CN109598104A - Soft ware authorization based on timestamp and secret authentication file protects system and method - Google Patents

Soft ware authorization based on timestamp and secret authentication file protects system and method Download PDF

Info

Publication number
CN109598104A
CN109598104A CN201811430399.1A CN201811430399A CN109598104A CN 109598104 A CN109598104 A CN 109598104A CN 201811430399 A CN201811430399 A CN 201811430399A CN 109598104 A CN109598104 A CN 109598104A
Authority
CN
China
Prior art keywords
module
certificate
authorization
authentication
software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811430399.1A
Other languages
Chinese (zh)
Other versions
CN109598104B (en
Inventor
刘晓东
叶猛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HONGXU INFORMATION TECHNOLOGY Co Ltd WUHAN
Original Assignee
HONGXU INFORMATION TECHNOLOGY Co Ltd WUHAN
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HONGXU INFORMATION TECHNOLOGY Co Ltd WUHAN filed Critical HONGXU INFORMATION TECHNOLOGY Co Ltd WUHAN
Priority to CN201811430399.1A priority Critical patent/CN109598104B/en
Publication of CN109598104A publication Critical patent/CN109598104A/en
Application granted granted Critical
Publication of CN109598104B publication Critical patent/CN109598104B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs

Abstract

The invention discloses a kind of soft ware authorizations based on timestamp and secret authentication file to protect system and method, is related to computer and mobile phone operating system.This system is: production certificate module (1), authorization module (3), authentication module (2), login module (4), main control module (5) successively interact;Main control module (5) is interacted with acquisition module (6), analysis module (7), locating module (8) and display module (9) respectively;Acquisition module (6), analysis module (7), locating module (8) and display module (9) are interacted with communication module (10) respectively, communication module (10) and memory module (11) interaction.This method is: 1. generating the certificate of authority (201);2. authorization -202;3. authenticating (203).Present invention can assure that the problem of application software illegally uses in the case where without permission.

Description

Soft ware authorization based on timestamp and secret authentication file protects system and method
Technical field
The present invention relates to computer and mobile phone operating systems more particularly to a kind of based on timestamp and secret authentication file Soft ware authorization protects system and method.
Background technique
Existing software generic guard method, such as the office software of Jinshan anti-virus software, Microsoft etc., are all made of one Cover the protected mode that software provides an authorization code or certificate.It is not authorized can only to cope with user for this guard method The case where code.It is clear that the guard method of this one authorization code of a set of software binding, there are following Railway Projects:
1. user is easy to through internet authorized access code or certificate;
2. software kit, for authenticating, since authorization code or certificate are visible, is easy to solve using the authorization code or certificate of offer It is close to crack;
3. soft ware authorization expires, after the system time for modifying machine, the software still can be used;
4. authorization code does not bind the machine code using machine, software can largely copy use.
Summary of the invention
The improving eyesight of this hair is to prevent application software unauthorized use problem, provides a kind of based on timestamp and secret The soft ware authorization for authenticating file protects system and method.
There is the present invention the unique bound device code of the certificate of authority, the certificate of authority authentication file is separated and hidden with authentication file The advantages that, can without software developer authorization, license the time it is overdue in the case where, the works of effective protection software Copyright has important application value.
Realizing the technical solution of the object of the invention is:
One, system
This system includes production certificate module, authentication module, authorization module, login module, main control module, acquisition module, analysis Module, locating module, display module, communication module and memory module;
Production certificate module, authorization module, authentication module, login module, main control module successively interact;
Main control module is interacted with acquisition module, analysis module, locating module and display module respectively;
Acquisition module, analysis module, locating module and display module are interacted with communication module respectively, communication module and memory module Interaction.
Two, method
This method includes following scheme:
1. generating the certificate of authority
This system generates the certificate of authority by production certificate module 1;
2. authorizing
After this system palpus is authorized, it could work;
Authorization method: after authorization module reads the certificate of authority, secret authentication file is generated;
System at runtime, can access authentication file;
After certificate of authority authorization expires, it is not possible to sub-authorization again.
3. authenticating
In the starting entrance of this system software SoftWare, check whether equipment meets hiding authentication file encript and provide Service condition, refuse to run if being unsatisfactory for;
When meeting service condition, then this system SoftWare is operated normally;
Before SoftWare is exited, current time can be obtained, after encrypted, hiding authentication file latetlyRumTime is updated For current time, it is then log out.
The present invention has following advantages and good effect:
1. this system authority License and application software SoftWare bound device code, SoftWare copies to unauthorized Equipment is unable to run;
2. authorize, the comparison of this system licensed software secret hiding authentication file and authority License, in hiding mirror Weigh file it is overdue when, it is invalid that licensed software, which can modify License, so that the License after overdue can not sub-authorization again;
3. application software SoftWare operates normally backed off after random, when can modify the LatelyRunTime of hiding authentication file Between stab;
4. user can not have found, so that modification can not be cracked since hiding authentication file is invisible;So illegal user is Make to have modified system time, is not still available the software;
5. not needing application software increases hardware device and cost, it is simple and efficient;
In short, present invention can assure that the problem of application software illegally uses in the case where without permission.
Detailed description of the invention
Fig. 1 is the structural block diagram of this system;
In figure:
1-production certificate module;
2-authentication modules;
3-authorization modules;
4-login modules:
5-main control modules;
6-acquisition modules;
7-analysis modules;
8-locating modules;
9-display modules;
10-communication modules;
11-memory modules.
Fig. 2 is the work flow diagram of this method:
Fig. 3 is 1. work flow diagram that this method step generates certificate;
Fig. 4 is 2. work flow diagram that this method step authorizes;
Fig. 5 is 3. work flow diagram that this method step authenticates.
Specific embodiment
In conjunction with attached drawing, the embodiment of the present invention is provided and is described in detail below.
One, system
1, overall
Such as Fig. 1, this system includes production certificate module 1, authentication module 2, authorization module 3, login module 4, main control module 5, adopts Collect module 6, analysis module 7, locating module 8, display module 9, communication module 10 and memory module 11;
Production certificate module 1, authorization module 3, authentication module 2, login module 4, main control module 5 successively interact;
Main control module 5 is interacted with acquisition module 6, analysis module 7, locating module 8 and display module 9 respectively;
Acquisition module 6, analysis module 7, locating module 8 and display module 9 are interacted with communication module 10 respectively, 10 He of communication module The interaction of memory module 11.
User equipment can call authentication module 2 to be authenticated when attempting using application software;The discovery of authentication module 2 is set For when there is no authorization, failed authentication can be returned;When user equipment finds with no authorized, in order to use application software SoftWare should apply authorizing to authorized party;After authorized application, authorized party requires user equipment to provide device code, and root Being that user equipment is determining according to concrete condition begins to use date and authorization deadline, makes the certificate of authority;Authorized party is simultaneously User equipment provides the certificate of authority and licensed software;User equipment needs first to run licensed software reading when running application software Taking the certificate of authority is user equipment authorization;The user equipment for obtaining authorization can star application software, after through authentication, application Software operates normally;If authorization is overdue, it will appear failed authentication;User equipment should be applied authorizing again at this time.
2, main functional modules
1) certificate module 1 is made
The workflow for making certificate module 1 is as shown in Figure 3;
Production certificate needs to obtain 6 parameters using following a-f:
A: device code MachineID
Device code MachineID, the sequence number of hard disk, the sequence number of CPU, MAC Address of network interface card etc. can distinguish it in equipment His equipment unique identification or mobile phone IMEI etc. can distinguish other equipment unique identification;
B: authorization time started StartTime;
C: authorization deadline EndTime;
D: last software runing time LatelyRunTime;
E: check code verfiyCode;
F: overdue marker flag.
Flag:0 is effective, and 1 is invalid.
Firstly, production certificate module generates the plaintext code of the certificate of authority using 6 parameters of above-mentioned a-f;
Secondly, production certificate module selects Encryption Algorithm Encription(to correspond to decipherment algorithm as Decription), encryption is awarded The plaintext code of warrant book generates certificate of authority License.
2) authentication module 2
The working principle of authorization module 2 is:
A, the certificate of authority is read, checks the validity of certificate;
B, creation secret hides Paths;
C, creation secret is hidden in the authentication file encript under the path;
The authentication file is in hidden state, and store path and title (including filename and suffix name) for users can not See.
The work flow diagram of authorization module is as indicated at 4.
3) authorization module 3
The workflow of authentication module 3 is as shown in 5 figures.
Other functional modules are common module.
Two, method
Such as Fig. 2, this method includes following scheme:
1. generating the certificate of authority -201
This system generates the certificate of authority by production certificate module 1;
2. authorization -202
After this system palpus is authorized, it could work;
Authorization method: after authorization module 3 reads the certificate of authority, secret authentication file is generated;
System at runtime, can access authentication file;
After certificate of authority authorization expires, it is not possible to sub-authorization again.
3. authentication -203
In the starting entrance of this system software SoftWare, check whether equipment meets hiding authentication file encript and provide Service condition, refuse to run if being unsatisfactory for;
When meeting service condition, then this system SoftWare is operated normally;
Before SoftWare is exited, current time can be obtained, after encrypted, hiding authentication file latetlyRumTime is updated For current time, it is then log out.
1,1. step generates the workflow of the certificate of authority
Such as Fig. 3, including following sub-step:
I, basic parameter -301 is inputted
Basic parameter, i.e. the device code MachineID of user's offer, authorization time started stamp StartTime, authorization cut-off are provided Timestamp EndTime;
II, check code -302 is generated
It generates check code verfiyCode and selects certain byte structures in these three parameters according to the three of input basic parameters At check code verfiyCode;Initializing LatelyRunTime simultaneously is StartTime value, and overdue marker flag is 0, i.e., Effectively;It is bright that certificate is formed according to MachineID, StartTime, EndTime, LatelyRunTime, verfiyCode and flag Literary code;
III, certificate plaintext -303 is generated
Encryption Algorithm is selected, encrypting plaintext code generates ciphertext encode, certificate of authority License is generated, by ciphertext encode It is written in the certificate of authority;
IV, encryption generate certificate -304
Generate certificate file.
2,2. workflow that step authorizes
Such as Fig. 4, including following sub-step:
Preparation copies licensed software and the certificate of authority on equipment A to, runs licensed software;
Start -400;
A, machine code -401 is obtained
After licensed software operation, the machineID of equipment A, the reduced value as step d are obtained;
B, certificate ciphertext -402 is read
Licensed software opens the certificate of authority, and reads the ciphertext encode1 in the certificate of authority;Call decipherment algorithm Decription, plaintext M achineID1, StartTime1, EndTime1, LatelyRunTime1 after being decrypted, VerfiyCode1 and flag1;
C, judge flag1-403
Judge whether flag1 is 0, is true, i.e. flag=0 if it is condition, certificate is effective, enters step d;
If condition is false, i.e. flag=1, certificate is invalid, and the certificate is overdue, therefore authorization failure-M4 and exits -413;
D, judge machine code -404
Judge whether machineID equal with MachineID1, i.e. the machineID of equipment A whether with certificate MachineID1 is identical;
If condition is very, i.e. the authorisation device that equipment A is exactly certificate enters step e;
If condition be it is false, equipment A is illegal authorisation device, therefore authorization failure-M4 and exits -413;
E, judgement authentication file presence -405
Licensed software checks in equipment A with the presence or absence of hiding authentication file encript;
If it does, entering step g;
If it does not, entering step f;
F, creation authentication file -406
It creates and hides Paths in equipment A, and in the lower authentication file encript for generating and hiding that hides Paths, while certificate Ciphertext is written in encript, that is, authorizes successfully-M3, then licensed software can select to exit -413;
G, authentication file -407 is read
Read hiding authentication file encript memory, and decrypt obtain in plain text, obtain MachineID2, StartTime2, EndTime2,LatelyRunTime2,verfiyCode2;
H, current time stamp -408 is obtained
Obtain current time in system stamp now;
I, judge system time authenticity -409
Judge whether LatelyRunTime2 > now is true, i.e., the last runing time saved in the hiding authentication file of judgement Whether stamp is greater than current time stamp;
If it is vacation, j is entered step;
If it is true, i.e., now becomes smaller, then illustrates that current system time is modified to lesser time value, belong to the time Deception its purpose is to be authorized again, therefore cannot be such case authorization-M1, therefore authorization failure-M4, and exit- 413;
J, judge certificate validity -410
Rule of judgment startTime1 >=startTime2, endTime1 >=endTime2
And latelyRunTime1 >=latelyRunTime12 simultaneously set up it is no;The first two condition is to judge the certificate of authority StartTime, endTime and latelyRunTime of License, if more than or equal to encript pairs hiding of authentication file StartTime, endTime and the latelyRunTimee answered;
If it is true encript, k is entered step;
If it is vacation, l is entered step;
K, authentication file -411 is established
Meet authorising conditional, hiding authentication file is rewritten according to certificate ciphertext, authorizes successfully M3;
L, setting certificate invalid -412
If there is a condition is invalid, then the new authorization timestamp of explanation is less than the timestamp that encript is saved, then authorizes text Part license can not give the soft ware authorization, need to be arranged mark flag=1 of license file, be invalid state;Authorization Failure-M2 simultaneously exits -413;
M, -413 are exited
It is out of service;
N, system time cannot modify-M1
Prompt: system time cannot be modified;
O, the overdue-M2 of certificate
Prompt: certificate is overdue;
P, successfully-M3 is authorized
Prompt: it authorizes successfully;
Q, authorization failure-M4
Prompt: authorization failure.
3,3. workflow that step authenticates
When application software softWare is run, in the independent authentication module of software entry call, to the operation permission of softWare Authentication;
Such as Fig. 5, including following sub-step:
Authenticate entrance -500
Preparation copies application software softWare on equipment A to, runs softWare, and authentication module is called;
A, -501 are obtained
Obtain the machineID0 of equipment A, the reduced value as step 303;
B, authentication file -502 is read
Read hiding authentication file encript memory, and decrypt obtain in plain text, obtain MachineID, StartTime, EndTime, LatelyRunTime, verfiyCode and flag value;
C, judge equipment -503
Judge whether equipment is authorisation device, and whether Rule of judgment MachineID0==MachineID is true,
D is entered step if it is true;
If it is vacation, equipment is unauthorized device, returns to failed authentication-M2;
D, judge validity -504
Judge to authenticate file it is whether effective, Rule of judgment flag==it is 0 whether true, i.e. whether authentication file effective;
If it is true, E is entered step;
If it is vacation, file is invalid for authentication, returns to failed authentication-M2;
E, check code -505 is verified
Rule of judgment is whether verification verifyCode is correct;
If it is true, F is entered step;
If it is vacation, failed authentication-M2 is returned;
F, system time -506 is obtained
Obtain current time in system now;
G, judge available time -507
Rule of judgment is now > latelyRuntime whether true, that is, judges whether current time is greater than hiding authentication file Time when the software last time operation of preservation is exited;
If it is true, H is entered step;
If it is vacation, illustrate current time than the software last time that hiding authentication file saves running time when exiting It is small, this be it is impossible, after only system time being the false time, just can this thing happens, so, return to authentication mistake Lose-M2;
H, judge overdue -508
Whether Rule of judgment now > endTime is true;
If it is true, I is entered step;
If it is vacation, return authenticates successfully-M2;
I, modification authentication file -509
The hiding authentication file f lag of modification is identified as 1, i.e. setting authorization is overdue;Return to failed authentication-M2;
J, successfully-M1 is authenticated
Prompt: it authenticates successfully;
L, failed authentication-M2
Prompt failed authentication.
4, it runs
It is identical as the normal software for not increasing authentication module into operation main interface after application software softWare is authenticated successfully; When SoftWare is exited, current time can be obtained, after encrypted, hiding authentication file latetlyRumTime is updated to Current time is then log out.

Claims (5)

1. a kind of soft ware authorization based on timestamp and secret authentication file protects system, it is characterised in that:
Including production certificate module (1), authentication module (2), authorization module (3), login module (4), main control module (5), acquisition Module (6), analysis module (7), locating module (8), display module (9), communication module (10) and memory module (11);
Production certificate module (1), authorization module (3), authentication module (2), login module (4), main control module (5) successively interact;
Main control module (5) is interacted with acquisition module (6), analysis module (7), locating module (8) and display module (9) respectively;
Acquisition module (6), analysis module (7), locating module (8) and display module (9) are interacted with communication module (10) respectively, are led to Interrogate module (10) and memory module (11) interaction.
2. by the soft ware authorization guard method of system described in claim 1, it is characterised in that:
1. generating the certificate of authority (201)
This system generates the certificate of authority by production certificate module (1);
2. authorization -202
After this system palpus is authorized, it could work;
Authorization method: after authorization module (3) reads the certificate of authority, secret authentication file is generated;
System at runtime, can access authentication file;
After certificate of authority authorization expires, it is not possible to sub-authorization again;
3. authenticating (203)
In the starting entrance of this system software SoftWare, check whether equipment meets hiding authentication file encript and provide Service condition, refuse to run if being unsatisfactory for;
When meeting service condition, then this system SoftWare is operated normally;
Before SoftWare is exited, current time can be obtained, after encrypted, hiding authentication file latetlyRumTime is updated For current time, it is then log out.
3. soft ware authorization guard method as described in claim 2, it is characterised in that:
1. the step generates the workflow of the certificate of authority:
I, basic parameter (301) are inputted
Basic parameter, i.e. the device code MachineID of user's offer, authorization time started stamp StartTime, authorization cut-off are provided Timestamp EndTime;
II, check code (302) are generated
It generates check code verfiyCode and selects certain byte structures in these three parameters according to the three of input basic parameters At check code verfiyCode;Initializing LatelyRunTime simultaneously is StartTime value, and overdue marker flag is 0, i.e., Effectively;It is bright that certificate is formed according to MachineID, StartTime, EndTime, LatelyRunTime, verfiyCode and flag Literary code;
III, certificate is generated in plain text (303)
Encryption Algorithm is selected, encrypting plaintext code generates ciphertext encode, certificate of authority License is generated, by ciphertext encode It is written in the certificate of authority;
IV, encryption generate certificate (304)
Generate certificate file.
4. soft ware authorization guard method as described in claim 2, it is characterised in that:
2. workflow that the step authorizes:
Preparation copies licensed software and the certificate of authority on equipment A to, runs licensed software;
Start (400);
A, machine code (401) are obtained
After licensed software operation, the machineID of equipment A, the reduced value as step d are obtained;
B, certificate ciphertext (402) are read
Licensed software opens the certificate of authority, and reads the ciphertext encode1 in the certificate of authority;Call decipherment algorithm Decription, plaintext M achineID1, StartTime1, EndTime1, LatelyRunTime1 after being decrypted, VerfiyCode1 and flag1;
C, judge flag1(403)
Judge whether flag1 is 0, is true, i.e. flag=0 if it is condition, certificate is effective, enters step d;
If condition is false, i.e. flag=1, certificate is invalid, and the certificate is overdue, therefore authorization failure-M4 and exits -413;
D, judge machine code (404)
Judge whether machineID equal with MachineID1, i.e. the machineID of equipment A whether with certificate MachineID1 is identical;
If condition is very, i.e. the authorisation device that equipment A is exactly certificate enters step e;
If condition be it is false, equipment A is illegal authorisation device, therefore authorization failure-M4 and exits -413;
E, there are (405) in judgement authentication file
Licensed software checks in equipment A with the presence or absence of hiding authentication file encript;
If it does, entering step g;
If it does not, entering step f;
F, creation authentication file (406)
It creates and hides Paths in equipment A, and in the lower authentication file encript for generating and hiding that hides Paths, while certificate Ciphertext is written in encript, that is, authorizes successfully-M3, then licensed software can select to exit -413;
G, authentication file (407) is read
Read hiding authentication file encript memory, and decrypt obtain in plain text, obtain MachineID2, StartTime2, EndTime2,LatelyRunTime2,verfiyCode2;
H, current time stamp (408) are obtained
Obtain current time in system stamp now;
I, judge system time authenticity (409)
Judge whether LatelyRunTime2 > now is true, i.e., the last runing time saved in the hiding authentication file of judgement Whether stamp is greater than current time stamp;
If it is vacation, j is entered step;
If it is true, i.e., now becomes smaller, then illustrates that current system time is modified to lesser time value, belong to the time Deception its purpose is to be authorized again, therefore cannot be such case authorization (M1), therefore authorization failure (M4), and move back (413) out;
J, judge certificate validity -410
Rule of judgment startTime1 >=startTime2, endTime1 >=endTime2
And latelyRunTime1 >=latelyRunTime12 simultaneously set up it is no;The first two condition is to judge the certificate of authority StartTime, endTime and latelyRunTime of License, if more than or equal to encript pairs hiding of authentication file StartTime, endTime and the latelyRunTimee answered;
If it is true encript, k is entered step;
If it is vacation, l is entered step;
K, authentication file (411) is established
Meet authorising conditional, hiding authentication file is rewritten according to certificate ciphertext, authorizes successfully (M3);
L, setting certificate is invalid (412)
If there is a condition is invalid, then the new authorization timestamp of explanation is less than the timestamp that encript is saved, then authorizes text Part license can not give the soft ware authorization, need to be arranged mark flag=1 of license file, be invalid state;Authorization Failure-M2 simultaneously exits (413);
M, (413) are exited
It is out of service;
N, system time cannot modify (M1)
Prompt: system time cannot be modified;
O, certificate is overdue (M2)
Prompt: certificate is overdue;
P, successfully (M3) is authorized
Prompt: it authorizes successfully;
Q, authorization failure-M4
Prompt: authorization failure.
5. soft ware authorization guard method as described in claim 2, it is characterised in that:
3. workflow that the step authenticates:
When application software softWare is run, in the independent authentication module of software entry call, to the operation permission of softWare Authentication;
It authenticates entrance (500)
Preparation copies application software softWare on equipment A to, runs softWare, and authentication module is called;
A, (501) are obtained
Obtain the machineID0 of equipment A, the reduced value as step 303;
B, authentication file (502) is read
Read hiding authentication file encript memory, and decrypt obtain in plain text, obtain MachineID, StartTime, EndTime, LatelyRunTime, verfiyCode and flag value;
C, judge equipment (503)
Judge whether equipment is authorisation device, and whether Rule of judgment MachineID0==MachineID is true,
D is entered step if it is true;
If it is vacation, equipment is unauthorized device, is returned failed authentication (M2);
D, judge validity (504)
Judge to authenticate file it is whether effective, Rule of judgment flag==it is 0 whether true, i.e. whether authentication file effective;
If it is true, E is entered step;
If it is vacation, file is invalid for authentication, returns failed authentication (M2);
E, check code (505) are verified
Rule of judgment is whether verification verifyCode is correct;
If it is true, F is entered step;
If it is vacation, return failed authentication (M2);
F, system time (506) are obtained
Obtain current time in system now;
G, judge available time (507)
Rule of judgment is now > latelyRuntime whether true, that is, judges whether current time is greater than hiding authentication file Time when the software last time operation of preservation is exited;
If it is true, H is entered step;
If it is vacation, illustrate current time than the software last time that hiding authentication file saves running time when exiting It is small, this be it is impossible, after only system time being the false time, just can this thing happens, so, return failed authentication (M2);
H, judge overdue (508)
Whether Rule of judgment now > endTime is true;
If it is true, I is entered step;
If it is vacation, return authenticates successfully (M1);
I, modification authentication file (509)
The hiding authentication file f lag of modification is identified as 1, i.e. setting authorization is overdue;It returns failed authentication (M2);
J, successfully (M1) is authenticated
Prompt: it authenticates successfully;
L, failed authentication (M2)
Prompt failed authentication.
CN201811430399.1A 2018-11-28 2018-11-28 Software authorization protection system and method based on timestamp and secret authentication file Active CN109598104B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811430399.1A CN109598104B (en) 2018-11-28 2018-11-28 Software authorization protection system and method based on timestamp and secret authentication file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811430399.1A CN109598104B (en) 2018-11-28 2018-11-28 Software authorization protection system and method based on timestamp and secret authentication file

Publications (2)

Publication Number Publication Date
CN109598104A true CN109598104A (en) 2019-04-09
CN109598104B CN109598104B (en) 2021-08-10

Family

ID=65960586

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811430399.1A Active CN109598104B (en) 2018-11-28 2018-11-28 Software authorization protection system and method based on timestamp and secret authentication file

Country Status (1)

Country Link
CN (1) CN109598104B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111460393A (en) * 2020-03-18 2020-07-28 紫光云技术有限公司 Method for preventing system from bypassing software license time management and control
CN112035887A (en) * 2020-09-01 2020-12-04 武汉虹旭信息技术有限责任公司 Certificate authorization method and device, electronic equipment and storage medium
CN113254887A (en) * 2021-06-04 2021-08-13 统信软件技术有限公司 Authorization method of application program, computing device and storage medium
CN113343215A (en) * 2021-07-20 2021-09-03 厦门锐骐物联技术股份有限公司 Embedded software authorization and authentication method and electronic equipment
CN113806720A (en) * 2021-09-24 2021-12-17 福建星网视易信息系统有限公司 Software authentication method, system and storage medium supporting offline scene

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103491097A (en) * 2013-09-30 2014-01-01 华中师范大学 Software authorization system based on public key cryptosystem
CN104537282A (en) * 2014-12-04 2015-04-22 中国电子科技集团公司第二十二研究所 Encryption flash disk and large data computation technology based authorization use method
CN105956423A (en) * 2016-04-21 2016-09-21 网宿科技股份有限公司 Method and device for authentication
CN106874714A (en) * 2017-02-15 2017-06-20 湖南长城银河科技有限公司 A kind of software authorization method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103491097A (en) * 2013-09-30 2014-01-01 华中师范大学 Software authorization system based on public key cryptosystem
CN104537282A (en) * 2014-12-04 2015-04-22 中国电子科技集团公司第二十二研究所 Encryption flash disk and large data computation technology based authorization use method
CN105956423A (en) * 2016-04-21 2016-09-21 网宿科技股份有限公司 Method and device for authentication
CN106874714A (en) * 2017-02-15 2017-06-20 湖南长城银河科技有限公司 A kind of software authorization method

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111460393A (en) * 2020-03-18 2020-07-28 紫光云技术有限公司 Method for preventing system from bypassing software license time management and control
CN112035887A (en) * 2020-09-01 2020-12-04 武汉虹旭信息技术有限责任公司 Certificate authorization method and device, electronic equipment and storage medium
CN112035887B (en) * 2020-09-01 2023-10-27 武汉虹旭信息技术有限责任公司 Certificate authorization method and device, electronic equipment and storage medium
CN113254887A (en) * 2021-06-04 2021-08-13 统信软件技术有限公司 Authorization method of application program, computing device and storage medium
CN113343215A (en) * 2021-07-20 2021-09-03 厦门锐骐物联技术股份有限公司 Embedded software authorization and authentication method and electronic equipment
CN113806720A (en) * 2021-09-24 2021-12-17 福建星网视易信息系统有限公司 Software authentication method, system and storage medium supporting offline scene
CN113806720B (en) * 2021-09-24 2023-12-05 福建星网视易信息系统有限公司 Software authentication method, system and storage medium supporting offline scene

Also Published As

Publication number Publication date
CN109598104B (en) 2021-08-10

Similar Documents

Publication Publication Date Title
CN109598104A (en) Soft ware authorization based on timestamp and secret authentication file protects system and method
CN1581118B (en) Secure device, information processing terminal, integrated circuit, application apparatus and method
US7899187B2 (en) Domain-based digital-rights management system with easy and secure device enrollment
US8572392B2 (en) Access authentication method, information processing unit, and computer product
CN101819612B (en) Versatile content control with partitioning
US7975312B2 (en) Token passing technique for media playback devices
US20040088541A1 (en) Digital-rights management system
CN101192926B (en) Account protection method and system
KR20040096583A (en) A method and arrangement for protecting software
CN101305375A (en) System and method for controlling distribution of electronic information
US20070208952A1 (en) System And Method For Data Source Authentication And Protection System Using Biometrics For Openly Exchanged Computer Files
WO2007094165A1 (en) Id system and program, and id method
CN101202762A (en) Methods and system for storing and retrieving identity mapping information
KR101817152B1 (en) Method for providing trusted right information, method for issuing user credential including trusted right information, and method for obtaining user credential
KR101314751B1 (en) Apparatus for managing installation of DRM and method thereof
US20010048359A1 (en) Restriction method for utilization of computer file with use of biometrical information, method of logging in computer system and recording medium
CN102609656A (en) USB (universal serial bus) key safety enhancing method and USB key safety enhancing system based on image identification
JP5183517B2 (en) Information processing apparatus and program
CN102222195B (en) E-book reading method and system
CN112000933B (en) Application software activation method and device, electronic equipment and storage medium
CN101286987B (en) Method for transferring authority license of software
JP2003338816A (en) Service providing system for verifying personal information
US20130014286A1 (en) Method and system for making edrm-protected data objects available
KR100880512B1 (en) An entrance terminal with a built-in sam
JP2009245135A (en) Information processing terminal device and start authentication method of application program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant