CN109598104A - Soft ware authorization based on timestamp and secret authentication file protects system and method - Google Patents
Soft ware authorization based on timestamp and secret authentication file protects system and method Download PDFInfo
- Publication number
- CN109598104A CN109598104A CN201811430399.1A CN201811430399A CN109598104A CN 109598104 A CN109598104 A CN 109598104A CN 201811430399 A CN201811430399 A CN 201811430399A CN 109598104 A CN109598104 A CN 109598104A
- Authority
- CN
- China
- Prior art keywords
- module
- certificate
- authorization
- authentication
- software
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000013475 authorization Methods 0.000 title claims abstract description 80
- 238000000034 method Methods 0.000 title claims abstract description 25
- 238000004519 manufacturing process Methods 0.000 claims abstract description 14
- 238000004891 communication Methods 0.000 claims abstract description 11
- 230000003993 interaction Effects 0.000 claims abstract description 4
- 238000012986 modification Methods 0.000 claims description 5
- 230000004048 modification Effects 0.000 claims description 5
- 238000002360 preparation method Methods 0.000 claims description 4
- 239000003550 marker Substances 0.000 claims description 3
- GNFTZDOKVXKIBK-UHFFFAOYSA-N 3-(2-methoxyethoxy)benzohydrazide Chemical compound COCCOC1=CC=CC(C(=O)NN)=C1 GNFTZDOKVXKIBK-UHFFFAOYSA-N 0.000 claims description 2
- FGUUSXIOTUKUDN-IBGZPJMESA-N C1(=CC=CC=C1)N1C2=C(NC([C@H](C1)NC=1OC(=NN=1)C1=CC=CC=C1)=O)C=CC=C2 Chemical compound C1(=CC=CC=C1)N1C2=C(NC([C@H](C1)NC=1OC(=NN=1)C1=CC=CC=C1)=O)C=CC=C2 FGUUSXIOTUKUDN-IBGZPJMESA-N 0.000 claims description 2
- 238000004321 preservation Methods 0.000 claims description 2
- 238000012795 verification Methods 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 6
- 230000002155 anti-virotic effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000004438 eyesight Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/105—Arrangements for software license management or administration, e.g. for managing licenses at corporate level
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
Abstract
The invention discloses a kind of soft ware authorizations based on timestamp and secret authentication file to protect system and method, is related to computer and mobile phone operating system.This system is: production certificate module (1), authorization module (3), authentication module (2), login module (4), main control module (5) successively interact;Main control module (5) is interacted with acquisition module (6), analysis module (7), locating module (8) and display module (9) respectively;Acquisition module (6), analysis module (7), locating module (8) and display module (9) are interacted with communication module (10) respectively, communication module (10) and memory module (11) interaction.This method is: 1. generating the certificate of authority (201);2. authorization -202;3. authenticating (203).Present invention can assure that the problem of application software illegally uses in the case where without permission.
Description
Technical field
The present invention relates to computer and mobile phone operating systems more particularly to a kind of based on timestamp and secret authentication file
Soft ware authorization protects system and method.
Background technique
Existing software generic guard method, such as the office software of Jinshan anti-virus software, Microsoft etc., are all made of one
Cover the protected mode that software provides an authorization code or certificate.It is not authorized can only to cope with user for this guard method
The case where code.It is clear that the guard method of this one authorization code of a set of software binding, there are following Railway Projects:
1. user is easy to through internet authorized access code or certificate;
2. software kit, for authenticating, since authorization code or certificate are visible, is easy to solve using the authorization code or certificate of offer
It is close to crack;
3. soft ware authorization expires, after the system time for modifying machine, the software still can be used;
4. authorization code does not bind the machine code using machine, software can largely copy use.
Summary of the invention
The improving eyesight of this hair is to prevent application software unauthorized use problem, provides a kind of based on timestamp and secret
The soft ware authorization for authenticating file protects system and method.
There is the present invention the unique bound device code of the certificate of authority, the certificate of authority authentication file is separated and hidden with authentication file
The advantages that, can without software developer authorization, license the time it is overdue in the case where, the works of effective protection software
Copyright has important application value.
Realizing the technical solution of the object of the invention is:
One, system
This system includes production certificate module, authentication module, authorization module, login module, main control module, acquisition module, analysis
Module, locating module, display module, communication module and memory module;
Production certificate module, authorization module, authentication module, login module, main control module successively interact;
Main control module is interacted with acquisition module, analysis module, locating module and display module respectively;
Acquisition module, analysis module, locating module and display module are interacted with communication module respectively, communication module and memory module
Interaction.
Two, method
This method includes following scheme:
1. generating the certificate of authority
This system generates the certificate of authority by production certificate module 1;
2. authorizing
After this system palpus is authorized, it could work;
Authorization method: after authorization module reads the certificate of authority, secret authentication file is generated;
System at runtime, can access authentication file;
After certificate of authority authorization expires, it is not possible to sub-authorization again.
3. authenticating
In the starting entrance of this system software SoftWare, check whether equipment meets hiding authentication file encript and provide
Service condition, refuse to run if being unsatisfactory for;
When meeting service condition, then this system SoftWare is operated normally;
Before SoftWare is exited, current time can be obtained, after encrypted, hiding authentication file latetlyRumTime is updated
For current time, it is then log out.
The present invention has following advantages and good effect:
1. this system authority License and application software SoftWare bound device code, SoftWare copies to unauthorized
Equipment is unable to run;
2. authorize, the comparison of this system licensed software secret hiding authentication file and authority License, in hiding mirror
Weigh file it is overdue when, it is invalid that licensed software, which can modify License, so that the License after overdue can not sub-authorization again;
3. application software SoftWare operates normally backed off after random, when can modify the LatelyRunTime of hiding authentication file
Between stab;
4. user can not have found, so that modification can not be cracked since hiding authentication file is invisible;So illegal user is
Make to have modified system time, is not still available the software;
5. not needing application software increases hardware device and cost, it is simple and efficient;
In short, present invention can assure that the problem of application software illegally uses in the case where without permission.
Detailed description of the invention
Fig. 1 is the structural block diagram of this system;
In figure:
1-production certificate module;
2-authentication modules;
3-authorization modules;
4-login modules:
5-main control modules;
6-acquisition modules;
7-analysis modules;
8-locating modules;
9-display modules;
10-communication modules;
11-memory modules.
Fig. 2 is the work flow diagram of this method:
Fig. 3 is 1. work flow diagram that this method step generates certificate;
Fig. 4 is 2. work flow diagram that this method step authorizes;
Fig. 5 is 3. work flow diagram that this method step authenticates.
Specific embodiment
In conjunction with attached drawing, the embodiment of the present invention is provided and is described in detail below.
One, system
1, overall
Such as Fig. 1, this system includes production certificate module 1, authentication module 2, authorization module 3, login module 4, main control module 5, adopts
Collect module 6, analysis module 7, locating module 8, display module 9, communication module 10 and memory module 11;
Production certificate module 1, authorization module 3, authentication module 2, login module 4, main control module 5 successively interact;
Main control module 5 is interacted with acquisition module 6, analysis module 7, locating module 8 and display module 9 respectively;
Acquisition module 6, analysis module 7, locating module 8 and display module 9 are interacted with communication module 10 respectively, 10 He of communication module
The interaction of memory module 11.
User equipment can call authentication module 2 to be authenticated when attempting using application software;The discovery of authentication module 2 is set
For when there is no authorization, failed authentication can be returned;When user equipment finds with no authorized, in order to use application software
SoftWare should apply authorizing to authorized party;After authorized application, authorized party requires user equipment to provide device code, and root
Being that user equipment is determining according to concrete condition begins to use date and authorization deadline, makes the certificate of authority;Authorized party is simultaneously
User equipment provides the certificate of authority and licensed software;User equipment needs first to run licensed software reading when running application software
Taking the certificate of authority is user equipment authorization;The user equipment for obtaining authorization can star application software, after through authentication, application
Software operates normally;If authorization is overdue, it will appear failed authentication;User equipment should be applied authorizing again at this time.
2, main functional modules
1) certificate module 1 is made
The workflow for making certificate module 1 is as shown in Figure 3;
Production certificate needs to obtain 6 parameters using following a-f:
A: device code MachineID
Device code MachineID, the sequence number of hard disk, the sequence number of CPU, MAC Address of network interface card etc. can distinguish it in equipment
His equipment unique identification or mobile phone IMEI etc. can distinguish other equipment unique identification;
B: authorization time started StartTime;
C: authorization deadline EndTime;
D: last software runing time LatelyRunTime;
E: check code verfiyCode;
F: overdue marker flag.
Flag:0 is effective, and 1 is invalid.
Firstly, production certificate module generates the plaintext code of the certificate of authority using 6 parameters of above-mentioned a-f;
Secondly, production certificate module selects Encryption Algorithm Encription(to correspond to decipherment algorithm as Decription), encryption is awarded
The plaintext code of warrant book generates certificate of authority License.
2) authentication module 2
The working principle of authorization module 2 is:
A, the certificate of authority is read, checks the validity of certificate;
B, creation secret hides Paths;
C, creation secret is hidden in the authentication file encript under the path;
The authentication file is in hidden state, and store path and title (including filename and suffix name) for users can not
See.
The work flow diagram of authorization module is as indicated at 4.
3) authorization module 3
The workflow of authentication module 3 is as shown in 5 figures.
Other functional modules are common module.
Two, method
Such as Fig. 2, this method includes following scheme:
1. generating the certificate of authority -201
This system generates the certificate of authority by production certificate module 1;
2. authorization -202
After this system palpus is authorized, it could work;
Authorization method: after authorization module 3 reads the certificate of authority, secret authentication file is generated;
System at runtime, can access authentication file;
After certificate of authority authorization expires, it is not possible to sub-authorization again.
3. authentication -203
In the starting entrance of this system software SoftWare, check whether equipment meets hiding authentication file encript and provide
Service condition, refuse to run if being unsatisfactory for;
When meeting service condition, then this system SoftWare is operated normally;
Before SoftWare is exited, current time can be obtained, after encrypted, hiding authentication file latetlyRumTime is updated
For current time, it is then log out.
1,1. step generates the workflow of the certificate of authority
Such as Fig. 3, including following sub-step:
I, basic parameter -301 is inputted
Basic parameter, i.e. the device code MachineID of user's offer, authorization time started stamp StartTime, authorization cut-off are provided
Timestamp EndTime;
II, check code -302 is generated
It generates check code verfiyCode and selects certain byte structures in these three parameters according to the three of input basic parameters
At check code verfiyCode;Initializing LatelyRunTime simultaneously is StartTime value, and overdue marker flag is 0, i.e.,
Effectively;It is bright that certificate is formed according to MachineID, StartTime, EndTime, LatelyRunTime, verfiyCode and flag
Literary code;
III, certificate plaintext -303 is generated
Encryption Algorithm is selected, encrypting plaintext code generates ciphertext encode, certificate of authority License is generated, by ciphertext encode
It is written in the certificate of authority;
IV, encryption generate certificate -304
Generate certificate file.
2,2. workflow that step authorizes
Such as Fig. 4, including following sub-step:
Preparation copies licensed software and the certificate of authority on equipment A to, runs licensed software;
Start -400;
A, machine code -401 is obtained
After licensed software operation, the machineID of equipment A, the reduced value as step d are obtained;
B, certificate ciphertext -402 is read
Licensed software opens the certificate of authority, and reads the ciphertext encode1 in the certificate of authority;Call decipherment algorithm
Decription, plaintext M achineID1, StartTime1, EndTime1, LatelyRunTime1 after being decrypted,
VerfiyCode1 and flag1;
C, judge flag1-403
Judge whether flag1 is 0, is true, i.e. flag=0 if it is condition, certificate is effective, enters step d;
If condition is false, i.e. flag=1, certificate is invalid, and the certificate is overdue, therefore authorization failure-M4 and exits -413;
D, judge machine code -404
Judge whether machineID equal with MachineID1, i.e. the machineID of equipment A whether with certificate
MachineID1 is identical;
If condition is very, i.e. the authorisation device that equipment A is exactly certificate enters step e;
If condition be it is false, equipment A is illegal authorisation device, therefore authorization failure-M4 and exits -413;
E, judgement authentication file presence -405
Licensed software checks in equipment A with the presence or absence of hiding authentication file encript;
If it does, entering step g;
If it does not, entering step f;
F, creation authentication file -406
It creates and hides Paths in equipment A, and in the lower authentication file encript for generating and hiding that hides Paths, while certificate
Ciphertext is written in encript, that is, authorizes successfully-M3, then licensed software can select to exit -413;
G, authentication file -407 is read
Read hiding authentication file encript memory, and decrypt obtain in plain text, obtain MachineID2, StartTime2,
EndTime2,LatelyRunTime2,verfiyCode2;
H, current time stamp -408 is obtained
Obtain current time in system stamp now;
I, judge system time authenticity -409
Judge whether LatelyRunTime2 > now is true, i.e., the last runing time saved in the hiding authentication file of judgement
Whether stamp is greater than current time stamp;
If it is vacation, j is entered step;
If it is true, i.e., now becomes smaller, then illustrates that current system time is modified to lesser time value, belong to the time
Deception its purpose is to be authorized again, therefore cannot be such case authorization-M1, therefore authorization failure-M4, and exit-
413;
J, judge certificate validity -410
Rule of judgment startTime1 >=startTime2, endTime1 >=endTime2
And latelyRunTime1 >=latelyRunTime12 simultaneously set up it is no;The first two condition is to judge the certificate of authority
StartTime, endTime and latelyRunTime of License, if more than or equal to encript pairs hiding of authentication file
StartTime, endTime and the latelyRunTimee answered;
If it is true encript, k is entered step;
If it is vacation, l is entered step;
K, authentication file -411 is established
Meet authorising conditional, hiding authentication file is rewritten according to certificate ciphertext, authorizes successfully M3;
L, setting certificate invalid -412
If there is a condition is invalid, then the new authorization timestamp of explanation is less than the timestamp that encript is saved, then authorizes text
Part license can not give the soft ware authorization, need to be arranged mark flag=1 of license file, be invalid state;Authorization
Failure-M2 simultaneously exits -413;
M, -413 are exited
It is out of service;
N, system time cannot modify-M1
Prompt: system time cannot be modified;
O, the overdue-M2 of certificate
Prompt: certificate is overdue;
P, successfully-M3 is authorized
Prompt: it authorizes successfully;
Q, authorization failure-M4
Prompt: authorization failure.
3,3. workflow that step authenticates
When application software softWare is run, in the independent authentication module of software entry call, to the operation permission of softWare
Authentication;
Such as Fig. 5, including following sub-step:
Authenticate entrance -500
Preparation copies application software softWare on equipment A to, runs softWare, and authentication module is called;
A, -501 are obtained
Obtain the machineID0 of equipment A, the reduced value as step 303;
B, authentication file -502 is read
Read hiding authentication file encript memory, and decrypt obtain in plain text, obtain MachineID, StartTime,
EndTime, LatelyRunTime, verfiyCode and flag value;
C, judge equipment -503
Judge whether equipment is authorisation device, and whether Rule of judgment MachineID0==MachineID is true,
D is entered step if it is true;
If it is vacation, equipment is unauthorized device, returns to failed authentication-M2;
D, judge validity -504
Judge to authenticate file it is whether effective, Rule of judgment flag==it is 0 whether true, i.e. whether authentication file effective;
If it is true, E is entered step;
If it is vacation, file is invalid for authentication, returns to failed authentication-M2;
E, check code -505 is verified
Rule of judgment is whether verification verifyCode is correct;
If it is true, F is entered step;
If it is vacation, failed authentication-M2 is returned;
F, system time -506 is obtained
Obtain current time in system now;
G, judge available time -507
Rule of judgment is now > latelyRuntime whether true, that is, judges whether current time is greater than hiding authentication file
Time when the software last time operation of preservation is exited;
If it is true, H is entered step;
If it is vacation, illustrate current time than the software last time that hiding authentication file saves running time when exiting
It is small, this be it is impossible, after only system time being the false time, just can this thing happens, so, return to authentication mistake
Lose-M2;
H, judge overdue -508
Whether Rule of judgment now > endTime is true;
If it is true, I is entered step;
If it is vacation, return authenticates successfully-M2;
I, modification authentication file -509
The hiding authentication file f lag of modification is identified as 1, i.e. setting authorization is overdue;Return to failed authentication-M2;
J, successfully-M1 is authenticated
Prompt: it authenticates successfully;
L, failed authentication-M2
Prompt failed authentication.
4, it runs
It is identical as the normal software for not increasing authentication module into operation main interface after application software softWare is authenticated successfully;
When SoftWare is exited, current time can be obtained, after encrypted, hiding authentication file latetlyRumTime is updated to
Current time is then log out.
Claims (5)
1. a kind of soft ware authorization based on timestamp and secret authentication file protects system, it is characterised in that:
Including production certificate module (1), authentication module (2), authorization module (3), login module (4), main control module (5), acquisition
Module (6), analysis module (7), locating module (8), display module (9), communication module (10) and memory module (11);
Production certificate module (1), authorization module (3), authentication module (2), login module (4), main control module (5) successively interact;
Main control module (5) is interacted with acquisition module (6), analysis module (7), locating module (8) and display module (9) respectively;
Acquisition module (6), analysis module (7), locating module (8) and display module (9) are interacted with communication module (10) respectively, are led to
Interrogate module (10) and memory module (11) interaction.
2. by the soft ware authorization guard method of system described in claim 1, it is characterised in that:
1. generating the certificate of authority (201)
This system generates the certificate of authority by production certificate module (1);
2. authorization -202
After this system palpus is authorized, it could work;
Authorization method: after authorization module (3) reads the certificate of authority, secret authentication file is generated;
System at runtime, can access authentication file;
After certificate of authority authorization expires, it is not possible to sub-authorization again;
3. authenticating (203)
In the starting entrance of this system software SoftWare, check whether equipment meets hiding authentication file encript and provide
Service condition, refuse to run if being unsatisfactory for;
When meeting service condition, then this system SoftWare is operated normally;
Before SoftWare is exited, current time can be obtained, after encrypted, hiding authentication file latetlyRumTime is updated
For current time, it is then log out.
3. soft ware authorization guard method as described in claim 2, it is characterised in that:
1. the step generates the workflow of the certificate of authority:
I, basic parameter (301) are inputted
Basic parameter, i.e. the device code MachineID of user's offer, authorization time started stamp StartTime, authorization cut-off are provided
Timestamp EndTime;
II, check code (302) are generated
It generates check code verfiyCode and selects certain byte structures in these three parameters according to the three of input basic parameters
At check code verfiyCode;Initializing LatelyRunTime simultaneously is StartTime value, and overdue marker flag is 0, i.e.,
Effectively;It is bright that certificate is formed according to MachineID, StartTime, EndTime, LatelyRunTime, verfiyCode and flag
Literary code;
III, certificate is generated in plain text (303)
Encryption Algorithm is selected, encrypting plaintext code generates ciphertext encode, certificate of authority License is generated, by ciphertext encode
It is written in the certificate of authority;
IV, encryption generate certificate (304)
Generate certificate file.
4. soft ware authorization guard method as described in claim 2, it is characterised in that:
2. workflow that the step authorizes:
Preparation copies licensed software and the certificate of authority on equipment A to, runs licensed software;
Start (400);
A, machine code (401) are obtained
After licensed software operation, the machineID of equipment A, the reduced value as step d are obtained;
B, certificate ciphertext (402) are read
Licensed software opens the certificate of authority, and reads the ciphertext encode1 in the certificate of authority;Call decipherment algorithm
Decription, plaintext M achineID1, StartTime1, EndTime1, LatelyRunTime1 after being decrypted,
VerfiyCode1 and flag1;
C, judge flag1(403)
Judge whether flag1 is 0, is true, i.e. flag=0 if it is condition, certificate is effective, enters step d;
If condition is false, i.e. flag=1, certificate is invalid, and the certificate is overdue, therefore authorization failure-M4 and exits -413;
D, judge machine code (404)
Judge whether machineID equal with MachineID1, i.e. the machineID of equipment A whether with certificate
MachineID1 is identical;
If condition is very, i.e. the authorisation device that equipment A is exactly certificate enters step e;
If condition be it is false, equipment A is illegal authorisation device, therefore authorization failure-M4 and exits -413;
E, there are (405) in judgement authentication file
Licensed software checks in equipment A with the presence or absence of hiding authentication file encript;
If it does, entering step g;
If it does not, entering step f;
F, creation authentication file (406)
It creates and hides Paths in equipment A, and in the lower authentication file encript for generating and hiding that hides Paths, while certificate
Ciphertext is written in encript, that is, authorizes successfully-M3, then licensed software can select to exit -413;
G, authentication file (407) is read
Read hiding authentication file encript memory, and decrypt obtain in plain text, obtain MachineID2, StartTime2,
EndTime2,LatelyRunTime2,verfiyCode2;
H, current time stamp (408) are obtained
Obtain current time in system stamp now;
I, judge system time authenticity (409)
Judge whether LatelyRunTime2 > now is true, i.e., the last runing time saved in the hiding authentication file of judgement
Whether stamp is greater than current time stamp;
If it is vacation, j is entered step;
If it is true, i.e., now becomes smaller, then illustrates that current system time is modified to lesser time value, belong to the time
Deception its purpose is to be authorized again, therefore cannot be such case authorization (M1), therefore authorization failure (M4), and move back
(413) out;
J, judge certificate validity -410
Rule of judgment startTime1 >=startTime2, endTime1 >=endTime2
And latelyRunTime1 >=latelyRunTime12 simultaneously set up it is no;The first two condition is to judge the certificate of authority
StartTime, endTime and latelyRunTime of License, if more than or equal to encript pairs hiding of authentication file
StartTime, endTime and the latelyRunTimee answered;
If it is true encript, k is entered step;
If it is vacation, l is entered step;
K, authentication file (411) is established
Meet authorising conditional, hiding authentication file is rewritten according to certificate ciphertext, authorizes successfully (M3);
L, setting certificate is invalid (412)
If there is a condition is invalid, then the new authorization timestamp of explanation is less than the timestamp that encript is saved, then authorizes text
Part license can not give the soft ware authorization, need to be arranged mark flag=1 of license file, be invalid state;Authorization
Failure-M2 simultaneously exits (413);
M, (413) are exited
It is out of service;
N, system time cannot modify (M1)
Prompt: system time cannot be modified;
O, certificate is overdue (M2)
Prompt: certificate is overdue;
P, successfully (M3) is authorized
Prompt: it authorizes successfully;
Q, authorization failure-M4
Prompt: authorization failure.
5. soft ware authorization guard method as described in claim 2, it is characterised in that:
3. workflow that the step authenticates:
When application software softWare is run, in the independent authentication module of software entry call, to the operation permission of softWare
Authentication;
It authenticates entrance (500)
Preparation copies application software softWare on equipment A to, runs softWare, and authentication module is called;
A, (501) are obtained
Obtain the machineID0 of equipment A, the reduced value as step 303;
B, authentication file (502) is read
Read hiding authentication file encript memory, and decrypt obtain in plain text, obtain MachineID, StartTime,
EndTime, LatelyRunTime, verfiyCode and flag value;
C, judge equipment (503)
Judge whether equipment is authorisation device, and whether Rule of judgment MachineID0==MachineID is true,
D is entered step if it is true;
If it is vacation, equipment is unauthorized device, is returned failed authentication (M2);
D, judge validity (504)
Judge to authenticate file it is whether effective, Rule of judgment flag==it is 0 whether true, i.e. whether authentication file effective;
If it is true, E is entered step;
If it is vacation, file is invalid for authentication, returns failed authentication (M2);
E, check code (505) are verified
Rule of judgment is whether verification verifyCode is correct;
If it is true, F is entered step;
If it is vacation, return failed authentication (M2);
F, system time (506) are obtained
Obtain current time in system now;
G, judge available time (507)
Rule of judgment is now > latelyRuntime whether true, that is, judges whether current time is greater than hiding authentication file
Time when the software last time operation of preservation is exited;
If it is true, H is entered step;
If it is vacation, illustrate current time than the software last time that hiding authentication file saves running time when exiting
It is small, this be it is impossible, after only system time being the false time, just can this thing happens, so, return failed authentication
(M2);
H, judge overdue (508)
Whether Rule of judgment now > endTime is true;
If it is true, I is entered step;
If it is vacation, return authenticates successfully (M1);
I, modification authentication file (509)
The hiding authentication file f lag of modification is identified as 1, i.e. setting authorization is overdue;It returns failed authentication (M2);
J, successfully (M1) is authenticated
Prompt: it authenticates successfully;
L, failed authentication (M2)
Prompt failed authentication.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811430399.1A CN109598104B (en) | 2018-11-28 | 2018-11-28 | Software authorization protection system and method based on timestamp and secret authentication file |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811430399.1A CN109598104B (en) | 2018-11-28 | 2018-11-28 | Software authorization protection system and method based on timestamp and secret authentication file |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109598104A true CN109598104A (en) | 2019-04-09 |
CN109598104B CN109598104B (en) | 2021-08-10 |
Family
ID=65960586
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811430399.1A Active CN109598104B (en) | 2018-11-28 | 2018-11-28 | Software authorization protection system and method based on timestamp and secret authentication file |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109598104B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111460393A (en) * | 2020-03-18 | 2020-07-28 | 紫光云技术有限公司 | Method for preventing system from bypassing software license time management and control |
CN112035887A (en) * | 2020-09-01 | 2020-12-04 | 武汉虹旭信息技术有限责任公司 | Certificate authorization method and device, electronic equipment and storage medium |
CN113254887A (en) * | 2021-06-04 | 2021-08-13 | 统信软件技术有限公司 | Authorization method of application program, computing device and storage medium |
CN113343215A (en) * | 2021-07-20 | 2021-09-03 | 厦门锐骐物联技术股份有限公司 | Embedded software authorization and authentication method and electronic equipment |
CN113806720A (en) * | 2021-09-24 | 2021-12-17 | 福建星网视易信息系统有限公司 | Software authentication method, system and storage medium supporting offline scene |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103491097A (en) * | 2013-09-30 | 2014-01-01 | 华中师范大学 | Software authorization system based on public key cryptosystem |
CN104537282A (en) * | 2014-12-04 | 2015-04-22 | 中国电子科技集团公司第二十二研究所 | Encryption flash disk and large data computation technology based authorization use method |
CN105956423A (en) * | 2016-04-21 | 2016-09-21 | 网宿科技股份有限公司 | Method and device for authentication |
CN106874714A (en) * | 2017-02-15 | 2017-06-20 | 湖南长城银河科技有限公司 | A kind of software authorization method |
-
2018
- 2018-11-28 CN CN201811430399.1A patent/CN109598104B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103491097A (en) * | 2013-09-30 | 2014-01-01 | 华中师范大学 | Software authorization system based on public key cryptosystem |
CN104537282A (en) * | 2014-12-04 | 2015-04-22 | 中国电子科技集团公司第二十二研究所 | Encryption flash disk and large data computation technology based authorization use method |
CN105956423A (en) * | 2016-04-21 | 2016-09-21 | 网宿科技股份有限公司 | Method and device for authentication |
CN106874714A (en) * | 2017-02-15 | 2017-06-20 | 湖南长城银河科技有限公司 | A kind of software authorization method |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111460393A (en) * | 2020-03-18 | 2020-07-28 | 紫光云技术有限公司 | Method for preventing system from bypassing software license time management and control |
CN112035887A (en) * | 2020-09-01 | 2020-12-04 | 武汉虹旭信息技术有限责任公司 | Certificate authorization method and device, electronic equipment and storage medium |
CN112035887B (en) * | 2020-09-01 | 2023-10-27 | 武汉虹旭信息技术有限责任公司 | Certificate authorization method and device, electronic equipment and storage medium |
CN113254887A (en) * | 2021-06-04 | 2021-08-13 | 统信软件技术有限公司 | Authorization method of application program, computing device and storage medium |
CN113343215A (en) * | 2021-07-20 | 2021-09-03 | 厦门锐骐物联技术股份有限公司 | Embedded software authorization and authentication method and electronic equipment |
CN113806720A (en) * | 2021-09-24 | 2021-12-17 | 福建星网视易信息系统有限公司 | Software authentication method, system and storage medium supporting offline scene |
CN113806720B (en) * | 2021-09-24 | 2023-12-05 | 福建星网视易信息系统有限公司 | Software authentication method, system and storage medium supporting offline scene |
Also Published As
Publication number | Publication date |
---|---|
CN109598104B (en) | 2021-08-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109598104A (en) | Soft ware authorization based on timestamp and secret authentication file protects system and method | |
CN1581118B (en) | Secure device, information processing terminal, integrated circuit, application apparatus and method | |
US7899187B2 (en) | Domain-based digital-rights management system with easy and secure device enrollment | |
US8572392B2 (en) | Access authentication method, information processing unit, and computer product | |
CN101819612B (en) | Versatile content control with partitioning | |
US7975312B2 (en) | Token passing technique for media playback devices | |
US20040088541A1 (en) | Digital-rights management system | |
CN101192926B (en) | Account protection method and system | |
KR20040096583A (en) | A method and arrangement for protecting software | |
CN101305375A (en) | System and method for controlling distribution of electronic information | |
US20070208952A1 (en) | System And Method For Data Source Authentication And Protection System Using Biometrics For Openly Exchanged Computer Files | |
WO2007094165A1 (en) | Id system and program, and id method | |
CN101202762A (en) | Methods and system for storing and retrieving identity mapping information | |
KR101817152B1 (en) | Method for providing trusted right information, method for issuing user credential including trusted right information, and method for obtaining user credential | |
KR101314751B1 (en) | Apparatus for managing installation of DRM and method thereof | |
US20010048359A1 (en) | Restriction method for utilization of computer file with use of biometrical information, method of logging in computer system and recording medium | |
CN102609656A (en) | USB (universal serial bus) key safety enhancing method and USB key safety enhancing system based on image identification | |
JP5183517B2 (en) | Information processing apparatus and program | |
CN102222195B (en) | E-book reading method and system | |
CN112000933B (en) | Application software activation method and device, electronic equipment and storage medium | |
CN101286987B (en) | Method for transferring authority license of software | |
JP2003338816A (en) | Service providing system for verifying personal information | |
US20130014286A1 (en) | Method and system for making edrm-protected data objects available | |
KR100880512B1 (en) | An entrance terminal with a built-in sam | |
JP2009245135A (en) | Information processing terminal device and start authentication method of application program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |