CN102799836B - A kind of method that software is promoted - Google Patents

A kind of method that software is promoted Download PDF

Info

Publication number
CN102799836B
CN102799836B CN201210220976.0A CN201210220976A CN102799836B CN 102799836 B CN102799836 B CN 102799836B CN 201210220976 A CN201210220976 A CN 201210220976A CN 102799836 B CN102799836 B CN 102799836B
Authority
CN
China
Prior art keywords
software
program
promoted
recommending
recommend
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210220976.0A
Other languages
Chinese (zh)
Other versions
CN102799836A (en
Inventor
吴东辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weihai High Tech Park Operation Management Co Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201210220976.0A priority Critical patent/CN102799836B/en
Publication of CN102799836A publication Critical patent/CN102799836A/en
Application granted granted Critical
Publication of CN102799836B publication Critical patent/CN102799836B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The present invention relates to software field, a kind of method promoted more particularly to software.The object of the present invention is to provide a kind of method that software is promoted, software includes PC softwares and mobile terminal software, the technical scheme is that:Other people are recommended at least through a communication channel after running software, and meets setting quantity, soft ware authorization could be obtained, trial edition otherwise can only be run or finite number of time uses, or terminate.The beneficial effects of the invention are as follows:Software is promoted in this way, user can be made to increase at geometry quantity, and on the one hand good software obtains customer acceptance and largely uses, and so that promoted software is derived other business, such as advertising business, realizes a kind of profit model of freeware.

Description

A kind of method that software is promoted
Technical field
The present invention relates to software field, a kind of method promoted more particularly to software.
Background technology
There are many freewares, including PC softwares and mobile terminal software at present, be generally placed on website, certainly by user It is used by downloading, in particular with the development of mobile Internet, mobile terminal software is very abundant, has online software such as:Stock Market software, internet radio software, geographical location query software, game on line software, instant message applications, social software Deng;Offline software is such as:Offline play software, off-line type passenger traffic query software, antitheft mobile phone software, handset capability optimization software Deng.The object of the present invention is to provide a kind of methods that software is promoted.
Invention content
Explanation of nouns:
Encrypt generation module:It is involucrum that software, which is carried out shell processing, using compiler, forms executable code and is wrapped Shell software;The compiler includes Compilation Method and compiling parameter, and Compilation Method and compiling parameter by the software of involucrum for being made User does not show, and has encryption meaning not increasing additional encryption measures, is not excluded for additional encryption measure certainly, such as Encryption Algorithm, password authentication etc..
Encrypting module:By involucrum software, two are wrapped the executable code generated by encryption generation module and at least two The operation power and the method for operation of shell software are controlled by executable code.Encrypting module of the present invention can be understood as encrypting in discussion Connection relation.
Encryption technology of the present invention is the prior art:Existing Shell Encryption technology is soft to target with tool software Part carries out Shell Encryption(It is commonly called as " involucrum "), i.e., it is not related to the programming code explanation of target software, target software is after encryption Need decrypting process or cooperation encryption lock that could run, encryption lock is a kind of internal hardware for preserving decryption program, with encryption In lock decryption program cooperation by the target software of involucrum can normal operation, without encryption lock by the target software of involucrum just It cannot run, thus target software be protected not to be illegally used, encryption lock protection is target software, and the present invention does not make With encryption lock scheme, only the decryption program in encryption lock is transplanted out as decryption unit, make encryption proposed by the present invention Module realizes the decryption method of operation certainly at least for target software.Shell processing method may be used in the present invention, by adding Close module connects at least two softwares, and the operation of two software is made to keep restricting relation, such as:Must run simultaneously or successively Operation.The purpose software that user the uses i.e. present invention connects Core Generator software target software to be processed, and the software of generation is Software packaging, software packaging are the structure from decrypted packet in structure, and executable part is decrypted code, and enclosure part is to be added Close program.
Cipher mode can be network encryption, i.e. SaaS patterns, such as Chinese patent bulletin 201010577492.
The object of the present invention is to provide a kind of method that software is promoted, software includes PC softwares and mobile terminal software, sheet The technical solution of invention is:
Other people are recommended at least through a communication channel after running software, and meets setting quantity, could be obtained soft Part mandate, otherwise can only run trial edition or finite number of time uses, or terminate.
Embodiments of the present invention:
1, recommended program and original software program of the present invention are unified programs.
2, recommended program of the present invention forms module, carries out shell processing to original software program, i.e. original software program is transported Row switch is connected with the mandate switch that recommended program module of the present invention provides, by mandate switch control software run switch. In other words:Software is connected and composed by original program and recommended program, and recommended program is a module, and the module offer connects Mouthful.
3, a kind of recommendations is provided generate program, the recommendation generation program be it is a kind of can be by target software(Former software)It generates The tool of software with recommendation function, the recommendation, which generates program, user interface, is used for user's input parameter, so as to Generate the software with recommendation function for meeting user's requirement.
The method that a kind of software is promoted, it is characterized in that:Software is connected and composed by original program and recommended program, is recommended Program is a module.
The method that a kind of software is promoted, it is characterized in that:Recommending data storage unit is arranged in software, and recommending data is deposited Storage unit stores it has been recommended that the channel destination data crossed.
The method that a kind of software is promoted, it is characterized in that:Communication channel is such as one of under type:It is short message, mail, micro- Rich, instant messaging, other softwares.
The method that a kind of software is promoted, it is characterized in that:Software is cell phone software, and communication channel is SMS.
The method that a kind of software is promoted, it is characterized in that:Software generates Program Generating by recommending, and the recommendation generates Target software is former software of the Software Create with recommendation function by program.
The method that a kind of software is promoted, it is characterized in that:Recommend generation program to have user interface, is used for user Input parameter.
The method that a kind of software is promoted, it is characterized in that:Recommend generation program to have encryption generation module, is responsible for mesh Mark software is encrypted, and the operation of target software is made to depend on recommending module.
The present invention step be:
(1)There is mandate detecting step after running software;
(2)It provides and recommends channel interface;
(3)It extracts and sends recommendation;
(4)The return information value of channel is recommended in extraction;
(5)Recommend successfully to judge and count;
(6)Soft ware authorization.
The method that a kind of software is promoted, it is characterized in that:Step(4)It is logical that the return information value of channel is recommended in extraction The channel software interface is crossed to realize.
The method that a kind of software is promoted, it is characterized in that:Step(4)It is logical that the return information value of channel is recommended in extraction It crosses and extracts the channel user interface of software show value realization.
The method that a kind of software is promoted, it is characterized in that:Step(5)Recommend successfully to judge and count, setting is recommended Data storage cell, existing recommending data is compared in newly-increased recommending data and storage unit, if any not allowing then to recommend Or recommend failure.
Current numerous softwares are free, and especially mobile terminal software, an object of the present invention are exactly to realize freely Software realizes as advertisement interface and gets a profit that freeware is to have enough users as the key factor at advertisement interface Group, the method used here is the recommendation of user, i.e., is freely used by software is authorized by recommending to obtain, and such as setting recommends 2 People can authorize, then increase user with 2 n times side, if setting recommends 3 people that can authorize, increase user with 3 n times side, with this Analogize, is set as n and is then increased in a manner of the n times side of n.
The beneficial effects of the invention are as follows:Software is promoted in this way, user can be made to increase at geometry quantity, a side The good software in face obtains customer acceptance and largely uses, and promoted software is on the other hand allow to derive other business, such as wide Announcement business realizes a kind of profit model of freeware.
Description of the drawings
Fig. 1 is that the software of the present invention obtains the method program flow chart authorized by recommending.
Fig. 2 is recommended user's program flow diagram of the present invention.
Fig. 3 is embodiment of the present invention using recommending generation program that target software is generated software packaging.
Fig. 4 is the software packaging operation schematic diagram of the present invention.
Fig. 5 is the operation schematic diagram that the software packaging of the present invention includes encrypting module.
Specific implementation mode:
Present invention will be further explained below with reference to the attached drawings and examples.
Fig. 1 is that the software of the present invention obtains the method program flow chart authorized by recommending.
The mandate of software and operating procedure are:
101 software installations;102 running softwares;
103 authorize detection, if having authorized Y,:104 software normal operations.
103 authorize detection, if unauthorized N,:105 recommended users, recommended user can by SMS, microblogging, Mailbox, instant message applications etc.;
106 recommend to count, if meeting setting number, 107 authorize, software normal operation.
106 recommend to count, if not meeting setting number, 108 selections, selection continues 105 recommended users, or selection 109 trial editions run or terminate, and trial edition can be set as that limited number can be run.
Setting recommendation determining program, specific method are:Recommending data storage unit is set, increases recommending data newly and storage is single Have recommending data in member to be compared, fail if any recommendation or recommendation is not allowed then.
Fig. 2 is recommended user's program flow diagram of the present invention.
Step is:
201 recommended users, program execute recommended user's instruction;
202 selection channels, 203 short messages 204 are mails, microblogging, instant messaging, other soft for the mobile terminals such as mobile phone Part can be PC softwares, can also be the mobile terminal softwares such as mobile phone;
If selecting 203 short breaths, then follow the steps 207 extractions and send recommendation, recommendation includes at least software Download address and link;
If selection 204, executes 205 and log in detection, 207 steps are executed if having logged in, are held if being not logged in 206 login step of row;
208 extraction return information values, program executes the return information value for reading short breath transmission success or not, or reads mail It sends, microblogging is issued, instant messaging is sent, the return information value of other softwares, specific method:A, pass through related software interface letter Number is realized;B, the user interface show value of related software is directly read, the user interface show value, which will be related software, to be executed As a result inform that user sends the inevitable step of success or not, it is possible to soft from the user interface layer Direct Acquisition of any software Part implementing result output identification value is not influenced by window stacking.The user interface that user interface, that is, software provides is A kind of open code and instruction.
209 return information values judge, 210 are executed if success and recommends success count, and 216 are executed if failure and is recommended Failure, into 214 selections;
211 recommend to count, if meeting setting number, 213 authorize, if not meeting setting number, into 214 choosings It selects;214 selections, can select recommended user's step again, return to 201 recommended users or the operation of 215 trial editions or terminate.
Fig. 3 is embodiment of the present invention using recommending generation program that target software is generated software packaging.Recommend to generate The function of program is that target software is packaged into the software packaging with recommendation function, is a tool software, and the tool is soft Part includes at least recommending module, in addition it can which comprising encryption generation module, the tool software has user interface, provides To user's operation.Generation step is:301 recommend to generate program operation;302 addition target softwares, i.e., by the target of required packing Software is added to recommendation and generates in program;303 be selection interface, that is, recommends to generate the user interface that program provides;303 choosings Selecting interface includes:304 number settings on probation, that is, the finite number of time for allowing user to use;305 recommend number setting, i.e. setting to obtain The recommended amount that must be authorized;306 recommend channel setting, i.e., communication channel is set, including short message, mail, microblogging, instant messaging Deng;307 target software icons, the i.e. required icon of selection target software, the icon mark formed after generating software packaging, And the icon mark of the shortcut of software packaging operation or the button icon of software packaging operation identify;308 advertisements, i.e., It can recommend to generate the insertion advertisement of program user interactive interface, advertisement can be prefabricated advertisement, can also be on-line normalization Advertisement, 308 advertisements are not required, can be default;309 generate software packaging, i.e., connect recommending module and target software It connects and is bundled to together;310 are supplied to user;311 be encryption generation module, it is contemplated that it is direct that user may skip recommended program Operational objective software can be encrypted target software by encrypting module, i.e., must could open mesh by recommending module Mark the operation of software.
The recommendation, which generates program, can also use WEB or WAP service mode, that is, provide website, will recommend to generate program It is placed on website operation, user can generate required software with Website login webpage on website.
Target software is included in certain functional software that client is run or module or program, such as health consultation software, hand Machine antivirus software, geo-location service software etc.;Comprising in addition can be in the file that client shows, such as picture file, PDF File, audio-video document etc. can show in client and can make the file of client perception.
Fig. 4 is the software packaging operation schematic diagram of the present invention.Software packaging touches first when user terminal or client are run 401 operation button of hair, the operation button are located on desktop or the suitable interface of user;Then 402 recommending modules are run, are recommended Step executes module according to set requirements;Last recommending module output order starts 403 target softwares.
Fig. 5 is the operation schematic diagram that the software packaging of the present invention includes encrypting module.501 operation buttons;502 recommend mould Block;503 target softwares;504 encrypting modules;505 encipheror packets, i.e. target software and encrypting module complete program work(jointly Can, target software and encrypting module are constantly exchanged data and are passed through with the operation or target software and encrypting module that maintain program It exchanges at least once after data maintain program operation, 501 operation buttons to start and runs 502 recommending modules, recommending module output refers to It enables and starts encipheror packet 505, it is contemplated that difficulty is cracked, recommending module can export one group of instruction and start encipheror packet, into One step synchronizes recommending module output order with one group of random number and encrypting module input is enabled, i.e. instruction is necessary consistent with by enabling.
Software cryptography is existing mature technology, and specific Encryption Algorithm is exemplified below:Encryption Algorithm is unpredictable, irreversible , Encryption Algorithm a house dog program can generally be arranged in a program a number or character transformation at an integer, than One as having in one section of application program:A=Fx (3), program will obtain the value of variables A according to constant 3, can be former journey Sequence is rewritten in this way:A=Fx (DogConvert (1) -12342), then would not occur constant 3 in original program, and take with DogConvert (1) -12342, in this way, only software programming person just knows that the constant actually called is 3, and if cannot take Business device Encryption Algorithm, DogConvert functions cannot return to correct result, as a result formula A=Fx (DogConvert (1)- 12342) result also certainly will not be correct.
Another encryption method is that at least one byte section in target software is transplanted to encrypting module, and transplanting rule is by one Encryption factor controls, and encryption factor has unique key, key to be controlled by recommending module.
Programming language of the present invention can be existing any language form, such as VC++, C, Delphi, FORTRAN, Pascal,FOXPRO,Clipper,EXE ;WIN16:C,C++(Visual,C++Builder,Borland),Visual BASIC ; WIN32:C,C++(Visual, Borland), FORTRAN(LAHEY,Visual), Java, Visual BASIC,VisualFoxpro, PowerBuilder,Delphi,JavaScript,VBScript installshield, VB.net,VC.net; Linux: C,C++,Java ;Microsoft XML Web services platforms;The method of html, ASP.NET methods;Mac OS X operating systems;Mobile phone operating system:Windows Mobile, Symbian, Android, IOS, mobile phone Mac OS X operating systems etc..Especially set out is:The exploitation of android application layers can rely on java, and bottom can To be called with c, jni.
Server, client programming may be used on programming framework, control mode can also be used and use or call script journey The mode of sequence is programmed to server request method, or using cloud computing mode, i.e. SaaS patterns.
Transmission mode is based on TCP/UDP agreements or other any transmission of network modes, uses IPV4 at present, uses in the future IPV6.Symmetric cryptography, asymmetric encryption and Hash encryptions, such as DES, SSL or the side SET may be used in network transmission process Formula is encrypted.

Claims (6)

1. a kind of method that software is promoted, it is characterized in that:Recommend at least through a communication channel after encipheror packet running software To other people, and the number recommended must satisfy setting quantity, could obtain encipheror packet soft ware authorization, otherwise can only It runs trial edition or finite number of time uses, or terminate;
Encipheror packet software is connected and composed by target software original program and recommending module program;
Encipheror packet software generates Program Generating by recommending, and the recommendation, which generates program, has the generation of target software original program The encipheror packet software of recommendation function;
Recommend generation program to have encrypting module, is responsible for that target software original program is encrypted, the operation of target software is made to rely on In recommending module;
Target software and encrypting module complete program function jointly, and target software and encrypting module constantly exchange data to maintain The operation of program or target software and encrypting module maintain program to run by exchanging data at least once, run button(501) Recommending module is run after startup(502), recommending module output order startup encipheror packet(505);
Its step further includes:
1)There is mandate detecting step after running software;
2)It provides and recommends channel interface;
3)It extracts and sends recommendation;
4)The return information value of channel is recommended in extraction;
5)Recommend successfully to judge and count;
6)Soft ware authorization.
2. the method that a kind of software according to claim 1 is promoted, it is characterized in that:Step 4)The return of channel is recommended in extraction The value of information is realized by the software interface of the communication channel.
3. the method that a kind of software according to claim 1 is promoted, it is characterized in that:Step 4)The return of channel is recommended in extraction The value of information is realized by extracting the user interface of software show value of the communication channel.
4. the method that a kind of software according to claim 1 is promoted, it is characterized in that:Step 5)Recommend successfully to judge and count Recommending data storage unit is arranged in number, and existing recommending data is compared in newly-increased recommending data and storage unit, if any then Do not allow to recommend or recommend failure.
5. the method that a kind of software according to claim 1 or 2 or 3 or 4 is promoted, it is characterized in that:Recommendation channel be short message, Or mail or instant messaging.
6. the method that a kind of software according to claim 5 is promoted, it is characterized in that:Target software is cell phone software, communication Channel is SMS.
CN201210220976.0A 2012-06-29 2012-06-29 A kind of method that software is promoted Active CN102799836B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210220976.0A CN102799836B (en) 2012-06-29 2012-06-29 A kind of method that software is promoted

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210220976.0A CN102799836B (en) 2012-06-29 2012-06-29 A kind of method that software is promoted

Publications (2)

Publication Number Publication Date
CN102799836A CN102799836A (en) 2012-11-28
CN102799836B true CN102799836B (en) 2018-09-04

Family

ID=47198939

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210220976.0A Active CN102799836B (en) 2012-06-29 2012-06-29 A kind of method that software is promoted

Country Status (1)

Country Link
CN (1) CN102799836B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104424580A (en) * 2013-08-29 2015-03-18 聚游互动(北京)科技发展有限公司 Mobile application selling price confirmation method and system
CN107139211B (en) * 2017-05-26 2020-06-30 上海思依暄机器人科技股份有限公司 Cost recovery control method and device for household robot

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101464983A (en) * 2007-12-18 2009-06-24 汤溪蔚 Electronic commercial matters application method and system
CN101697538A (en) * 2009-10-21 2010-04-21 深圳市融创天下科技发展有限公司 Method for quickly spreading registration among broad community of users in network system
CN201750554U (en) * 2010-05-04 2011-02-16 浙江宇天科技股份有限公司 Business processing system
CN102130949A (en) * 2011-03-10 2011-07-20 肖智刚 User contribution-based method and system for sharing personalized digital resources

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102160072A (en) * 2008-07-16 2011-08-17 皮皮特互动有限公司 Method and system for on-line, real-time, interactive collaborative visualization

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101464983A (en) * 2007-12-18 2009-06-24 汤溪蔚 Electronic commercial matters application method and system
CN101697538A (en) * 2009-10-21 2010-04-21 深圳市融创天下科技发展有限公司 Method for quickly spreading registration among broad community of users in network system
CN201750554U (en) * 2010-05-04 2011-02-16 浙江宇天科技股份有限公司 Business processing system
CN102130949A (en) * 2011-03-10 2011-07-20 肖智刚 User contribution-based method and system for sharing personalized digital resources

Also Published As

Publication number Publication date
CN102799836A (en) 2012-11-28

Similar Documents

Publication Publication Date Title
CN105516157B (en) Network information security input system and method based on independent encryption
CN101426012B (en) Software module management device
CN106685973B (en) Remember method and device, log-in control method and the device of log-on message
US11470060B2 (en) Private exchange of encrypted data over a computer network
CN105704690B (en) The method and system of the hidden close communication of short message based on hand-set digit fingerprint authentication
CN109362074B (en) Method for h5 and server side safety communication in mixed mode APP
CN108322416B (en) Security authentication implementation method, device and system
CN107918731A (en) Method and apparatus for controlling the authority to access to open interface
CN108199847B (en) Digital security processing method, computer device, and storage medium
CN109905350A (en) A kind of data transmission method and system
CN101873331A (en) Safety authentication method and system
CN111131416A (en) Business service providing method and device, storage medium and electronic device
CN110025955B (en) Information processing method, terminal, computer-readable storage medium, and computer device
CN105721154B (en) Encryption protection method based on Android platform communication interface
CN110011950A (en) A kind of method for authenticating and device of video flowing address
CN101155028A (en) Method and system for safe login of website
CN109218334A (en) Data processing method, device, access control equipment, certificate server and system
CN113111386A (en) Privacy protection method for block chain transaction data
CN108650096A (en) A kind of industrial field bus control system
CN102799836B (en) A kind of method that software is promoted
Fahl et al. Trustsplit: usable confidentiality for social network messaging
Borselius Multi-agent system security for mobile communication
CN106453069B (en) A kind of instant communication message sends, checks, checking control method and its equipment
CN116599719A (en) User login authentication method, device, equipment and storage medium
Guo et al. Event-oriented dynamic security service for demand response in smart grid employing mobile networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20211115

Address after: 264200 No. 220, Keji Road, torch high tech Industrial Development Zone, Weihai City, Shandong Province

Patentee after: Weihai high tech Park Operation Management Co., Ltd

Address before: 226001 919, building 1, Wangfu building, No. 6, Renmin East Road, Nantong City, Jiangsu Province

Patentee before: Wu Donghui

TR01 Transfer of patent right