-30 2019-10-11 金脑元(武汉)医学生物科技有限公司 Insomnia treatment system and insomnia therapeutic instrument based on cloud server

Also Published As

Publication number Publication date
CN1202492C (en) 2005-05-18

Similar Documents

Publication Publication Date Title
US6965881B1 (en) Digital credential usage reporting
US7395246B2 (en) Delegating digital credentials
CN101277191B (en) Non-repudiation for digital content delivery
US8997194B2 (en) Using windows authentication in a workgroup to manage application users
CN110310205B (en) Block chain data monitoring method, device, equipment and medium
EP2552079B1 (en) Server apparatus, information processing method, program, and storage medium
CN1992596A (en) User authentication device and method
CN102930199A (en) Safe machine registration in a multi-tenant subscription enviroment
US20040039705A1 (en) Distributing a software product activation key
JP2010518493A (en) Method and system for dynamically controlling access to a network
JP2002352166A (en) System and terminal for authenticating credit card
CN110929816A (en) Two-dimensional code validity control method and system
CN110838195A (en) Method for authorizing others to unlock
US20060265596A1 (en) User authentication system, storage medium that stores a user authentication program, and service equipment
EP1669833A1 (en) Method of validating a trusted computer system
US20150066766A1 (en) Secure Generation of a User Account in a Service Server
CN1202492C (en) System and method for protecting soft ware by storage card
CN110599311A (en) Resource processing method and device, electronic equipment and storage medium
TW202040385A (en) System for using device identification to identify via telecommunication server and method thereof
WO2011043557A2 (en) User authentication apparatus and ubiquitous authentication management system
JP2004362189A (en) User information circulation system
KR20010074624A (en) electronic commerce system and method using mobile phone and bar-code
EP1466227B1 (en) System and method for platform activation
US20090172770A1 (en) Method and apparatus for renting computer peripheral devices in-situ
CN1193298C (en) File protection system using storage card and its method

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: DAMAIJIA TECHNOLOGY CO., LTD. 2001.7.27; W&JSOFT

Free format text: FORMER OWNER: DAMAIJIA TECHNOLOGY CO., LTD.

Effective date: 20010727

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20010727

Applicant after: Damaijia Science and Technology Co., Ltd.

Applicant after: Soft Touchplus information Corp

Applicant before: Damaijia Science and Technology Co., Ltd.

C06 Publication
PB01 Publication
C14 Grant of patent or utility model
GR01 Patent grant
C19 Lapse of patent right due to non-payment of the annual fee
CF01 Termination of patent right due to non-payment of annual fee