CN109922076A - Safety communicating method and authorization platform in a kind of soft-lock admission process - Google Patents

Safety communicating method and authorization platform in a kind of soft-lock admission process Download PDF

Info

Publication number
CN109922076A
CN109922076A CN201910237165.3A CN201910237165A CN109922076A CN 109922076 A CN109922076 A CN 109922076A CN 201910237165 A CN201910237165 A CN 201910237165A CN 109922076 A CN109922076 A CN 109922076A
Authority
CN
China
Prior art keywords
key
code key
soft
lock
root
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910237165.3A
Other languages
Chinese (zh)
Other versions
CN109922076B (en
Inventor
孙吉平
李海鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Senseshield Technology Co Ltd
Original Assignee
Beijing Senseshield Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Senseshield Technology Co Ltd filed Critical Beijing Senseshield Technology Co Ltd
Priority to CN201910237165.3A priority Critical patent/CN109922076B/en
Publication of CN109922076A publication Critical patent/CN109922076A/en
Application granted granted Critical
Publication of CN109922076B publication Critical patent/CN109922076B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention proposes a kind of safety communicating method based on soft-lock license, it include: S1, soft-lock permission platform is that software development main body distributes root public key and root private key, root private key are stored on the encryption equipment being connected with the soft-lock permission platform, and root public key is distributed to software and uses end;S2, soft-lock permission platform sign and issue the interim code key for coded communication using the root private key by encryption equipment, and issue the permissions upgrade packet of the software to soft-lock, wherein the permissions upgrade packet includes the interim code key;S3 when the software accesses the soft-lock using end, verifies whether the interim code key is signed and issued by the root private key based on the root public key.The present invention also correspondence proposes a kind of authorization platform in soft-lock admission process.The present invention can be above multiple ranks code key verification process, it can be ensured that in the case that root private key is not leaked, private key is used to generate communication code key.

Description

Safety communicating method and authorization platform in a kind of soft-lock admission process
Technical field
The present invention relates to software copyright protection fields, more particularly, to the secure communication in a kind of soft-lock admission process Method and authorization platform.
Background technique
Permit the safety in communication process to solve soft-lock, usual communication process is encrypted, soft-lock license The market share occupied at present be far longer than hardware lock license, but protection have by force have it is weak.Traditional soft-lock is due to encryption Intensity is weak, and encryption method is single, it is easy to and it is cracked, and is once cracked, substantially catastrophic piracy.Therefore reinforce Communications security very it is necessary to.
Summary of the invention
In the prior art, private key file is not used using the certification at end to software.In method of the invention, software makes It needs to be mutually authenticated using a private key file with soft-lock with end.But private key file is stored in because of its importance There is very big security risk using end in software, therefore the present invention is flat using private key file is stored in believable license Platform, software use end still storage of public keys.The method that software uses three-level code key using the certification between end and soft-lock, code key Relationship is signed layer by layer, is encrypted layer by layer.
For the problems in background technique, the present invention provides a kind of safety communicating methods based on soft-lock license, comprising:
S1, soft-lock permission platform are that software development main body distributes root public key and root private key, and root private key is stored in and institute It states on the connected encryption equipment of soft-lock permission platform, root public key is distributed to software and uses end;
S2, soft-lock permission platform are signed and issued using the root private key for the interim secret of coded communication by encryption equipment Key, and the permissions upgrade packet of the software is issued to soft-lock, wherein the permissions upgrade packet includes the interim code key;
S3, when the software accesses the soft-lock using end, based on the root public key verify the interim code key whether by The root private key is signed and issued.
Further, in step s 2, the interim code key includes multistage public and private secret key pair, and next stage secret key pair is by upper level The private key of secret key pair signs and issues generation.
Further, in step s 2, the interim code key includes multistage secret key pair, is generated by such as under type: S21, soft-lock Permission platform obtains the second level code key that encryption equipment is signed and issued using the root private key, which includes public key and private Key;S22, soft-lock permission platform sign and issue third level code key with the second level code key, which includes public key and private Key.
Further, in S3, when software is using end access soft-lock, it is secret that the second level is successively verified by the root public key Whether key, the third level code key are to be signed and issued by the root private key.
Further, the safety communicating method further include: S4, if be proved to be successful, the software uses end and described Soft-lock is based on the interim code key and carries out subsequent communications.
Further, the safety communicating method further include: S4, if the signature verification in S3 is correct, the software makes The Random Communication code key generated with end group in the third level code key carries out coded communication with the soft-lock.
Further, after the second level code key and the third level code key are expired, the soft-lock permission platform is again Generate new second level code key and third level code key.
According to another aspect of the invention, it is proposed that the authorization platform in a kind of soft-lock admission process, comprising:
Code key generation module, the code key generation module are that software development main body distributes root public key and root private key, root private key It is stored on the encryption equipment being connected with the authoring system;
The root public key is distributed to software and uses end by code key distribution module, the code key distribution module;
Interim code key generation module, the interim code key generation module generate an interim code key with the root private key;
Permissions upgrade packet distribution module, the permissions upgrade packet distribution module are permitted the interim code key and the software Scalable packet is sent to the soft-lock.
Further, the interim code key generation module is configured as: it is signed and issued with the root private key and generates second level code key, it should Second level code key includes public key and private key, signs and issues third level code key with the second level code key, which includes public key And private key.
Further, the interim code key generation module is configured as: when the second level code key and the third level code key After expired, new second level code key and third level code key are regenerated.
The invention has the benefit that software only stores public key using end, software is used between end and soft-lock by logical Letter code key is cryptographically communicated, and ensure that software uses the safety at end and the communication process of soft-lock.And communicate the life of code key At be software using between end and soft-lock permission platform triple code keys encryption by way of verified.By this hair Bright method ensure that each software uses the independence of end code key, cannot form general solution, also ensure every time communication code key Randomness increases the difficulty cracked.
Detailed description of the invention
In order to be easier to understand the present invention, will by referring to accompanying drawing shown in specific embodiment be more fully described this Invention.These attached drawings depict only exemplary embodiment of the invention, it is not considered that limiting the scope of the invention.
Fig. 1 is the flow chart of one embodiment of method of the invention.
Fig. 2 is the architecture diagram of authorization platform of the invention.
Specific embodiment
Embodiments of the present invention are described with reference to the accompanying drawings, wherein identical component is presented with like reference characters. In the absence of conflict, the technical characteristic in following embodiment and embodiment can be combined with each other.
It as figure 1 shows the flow chart of an embodiment of method of the invention.Method of the invention be directed to Approval software uses the certification between end (being mounted with software) and soft-lock encrypted container, wherein soft-lock is to be located at certain in local area network Encryption equipment on platform computer, such as encryption lock, other computers in local area network can be under the premise of permitting with soft-lock It accesses to soft-lock.The method of the present invention includes step S1-S3, as detailed below.
S1, soft-lock permission platform are that software development main body (software development people) distributes root public key and root private key, and root is private Key is stored on the encryption equipment being connected with the authorization platform, and root public key is distributed to software and uses end.Root private key be stored in it is soft In the encryption equipment for locking permission system connection, root private key is without departing from hardware, it is ensured that the safety of root private key.Described public affairs Key and root private key can be the public key and private key of ecc algorithm generation.
S2, the authorization platform sign and issue the interim code key for coded communication using the root private key by encryption equipment, and And the permissions upgrade packet of the publication software is to soft-lock, wherein the permissions upgrade packet includes the interim code key.
S3, when the software accesses the soft-lock using end, based on the root public key verify the interim code key whether by The root private key is signed and issued.
In one embodiment, the interim code key in step S2 is a pair of public and private code key.In another embodiment, Interim code key in step S2 includes multistage code key, that is, interim code key includes multistage public and private secret key pair, next stage secret key pair Generation is signed and issued by the private key of upper level secret key pair.It is currently preferred to use two-stage code key, it generates in the following way:
S21, the authorization platform sign and issue second level code key with the root private key, which includes public key and private Key.Preferably, second level code key is the code key temporarily used, has validity period, is buffered in the authorization platform.
S22, the authorization platform sign and issue third level code key with the second level code key, the third level code key include public key and Private key.Preferably, third level code key is the code key temporarily used, has validity period, can be buffered in software and use on end, when secret When time in key is expired, authorization platform generates three-level code key.
After generating second level code key and third level code key, the authorization platform is by the second level code key and the third level Code key is bundled in the permissions upgrade packet of software, and permissions upgrade packet is issued soft-lock.
In this way, in S3, when software is using end access soft-lock, described in software is successively verified using end by the root public key Second level code key and the three-level code key verify whether the permissions upgrade packet is to be signed and issued by the root private key.Pass through above three The code key verification process of a rank, it is ensured that software uses the certification between end and soft-lock.
Further, second level code key or third level code key have validity period, and when they are expired, the authorization platform weighs again Newly-generated second level code key or third level code key issue the permissions upgrade packet of software to soft-lock, the permissions upgrade packet again The second level code key or third level code key regenerated is included, then software needs again to authenticate soft-lock using end, still Software carries out verifying to be still being verified using root public key using end, without re-replacing root public key, and simultaneously, root private key It is stored in safe encryption equipment.In this manner, ensure verification process safety and subsequent software using end and soft-lock it Between the safety that communicates.
Preferably, method of the invention further include: S4, if the signature verification in S3 is correct, software uses end and soft The Random Communication code key that lock base is generated in the three-level code key carries out subsequent communications.
According to another aspect of the present invention, as shown in Fig. 2, proposing the authorization platform in a kind of soft-lock admission process.It is described Authorizing platform includes: code key generation module, code key distribution module, interim code key generation module and permissions upgrade packet distribution module.
Code key generation module is that software development main body distributes root public key and root private key, and root private key is stored in flat with the authorization On the connected encryption equipment of platform.Code key generation module can use ecc algorithm and generate root public key and root private key.
The root public key is distributed to software and uses end by code key distribution module.
Interim code key generation module generates an interim code key with the root private key.In one embodiment,
The permissions upgrade packet of the interim code key and the software is sent to the soft-lock by permissions upgrade packet distribution module.
In one embodiment, the interim code key generation module is configured as: signing and issuing generation with the root private key Second level code key, the second level code key include public key and private key, sign and issue third level code key with the second level code key, the third level is secret Key includes public key and private key.The interim code key generation module is configured as: when the second level code key and the third level are secret After key is expired, new second level code key and third level code key are regenerated.It is described after generating second level code key and third level code key The second level code key and the third level code key are bundled in the permissions upgrade packet of software by authorization platform, by permissions upgrade packet Issue soft-lock.
In this way, it is secret that software using end successively verifies the second level by the root public key when software is using end access soft-lock Key and the three-level code key verify whether the permissions upgrade packet is to be signed and issued by the root private key.Pass through the three above ranks Code key verification process, it is ensured that software uses certification between end and soft-lock.
Further, second level code key or third level code key have validity period, and when they are expired, the authorization platform weighs again Newly-generated second level code key or third level code key issue the permissions upgrade packet of software to soft-lock, the permissions upgrade packet again The second level code key or third level code key regenerated is included, then software needs again to authenticate soft-lock using end, still Software carries out verifying to be still being verified using root public key using end, without re-replacing root public key, and simultaneously, root private key It is stored in safe encryption equipment.In this manner, ensure verification process safety and subsequent software using end and soft-lock it Between the safety that communicates.
If software is correct using the signature of end verifying permissions upgrade packet, software is based on the three-level using end and soft-lock Code key generates a Random Communication code key, is used to both sides and carries out subsequent encrypted communications use.
Pass through the code key verification process of the three above ranks, it can be ensured that in the case that root private key is not leaked, so that Software is authenticated using between end and soft-lock, and authenticates the communication that safety is successfully carried out using communication code key.And because A root public key and root private key are generated using end for each software, ensure that each software uses the independence of end code key, no General solution can be formed, the randomness of communication code key every time is also ensured, increases the difficulty cracked.
Embodiment described above, the only present invention more preferably specific embodiment, those skilled in the art is at this The usual variations and alternatives carried out within the scope of inventive technique scheme should be all included within the scope of the present invention.

Claims (10)

1. a kind of safety communicating method based on soft-lock license characterized by comprising
S1, soft-lock permission platform are that software development main body distributes root public key and root private key, root private key be stored in it is described soft It locks on the connected encryption equipment of permission platform, root public key is distributed to software and uses end;
S2, soft-lock permission platform sign and issue the interim code key for coded communication using the root private key by encryption equipment, and And the permissions upgrade packet of the publication software is to soft-lock, wherein the permissions upgrade packet includes the interim code key;
Whether S3 when the software accesses the soft-lock using end, verifies the interim code key by described based on the root public key Root private key is signed and issued.
2. safety communicating method according to claim 1, which is characterized in that in step s 2,
The interim code key includes multistage public and private secret key pair, and next stage secret key pair signs and issues generation by the private key of upper level secret key pair.
3. safety communicating method according to claim 2, which is characterized in that in step s 2, the interim code key includes Multistage secret key pair is generated by such as under type:
S21, soft-lock permission platform obtain the second level code key that encryption equipment is signed and issued using the root private key, the second level code key Including public key and private key;
S22, soft-lock permission platform sign and issue third level code key with the second level code key, which includes public key and private Key.
4. safety communicating method according to claim 3, which is characterized in that
In S3, when software is using end access soft-lock, the second level code key, the third are successively verified by the root public key Whether grade code key is to be signed and issued by the root private key.
5. safety communicating method according to claim 1, which is characterized in that further include:
S4, if be proved to be successful, the software is based on the interim code key using end and the soft-lock and carries out subsequent communications.
6. safety communicating method according to claim 4, which is characterized in that further include:
S4, if the signature verification in S3 is correct, the software is generated using end group in the third level code key random logical Believe code key, carries out coded communication with the soft-lock.
7. safety communicating method according to claim 3, which is characterized in that
After the second level code key and the third level code key are expired, the soft-lock permission platform regenerates new second Grade code key and third level code key.
8. the authorization platform in a kind of soft-lock admission process characterized by comprising
Code key generation module, the code key generation module are that software development main body distributes root public key and root private key, and root private key saves On the encryption equipment being connected with the authorization platform;
The root public key is distributed to software and uses end by code key distribution module, the code key distribution module;
Interim code key generation module, the interim code key generation module generate an interim code key with the root private key;
Permissions upgrade packet distribution module, the permissions upgrade packet distribution module is by the license liter of the interim code key and the software Grade packet is sent to the soft-lock.
9. according to right want 8 described in authorization platform, which is characterized in that the interim code key generation module is configured as:
It is signed and issued with the root private key and generates second level code key, which includes public key and private key,
Third level code key is signed and issued with the second level code key, which includes public key and private key.
10. according to right want 8 described in authorization platform, which is characterized in that the interim code key generation module is configured as:
After the second level code key and the expired third level code key, it is secret to regenerate new second level code key and the third level Key.
CN201910237165.3A 2019-03-27 2019-03-27 Secure communication method and authorization platform in soft lock permission process Active CN109922076B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910237165.3A CN109922076B (en) 2019-03-27 2019-03-27 Secure communication method and authorization platform in soft lock permission process

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910237165.3A CN109922076B (en) 2019-03-27 2019-03-27 Secure communication method and authorization platform in soft lock permission process

Publications (2)

Publication Number Publication Date
CN109922076A true CN109922076A (en) 2019-06-21
CN109922076B CN109922076B (en) 2020-12-18

Family

ID=66967011

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910237165.3A Active CN109922076B (en) 2019-03-27 2019-03-27 Secure communication method and authorization platform in soft lock permission process

Country Status (1)

Country Link
CN (1) CN109922076B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111641507A (en) * 2020-05-18 2020-09-08 湖南智领通信科技有限公司 Software communication system structure component registration management method and device
CN112286553A (en) * 2020-10-27 2021-01-29 北京深思数盾科技股份有限公司 User lock upgrading method, device, system, electronic equipment and storage medium
CN114189326A (en) * 2021-12-10 2022-03-15 中科计算技术西部研究院 Multiple encryption system and decryption method of plug-in type encryption terminal
CN114266017A (en) * 2021-12-30 2022-04-01 北京深思数盾科技股份有限公司 Software licensing method and electronic equipment
CN115242634A (en) * 2022-07-05 2022-10-25 蔚来汽车科技(安徽)有限公司 Software upgrading method, device and storage medium
CN116055038A (en) * 2022-12-22 2023-05-02 北京深盾科技股份有限公司 Device authorization method, system and storage medium
CN114189326B (en) * 2021-12-10 2024-04-26 中科计算技术西部研究院 Multiple encryption system and decryption method of plug-in type encryption terminal

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1971578A (en) * 2005-10-31 2007-05-30 捷讯研究有限公司 Secure license key method and system
CN101729244A (en) * 2008-10-24 2010-06-09 中兴通讯股份有限公司 Method and system for distributing key
CN103618729A (en) * 2013-09-03 2014-03-05 南京邮电大学 Multi-mechanism hierarchical attribute-based encryption method applied to cloud storage
WO2014192086A1 (en) * 2013-05-28 2014-12-04 株式会社日立製作所 Biometric signature system, signature verification method, registration terminal, signature generation terminal, and signature verification device
CN105471918A (en) * 2016-01-13 2016-04-06 中山大学 Agent re-assignment verifier signature method
CN109309645A (en) * 2017-07-26 2019-02-05 中国人民解放军装备学院 A kind of software distribution security guard method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1971578A (en) * 2005-10-31 2007-05-30 捷讯研究有限公司 Secure license key method and system
CN101729244A (en) * 2008-10-24 2010-06-09 中兴通讯股份有限公司 Method and system for distributing key
WO2014192086A1 (en) * 2013-05-28 2014-12-04 株式会社日立製作所 Biometric signature system, signature verification method, registration terminal, signature generation terminal, and signature verification device
CN103618729A (en) * 2013-09-03 2014-03-05 南京邮电大学 Multi-mechanism hierarchical attribute-based encryption method applied to cloud storage
CN105471918A (en) * 2016-01-13 2016-04-06 中山大学 Agent re-assignment verifier signature method
CN109309645A (en) * 2017-07-26 2019-02-05 中国人民解放军装备学院 A kind of software distribution security guard method

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111641507A (en) * 2020-05-18 2020-09-08 湖南智领通信科技有限公司 Software communication system structure component registration management method and device
CN111641507B (en) * 2020-05-18 2023-09-19 湖南智领通信科技有限公司 Software communication architecture component registration management method and device
CN112286553A (en) * 2020-10-27 2021-01-29 北京深思数盾科技股份有限公司 User lock upgrading method, device, system, electronic equipment and storage medium
CN114189326A (en) * 2021-12-10 2022-03-15 中科计算技术西部研究院 Multiple encryption system and decryption method of plug-in type encryption terminal
CN114189326B (en) * 2021-12-10 2024-04-26 中科计算技术西部研究院 Multiple encryption system and decryption method of plug-in type encryption terminal
CN114266017A (en) * 2021-12-30 2022-04-01 北京深思数盾科技股份有限公司 Software licensing method and electronic equipment
CN114266017B (en) * 2021-12-30 2022-11-01 北京深盾科技股份有限公司 Software licensing method and electronic equipment
CN115242634A (en) * 2022-07-05 2022-10-25 蔚来汽车科技(安徽)有限公司 Software upgrading method, device and storage medium
CN115242634B (en) * 2022-07-05 2024-03-12 蔚来汽车科技(安徽)有限公司 Software upgrading method, device and storage medium
CN116055038A (en) * 2022-12-22 2023-05-02 北京深盾科技股份有限公司 Device authorization method, system and storage medium
CN116055038B (en) * 2022-12-22 2023-11-03 北京深盾科技股份有限公司 Device authorization method, system and storage medium

Also Published As

Publication number Publication date
CN109922076B (en) 2020-12-18

Similar Documents

Publication Publication Date Title
CN109922076A (en) Safety communicating method and authorization platform in a kind of soft-lock admission process
US6490367B1 (en) Arrangement and method for a system for administering certificates
CN108599954B (en) Identity verification method based on distributed account book
US9286481B2 (en) System and method for secure and distributed physical access control using smart cards
US7934096B2 (en) Integrity protected smart card transaction
CN101170407B (en) A method for securely generating secret key pair and transmitting public key or certificate application file
CN103167491B (en) A kind of mobile terminal uniqueness authentication method based on software digital certificate
US20030217264A1 (en) System and method for providing a secure environment during the use of electronic documents and data
CN105743638B (en) Method based on B/S architecture system client authorization certifications
CN106327184A (en) Intelligent mobile terminal payment system and intelligent mobile terminal payment method based on safe hardware isolation
CN110060403B (en) One-person multi-ticket electronic voting method and system based on block chain
CN101262342A (en) Distributed authorization and validation method, device and system
CN109474419A (en) A kind of living body portrait photo encryption and decryption method and encrypting and deciphering system
CN106713279A (en) Video terminal identity authentication system
CN111222879A (en) Certificateless authentication method and certificateless authentication system suitable for alliance chain
CN111444492A (en) Digital identity verification method based on medical block chain
CN102404112A (en) Access authentication method for credible terminal
US20030221109A1 (en) Method of and apparatus for digital signatures
CN110086818B (en) Cloud file secure storage system and access control method
CN108496194A (en) A kind of method, server-side and the system of verification terminal legality
US20030037239A1 (en) Method and apparatus to mutually authentication software modules
CN103391194A (en) Method and system for unlocking safety equipment of user
CN112968779B (en) Security authentication and authorization control method, control system and program storage medium
CN106533681A (en) Attribute attestation method and system supporting partial presentation
CN108133370B (en) Safe payment method and system based on quantum key distribution network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: Room 510, 5/F, Block C, Internet Innovation Center, Building 5, Yard 10 (East District), Northwest Wangdong Road, Haidian District, Beijing 100193

Patentee after: Beijing Shendun Technology Co.,Ltd.

Address before: Room 510, 5/F, Block C, Internet Innovation Center, Building 5, Yard 10 (East District), Northwest Wangdong Road, Haidian District, Beijing 100193

Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

CP01 Change in the name or title of a patent holder