CN109086575A - A kind of authorization method and system of software license - Google Patents
A kind of authorization method and system of software license Download PDFInfo
- Publication number
- CN109086575A CN109086575A CN201810842176.XA CN201810842176A CN109086575A CN 109086575 A CN109086575 A CN 109086575A CN 201810842176 A CN201810842176 A CN 201810842176A CN 109086575 A CN109086575 A CN 109086575A
- Authority
- CN
- China
- Prior art keywords
- certificate
- authorization
- authorized
- license
- machine
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000013475 authorization Methods 0.000 title claims abstract description 165
- 238000000034 method Methods 0.000 title claims abstract description 44
- 238000012795 verification Methods 0.000 claims description 19
- 238000000605 extraction Methods 0.000 claims description 11
- 238000012937 correction Methods 0.000 claims description 6
- 230000001419 dependent effect Effects 0.000 abstract 1
- 238000007726 management method Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 5
- 239000000284 extract Substances 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 230000008676 import Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000005303 weighing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/105—Arrangements for software license management or administration, e.g. for managing licenses at corporate level
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
This application discloses a kind of authorization method of software license and systems, this method comprises: obtaining authorization message, then generate license certificate according to authorization message, according to license certificate generated, the content supported software is authorized.The system includes: that authorization message obtains module, certificates constructing module and authorization module three parts.By the authorization method and system of software license in the application, soft ware authorization can be flexibly carried out to authorized machine according to different, without being authorized dependent on fixed third equation.It can also be authorized according to the content that license certificate supports software by the application, be conducive to the flexibility and safety that improve soft ware authorization.
Description
Technical field
This application involves safety of computer operating system technical fields, more particularly to a kind of authorized party of software license
Method and system.
Background technique
Authorization function is that client buys most basic equity acquired when software, and software license needs during authorization
Prevent software from being usurped and being abused by enterprise or individual;After the authorization of software license is expired, software cannot continue to be used.
Therefore, reasonable licensing scheme is designed for software license, is an extremely important problem.
The authorization method of software license is usually to use an independent authorization module to realize, that is, authorize mould at present
The third equation of built-in fixation in block, authorization module pass through third party's Program Generating software license, i.e. software license.
After buying software, third party's Program Generating software license is executed, and parses authorization license, to complete software license
Authorization.
However, in current software license authorization method, due to the third equation in authorization module be it is fixed, because
For this software application when different machines, the flexibility of authorization is not high enough, and authorization is uncontrollable, to further result in software license
The safety of card is not high enough.
Summary of the invention
This application provides a kind of authorization method of software license and systems, to solve software license in the prior art
Authorization it is inflexible, the not high enough problem of the safety of software license.
In order to solve the above-mentioned technical problem, the embodiment of the present application discloses following technical solution:
A kind of authorization method of software license, the authorization method include:
Authorization message is obtained, the authorization message includes plucking to machine characteristic code, authorized content and the certificate of authorized machine
It wants;
License certificate is generated according to the authorization message;
According to the license certificate, the content supported software is authorized.
Optionally, the method for obtaining authorization message, comprising:
Extraction machine condition code, the machine characteristic code are corresponded with to authorized machine;
Authorized content is obtained, the authorized content includes: that authorized user's name, authority property, authorization type and certificate are effective
Phase;
Hash operation is carried out using MD5 to the authorized content and carries out base64 coding, obtains certificate profile.
Optionally, the method for the extraction machine condition code, comprising:
The CPU information and network interface card information to authorized machine are extracted, the CPU information includes: the model and sequence number of CPU,
The network interface card information includes the MAC Address of the quantity and each network interface card to network interface card in authorized machine;
According to the CPU information and network interface card information, the machine characteristic code to authorized machine is determined.
It is optionally, described that license certificate is generated according to the authorization message, comprising:
Data block is constituted using the machine characteristic code, authorized content and certificate profile;
Rivest, shamir, adelman is executed to the data block, generates key pair;
Using the private key of cipher key pair, the data block is encrypted, generates license certificate.
Optionally, after generating license certificate according to the authorization message, the authorization method further include:
By parsing the license certificate, the license certificate is verified.
Optionally, described by parsing the license certificate, the license certificate is verified, comprising:
The format of the license certificate is parsed, the certificate content after machine characteristic code and authorization after obtaining authorization;
Hash operation is carried out using MD5 to the certificate content after authorization, the certificate profile after obtaining authorization;
Whether the certificate profile after judging the authorization and the certificate profile in the authorization message are consistent;
If so, determining that the license certificate is not tampered with;
Whether the machine characteristic code after judging the authorization and the machine characteristic code in the authorization message are consistent;
If so, determine with the machine characteristic code after current grant matched had been authorized to authorized machine.
Optionally, described by parsing the license certificate, the license certificate is verified, further includes:
By the way that the trial period is arranged, validity period verification is carried out to license certificate;
By verifying whether current time is greater than the last time time on probation, alternatively, whether big by verifying registion time
In current time, system time is carried out to license certificate and distorts verification.
A kind of authoring system of software license, the authoring system include:
Authorization message obtains module, and for obtaining authorization message, the authorization message includes the machine spy to authorized machine
Levy code, authorized content and certificate profile;
Certificates constructing module, for generating license certificate according to the authorization message;
Authorization module, for according to the license certificate, the content supported software to be authorized.
Optionally, the certificates constructing module includes:
Data block generation unit, for constituting data block using the machine characteristic code, authorized content and certificate profile;
Algorithm unit generates key pair for executing rivest, shamir, adelman to the data block;
Encryption unit encrypts the data block for the private key using cipher key pair, generates license certificate.
Optionally, the authoring system further include:
Correction verification module, for being verified to the license certificate by parsing the license certificate.
The technical solution that embodiments herein provides can include the following benefits:
The application provides a kind of authorization method of software license, and this method obtains authorization message first, and then basis is awarded
It weighs information and generates license certificate, further according to license certificate generated, the content supported software is authorized.By
License certificate is generated according to authorization message in the application, and in authorization message includes machine characteristic code, authorized content and card
Book extract, machine characteristic code are corresponded with to authorized machine, that is, its machine characteristic code is also not to authorized machine difference
With, therefore, the authorization method in the application is more targeted, and independent of fixed third equation, authorizes
Flexibility is higher.Due to the uniqueness of the machine characteristic code in its authorization message, so that being directed to the verifying of generated certificate more
It is accurate and controllable, therefore, it can be improved the safety of soft ware authorization.In addition, by the application license certificate to software institute
The content of support is authorized, and the authorization method is enabled to carry out permission control according to software feature, is also beneficial to improve and be awarded
The flexibility and safety of power.
The application also provides a kind of authoring system of software license, which mainly includes that authorization message obtains mould
Block, certificates constructing module and authorization module three parts.Obtaining module by authorization message, to get include machine characteristic code, is awarded
The authorization message of content and certificate profile is weighed, recycles certificates constructing module to generate license certificate according to the authorization message, most
Afterwards by authorization module, authorized according to the content that license certificate supports software.Authorization message obtains in the application
Machine characteristic code acquired in module is every to unique condition code specific to authorized machine, can be according to different wait award
Power machine and change, and be not rely on fixed third equation, therefore, using the authoring system in the application to software into
Row authorization is more flexible, and safety is higher.In addition, due in the application authorization module be according to license certificate to software
The content supported is authorized, and therefore, the application can carry out permission control according to different software features, is conducive to improve
The flexibility and safety of soft ware authorization.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not
The application can be limited.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, for those of ordinary skill in the art
Speech, without creative efforts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of flow diagram of the authorization method of software license provided by the embodiment of the present application;
Fig. 2 is a kind of structural schematic diagram of the authoring system of software license provided by the embodiment of the present application.
Specific embodiment
In order to make those skilled in the art better understand the technical solutions in the application, below in conjunction with the application reality
The attached drawing in example is applied, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described implementation
Example is merely a part but not all of the embodiments of the present application.Based on the embodiment in the application, this field is common
The application protection all should belong in technical staff's every other embodiment obtained without making creative work
Range.
Certificate verification is a part of product software, before software is run on a machine, needs an effective certificate,
After software starting, the legitimacy of certificate can be verified first.The authorization method of software license provided by the present application specifically includes that root
The generation of certificate is carried out according to authorization message, and is authorized using the content that certificate generated supports software.
The application in order to better understand explains in detail presently filed embodiment with reference to the accompanying drawing.
Referring to Fig. 1, Fig. 1 is a kind of authorization method of software license provided by the embodiment of the present application.As shown in Figure 1,
The authorization method mainly comprises the following processes:
S1: authorization message is obtained.
Authorization message is obtained first and transmits authorization information to authentication management system, authentication management system in the present embodiment
Namely certificates constructing tool.Wherein, authorization message includes machine characteristic code, authorized content and certificate profile.
Step S1 is comprised the following processes again:
S11: extraction machine condition code.
It is to wait awarding for which platform that the machine characteristic code of required extraction in authorization message, which is the current license of unique identification,
It weighs machine and generates.Extraction machine condition code namely extracts the condition code to authorized machine for needing to install software product,
Machine characteristic code is corresponded with to authorized machine.Specifically, the step of extraction machine condition code includes:
S111: the CPU information and network interface card information to authorized machine are extracted, wherein CPU information includes: the model and sequence of CPU
Row number, network interface card information include the MAC Address of the quantity and each network interface card to network interface card in authorized machine.
S112: according to the extracted CPU information of step S111 and network interface card information, the condition code to authorized machine is determined.
It is got after the CPU information of authorized machine and network interface card information, can be uniquely determined wait award by step S111
Weigh machine.Since machine characteristic code is corresponded with to authorized machine, by uniquely also can be uniquely to authorized machine
Determine that this waits for the condition code of authorized machine.It therefore, can be according to different flexible to authorized machine by step S111 and S112
It is authorized, and is authorized independent of fixed third equation, the flexibility and safety of authorization can be greatly improved.
After getting authorization message and being transmitted to authentication management system, step S12 is executed: authorized content is obtained, in authorization
Appearance includes: the information such as authorized user's name, authority property, authorization type and validity period of certificate.Authorized content namely treats authorization
The certificate content of machine Project Authorization.
In order to be subsequently generated license certificate, it is necessary first to determine that the license certificate for planning to generate is included interior
Hold, is included at least in usual authorized content: authorized user's name, authority property, authorization type and preset license certificate
Validity period information.Authorized user's name can be set according to the producer of software product, such as xx Products, authorized user's name
As xx company.Authority property is meant that, it is assumed that software shares 10 characteristics, and 5 characteristics can be authorized by treating authorized machine.It awards
Weighing type includes temporary Authorization and duly authorized.
S13: carrying out Hash operation using MD5 to authorized content and carries out base64 coding, obtains certificate profile.
After getting authorized content, using MD5 to authorized content carry out a Hash operation, then to Hash operation value into
Row base64 coding, to get certificate profile.
After step S11-S13 gets authorization message, authorization message is saved to local file, and is copied to authorization
Management system.
S2: license certificate is generated according to authorization message.
Specifically, step S2 is comprised the following processes:
S21: data block is constituted using machine characteristic code, authorized content and certificate profile.
S22: rivest, shamir, adelman is executed to data block, generates key pair.
S23: using the private key of cipher key pair, encrypting data block, generates license certificate.
In the present embodiment, license certificate is generated according to authorization message using authentication management system, authentication management system is logical
It crosses and rivest, shamir, adelman, i.e. RSA Algorithm is executed to data block, obtain key pair, then utilize the private key logarithm of cipher key pair
It is encrypted according to block, signs to realize to the local of certificate file, and then certificate can be effectively prevent to be forged, be conducive to mention
The safety of high soft ware authorization.
With continued reference to Fig. 1 it is found that after generating license certificate, step S3 is executed: according to license certificate, to software institute
The content of support is authorized.
When treating authorized machine according to license certificate in this implementation and being authorized, the content supported just for software
It is authorized, the authorization method is enabled to carry out permission control according to software feature, therefore, be conducive to improve the flexible of authorization
Property and safety.
Further, in this embodiment further including step S4: passing through after generating license certificate according to authorization message
License certificate is parsed, license certificate is verified.
Specifically, step S4 is comprised the following processes:
S41: the machine characteristic code using the format of the method parsing license certificate of base64 decryption, after obtaining authorization
With the certificate content after authorization.
S42: Hash operation is carried out using MD5 to the certificate content after authorization, the certificate profile after obtaining authorization.
This implementation carries out Hash operation using MD5 again to the certificate content after authorization, the certificate profile after obtaining authorization.
It should be noted that the Hash operation in step S42 is directed to the certificate content after authorization, the Hash operation in step S42
It is to be executed in authorized machine, and executed after base64 decryption;And the Hash operation in step S13 is directed to generate
Acquired authorized content before license, the Hash operation in step S13 be executed in authentication management system, and
It is executed before base64 encryption.Time, place and the executing subject that Hash operation executes twice are different.
S43: whether the certificate profile in certificate profile and authorization message after judging authorization is consistent.
S44: if so, determining that license certificate is not tampered with.
If the certificate profile in certificate profile and authorization message after authorization is inconsistent, determine that license certificate is usurped
Change, further progress is needed to check and handle.
By above step S42-S44, certificate content can be effectively prevent to be tampered, be conducive to further increase software and award
The safety of power.
S45: whether the machine characteristic code after judging authorization and the machine characteristic code in authorization message are consistent.
S46: if so, determine with the machine characteristic code after current grant matched had been authorized to authorized machine.
If condition code is proved to be successful, certification is issued correctly, and license certificate generated is current wait award
It comes into force in power machine.
If authorization after machine characteristic code and the machine characteristic code in authorization message it is inconsistent, determine currently wait award
Power machine is not authorized to.By step S45 and S46, can be realized feature code check, so that it is determined that current machine whether be to
Authorized machine is conducive to the accuracy for improving authorization.
Can by code come verifier condition code, such as: be added in needing the initialization page of software authorized
One section of code obtains the condition code authorized in the condition code and certificate of current machine by running the code, to complete feature
The verification of code.The wherein machine characteristic code in the condition code of current machine namely the authorization message of step S1 authorizes in certificate
Machine characteristic code after condition code namely authorization.
Further include following process in addition, being verified in step S4 to license certificate:
S47: by the way that the trial period is arranged, validity period verification is carried out to license certificate.
When treating the initial installation of authorized machine progress software, the trial period of certain period of time can be provided, this trial period
Interior to use temporary credentials, the trial period ceases to be in force automatically when importing license certificate during the trial period, that is, formal
After license certificate imports, temporary credentials can not be reused.After importing license certificate, the service life of software is automatically more
It is changed to service life defined by license certificate file, and service life defined by license certificate file is from importing
License certificate starts timing.
S48: by verifying whether current time is greater than the last time time on probation, alternatively, being by verifying registion time
It is no to be greater than current time, system time is carried out to license certificate and distorts verification.
Specifically, if current time is less than last time and tries out the time, the decision-making system time is modified;If note
The volume time is greater than current time, and also the decision-making system time is modified.If it is determined that system time is modified, then current card
Book failure, needs to import legal license certificate again, that is, return step S2 is needed to regenerate license certificate.
In conclusion using the authorization method of software license in the application, can be realized license certificate generation,
Verification and permission control to software feature in authorized machine, to improve the flexibility of soft ware authorization, safety and controllable
Property.
On the basis of embodiment shown in Fig. 1 referring to fig. 2, Fig. 2 is permitted for a kind of software provided by the embodiment of the present application
The structural schematic diagram for the authoring system that can be demonstrate,proved.As shown in Figure 2, the authoring system of the software license in the application specifically includes that
Authorization message obtains module, certificates constructing module and authorization module three parts.Wherein, authorization message obtains module and awards for obtaining
Information is weighed, acquired authorization message includes machine characteristic code, authorized content and certificate profile;Certificates constructing module is used for basis
Authorization message generates license certificate;Authorization module is used for according to license certificate, and the content supported software is awarded
Power.
Further, it includes: machine characteristic code extraction unit, certificate contents acquiring unit and card that authorization message, which obtains module,
Book extract acquiring unit.Wherein, machine characteristic code extraction unit be used for extraction machine condition code, and machine characteristic code with wait authorize
Machine corresponds;Certificate contents acquiring unit is for obtaining authorized content, and authorized content includes: authorized user's name, authorization
Characteristic, authorization type and validity period of certificate;Certificate profile acquiring unit is used to carry out Hash operation simultaneously using MD5 to certificate content
Base64 coding is carried out, certificate profile is obtained.
Certificates constructing module includes: data block generation unit, algorithm unit and encryption unit.Wherein, data block generates single
Member is for constituting data block using machine characteristic code, authorized content and certificate profile;Algorithm unit is used to execute data block non-
Symmetric encipherment algorithm generates key pair;Encryption unit is used for the private key using cipher key pair, encrypts to data block, generates
License certificate.
It further, further include having correction verification module in the authoring system of the application, correction verification module is for passing through parsing
License certificate verifies license certificate.Correction verification module includes: certificate profile acquisition after resolution unit, authorization again
Unit, the first judging unit and second judgment unit.Wherein, resolution unit is used to parse using the method for base64 decryption
The format of license certificate, the certificate content after machine characteristic code and authorization after obtaining authorization;Certificate profile obtains after authorization
Unit, for carrying out Hash operation using MD5 to the certificate content after authorization, the certificate profile after obtaining authorization;First judgement
Unit is used to judge whether the certificate profile after authorization and the certificate profile in the authorization message to be consistent, if the card after authorization
Book extract is consistent with the certificate profile in the authorization message, determines that license certificate is not tampered with, otherwise determines license
Certificate is tampered with;Second judgment unit is used to judge that the machine characteristic code after authorization to be with the machine characteristic code in authorization message
It is no consistent, if the machine characteristic code after authorization is consistent with the machine characteristic code in authorization message, after judgement and current grant
Machine characteristic code institute is matched to be had been authorized to authorized machine, otherwise determines to be matched with the machine characteristic code after current grant
It is uncommitted to authorized machine.
Trial period setting unit and system time verification unit are additionally provided in the correction verification module of the present embodiment, wherein examination
Validity period verification is carried out to license certificate for passing through the setting trial period with phase setting unit.System time verification unit,
Verify whether current time is greater than the last time time on probation for passing through, alternatively, working as by the way that whether verifying registion time is greater than
The preceding time carries out system time to license certificate and distorts verification.
The working principle and working method of the authoring system of software license, software license shown in Fig. 1 in this implementation
It has been elaborated in the authorization method of card, details are not described herein.
The above is only the specific embodiment of the application, is made skilled artisans appreciate that or realizing this Shen
Please.Various modifications to these embodiments will be apparent to one skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the application.Therefore, the application
It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one
The widest scope of cause.
Claims (10)
1. a kind of authorization method of software license, which is characterized in that the authorization method includes:
Authorization message is obtained, the authorization message includes machine characteristic code, authorized content and the certificate profile to authorized machine;
License certificate is generated according to the authorization message;
According to the license certificate, the content supported software is authorized.
2. a kind of authorization method of software license according to claim 1, which is characterized in that the acquisition authorization message
Method, comprising:
Extraction machine condition code, the machine characteristic code are corresponded with to authorized machine;
Authorized content is obtained, the authorized content includes: authorized user's name, authority property, authorization type and validity period of certificate;
Hash operation is carried out using MD5 to the authorized content and carries out base64 coding, obtains certificate profile.
3. a kind of authorization method of software license according to claim 2, which is characterized in that the extraction machine feature
The method of code, comprising:
The CPU information and network interface card information to authorized machine are extracted, the CPU information includes: the model and sequence number of CPU, described
Network interface card information includes the MAC Address of the quantity and each network interface card to network interface card in authorized machine;
According to the CPU information and network interface card information, the machine characteristic code to authorized machine is determined.
4. a kind of authorization method of software license according to claim 1, which is characterized in that described according to the authorization
Information generates l icense certificate, comprising:
Data block is constituted using the machine characteristic code, authorized content and certificate profile;
Rivest, shamir, adelman is executed to the data block, generates key pair;
Using the private key of cipher key pair, the data block is encrypted, generates l icense certificate.
5. a kind of authorization method of software license according to claim 1, which is characterized in that according to the authorization message
After generating l icense certificate, the authorization method further include:
By parsing the license certificate, the license certificate is verified.
6. a kind of authorization method of software license according to claim 5, which is characterized in that described by described in parsing
L icense certificate verifies the license certificate, comprising:
The format of the license certificate is parsed, the certificate content after machine characteristic code and authorization after obtaining authorization;
Hash operation is carried out using MD5 to the certificate content after authorization, the certificate profile after obtaining authorization;
Whether the certificate profile after judging the authorization and the certificate profile in the authorization message are consistent;
If so, determining that the license certificate is not tampered with;
Whether the machine characteristic code after judging the authorization and the machine characteristic code in the authorization message are consistent;
If so, determine with the machine characteristic code after current grant matched had been authorized to authorized machine.
7. a kind of authorization method of software license according to claim 6, which is characterized in that described by described in parsing
L icense certificate verifies the license certificate, further includes:
By the way that the trial period is arranged, validity period verification is carried out to l icense certificate;
By verifying whether current time is greater than the last time time on probation, alternatively, working as by the way that whether verifying registion time is greater than
The preceding time carries out system time to license certificate and distorts verification.
8. a kind of authoring system of software license, which is characterized in that the authoring system includes:
Authorization message obtains module, for obtaining authorization message, the authorization message include to authorized machine machine characteristic code,
Authorized content and certificate profile;
Certificates constructing module, for generating l icense certificate according to the authorization message;
Authorization module, for according to the l icense certificate, the content supported software to be authorized.
9. a kind of authoring system of software license according to claim 8, which is characterized in that the certificates constructing module
Include:
Data block generation unit, for constituting data block using the machine characteristic code, authorized content and certificate profile;
Algorithm unit generates key pair for executing rivest, shamir, adelman to the data block;
Encryption unit encrypts the data block for the private key using cipher key pair, generates license certificate.
10. a kind of authoring system of software license according to claim 8 or claim 9, which is characterized in that the authoring system
Further include:
Correction verification module, for being verified to the license certificate by parsing the license certificate.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810842176.XA CN109086575A (en) | 2018-07-26 | 2018-07-26 | A kind of authorization method and system of software license |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810842176.XA CN109086575A (en) | 2018-07-26 | 2018-07-26 | A kind of authorization method and system of software license |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109086575A true CN109086575A (en) | 2018-12-25 |
Family
ID=64831016
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810842176.XA Pending CN109086575A (en) | 2018-07-26 | 2018-07-26 | A kind of authorization method and system of software license |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109086575A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111259347A (en) * | 2020-01-19 | 2020-06-09 | 苏州浪潮智能科技有限公司 | Authorization method and device for judging machine uniqueness |
CN111460393A (en) * | 2020-03-18 | 2020-07-28 | 紫光云技术有限公司 | Method for preventing system from bypassing software license time management and control |
CN111555887A (en) * | 2020-04-26 | 2020-08-18 | 布比(北京)网络技术有限公司 | Block chain certificate compatibility processing method and device and computer storage medium |
CN111611553A (en) * | 2020-05-27 | 2020-09-01 | 杨军 | Method for dynamically authorizing software of protected end computer with disconnected network in online mode |
CN112800392A (en) * | 2021-01-28 | 2021-05-14 | 南方电网深圳数字电网研究院有限公司 | Authorization method and device based on soft certificate and storage medium |
CN113282889A (en) * | 2021-05-20 | 2021-08-20 | 上海星融汽车科技有限公司 | license authorization method, device and system |
CN113486305A (en) * | 2021-09-08 | 2021-10-08 | 深圳市信润富联数字科技有限公司 | Software License verification method and system based on filtering, intercepting and encrypting technologies |
CN113656101A (en) * | 2021-08-17 | 2021-11-16 | 成都长城开发科技有限公司 | Authorization management method, system, server and user side |
CN114629705A (en) * | 2022-03-15 | 2022-06-14 | 河南信大网御科技有限公司 | License authorization configuration method and system for mimicry system |
CN115357870A (en) * | 2022-10-20 | 2022-11-18 | 杭州比智科技有限公司 | Authorization control method and system based on software |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105224832A (en) * | 2015-10-16 | 2016-01-06 | 浪潮电子信息产业股份有限公司 | A kind of method of License authorization set management |
CN107798221A (en) * | 2017-11-16 | 2018-03-13 | 郑州云海信息技术有限公司 | A kind of licensing scheme generation system and method |
CN108200055A (en) * | 2017-12-29 | 2018-06-22 | 深圳市安佳威视信息技术有限公司 | A kind of software approach of embedded product intellectual property protection |
-
2018
- 2018-07-26 CN CN201810842176.XA patent/CN109086575A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105224832A (en) * | 2015-10-16 | 2016-01-06 | 浪潮电子信息产业股份有限公司 | A kind of method of License authorization set management |
CN107798221A (en) * | 2017-11-16 | 2018-03-13 | 郑州云海信息技术有限公司 | A kind of licensing scheme generation system and method |
CN108200055A (en) * | 2017-12-29 | 2018-06-22 | 深圳市安佳威视信息技术有限公司 | A kind of software approach of embedded product intellectual property protection |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111259347A (en) * | 2020-01-19 | 2020-06-09 | 苏州浪潮智能科技有限公司 | Authorization method and device for judging machine uniqueness |
CN111460393A (en) * | 2020-03-18 | 2020-07-28 | 紫光云技术有限公司 | Method for preventing system from bypassing software license time management and control |
CN111555887B (en) * | 2020-04-26 | 2023-08-15 | 布比(北京)网络技术有限公司 | Block chain certificate compatibility processing method, device and computer storage medium |
CN111555887A (en) * | 2020-04-26 | 2020-08-18 | 布比(北京)网络技术有限公司 | Block chain certificate compatibility processing method and device and computer storage medium |
CN111611553A (en) * | 2020-05-27 | 2020-09-01 | 杨军 | Method for dynamically authorizing software of protected end computer with disconnected network in online mode |
CN112800392A (en) * | 2021-01-28 | 2021-05-14 | 南方电网深圳数字电网研究院有限公司 | Authorization method and device based on soft certificate and storage medium |
CN113282889A (en) * | 2021-05-20 | 2021-08-20 | 上海星融汽车科技有限公司 | license authorization method, device and system |
CN113656101A (en) * | 2021-08-17 | 2021-11-16 | 成都长城开发科技有限公司 | Authorization management method, system, server and user side |
CN113486305A (en) * | 2021-09-08 | 2021-10-08 | 深圳市信润富联数字科技有限公司 | Software License verification method and system based on filtering, intercepting and encrypting technologies |
CN114629705A (en) * | 2022-03-15 | 2022-06-14 | 河南信大网御科技有限公司 | License authorization configuration method and system for mimicry system |
CN114629705B (en) * | 2022-03-15 | 2023-09-08 | 河南信大网御科技有限公司 | Method and system for license authorization configuration of mimicry system |
CN115357870A (en) * | 2022-10-20 | 2022-11-18 | 杭州比智科技有限公司 | Authorization control method and system based on software |
CN115357870B (en) * | 2022-10-20 | 2023-03-24 | 杭州比智科技有限公司 | Authorization control method and system based on software |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109086575A (en) | A kind of authorization method and system of software license | |
Johnson et al. | Intel software guard extensions: EPID provisioning and attestation services | |
CN103001936B (en) | A kind of third party's application interface authorization method and system | |
CN102170354B (en) | Account number cipher certification is concentrated to generate system | |
CN102510333B (en) | Authorization method and system | |
CN102510378B (en) | Method for logging in online game through mobile equipment | |
CN106327184A (en) | Intelligent mobile terminal payment system and intelligent mobile terminal payment method based on safe hardware isolation | |
CN102187619A (en) | Authentication system | |
CN103677892A (en) | Authorization scheme to enable special privilege mode in secure electronic control unit | |
CN101262342A (en) | Distributed authorization and validation method, device and system | |
CN106953732B (en) | Key management system and method for chip card | |
CN106302606B (en) | Across the application access method and device of one kind | |
CN112313648A (en) | Authentication system, authentication method, application providing device, authentication device, and authentication program | |
CN103679005A (en) | Method to enable development mode of a secure electronic control unit | |
CN110677376A (en) | Authentication method, related device and system and computer readable storage medium | |
WO2014187206A1 (en) | Method and system for backing up private key in electronic signature token | |
CN102364888B (en) | Setting method, setting system, terminal and authentication server for dynamic token key factor | |
CN102098162A (en) | Method for performing safety management of operation and maintenance based on security token | |
CN101969440A (en) | Software certificate generating method | |
CN106936588A (en) | A kind of trustship method, the apparatus and system of hardware controls lock | |
CN105847000A (en) | Token generation method and communication system based on same | |
CN108965342A (en) | The method for authenticating and system of request of data side's access data source | |
CN114726630A (en) | License-based information security authorization method and device, electronic equipment and medium | |
Kern et al. | Integrating privacy into the electric vehicle charging architecture | |
EP3335370B1 (en) | Enhanced obfuscation or randomization for secure product identification and verification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181225 |
|
RJ01 | Rejection of invention patent application after publication |