CN101281569A - Method for using network edition software protecting equipment to control software client terminal quantity - Google Patents

Method for using network edition software protecting equipment to control software client terminal quantity Download PDF

Info

Publication number
CN101281569A
CN101281569A CNA2008101065667A CN200810106566A CN101281569A CN 101281569 A CN101281569 A CN 101281569A CN A2008101065667 A CNA2008101065667 A CN A2008101065667A CN 200810106566 A CN200810106566 A CN 200810106566A CN 101281569 A CN101281569 A CN 101281569A
Authority
CN
China
Prior art keywords
soft ware
software
ware authorization
protecting equipment
authorization permission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008101065667A
Other languages
Chinese (zh)
Inventor
孙吉平
韩勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENSILUOKE DATA PROTECTION CENTER BEIJING
Beijing Senselock Software Technology Co Ltd
Original Assignee
SHENSILUOKE DATA PROTECTION CENTER BEIJING
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENSILUOKE DATA PROTECTION CENTER BEIJING filed Critical SHENSILUOKE DATA PROTECTION CENTER BEIJING
Priority to CNA2008101065667A priority Critical patent/CN101281569A/en
Publication of CN101281569A publication Critical patent/CN101281569A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a method for controlling client number by using a network version software protection device. Specifically, the software authorized permission is managed inside of the network version software protection device, therefore the problem that software authorized permission management programs are cracked is solved.

Description

A kind of method of using network edition software protecting equipment to control software client terminal quantity
Technical field
The present invention relates to the software copyright protection field, particularly use the method for network edition software protecting equipment to control software client terminal quantity.
Background technology
Using software protecting equipment is the main means that realize software security protection and copyright protection.Software protecting equipment refers in particular to a kind of hardware device that is attached on the computer interface (such as, interfaces such as USB interface, serial ports, parallel port), and operation specific software is on computers carried out software security protection and copyright protection.Storing the software use authority of specific software in the software protecting equipment, for example determining whether this software can be used, which module or function in this software can be used or the like.These software use authorities are commonly called the soft ware authorization permission.
The software protecting equipment of prior art mainly contains two kinds of citation forms: a kind of is the stand-alone software protective device, this software protecting equipment can be connected on the computer interface at running software place, for one or more the specific softwares on this computing machine provide one or more protections (such as, safeguard protection and/or copyright protection etc.); Another kind is a network edition software protecting equipment; this software protecting equipment can be connected on any computer interface of filling the post of server in the network; this is filled the post of, and operation has service routine on the computing machine of server; by network edition software protecting equipment for one or more the specific softwares that move on other computing machine in this network provide one or more protections (such as, safeguard protection and/or copyright protection etc.).
The stand-alone software protective device provides protection only for the software on this machine, does not need the support of network environment, as long as therefore carry the stand-alone software protective device, just can authorize the claimed software of operation on any computing machine.Be subjected to the software that network edition software protecting equipment protected then different, have only the computing machine that is in the same network with computing machine could move this software, be applicable to software usually in the enterprises use as server.Adopt the advantage of network edition software protecting equipment to be: a network edition software protecting equipment can be protected the authorization of many cover softwares; for example in network edition software protecting equipment, preserve the software client quantity that to move simultaneously, just may be limited in the enterprises to use what software copies simultaneously.Can reduce shared cost of software protecting equipment and ratio like this, help enterprise simultaneously the use of software is managed.
Because network edition software protecting equipment is to provide service for a plurality of computing machines in the same network simultaneously by network; and the inner soft ware authorizations permission that has many cover softwares, thereby need to install and move one on the server and provide services on the Internet and the software of soft ware authorization License Management.Because the soft ware authorization permission is managed by operation software on computers, so the cracker can make a software license mandate to be used by a plurality of softwares, thereby obtain illegal software license by the supervisory routine of the authorization that cracks.
Summary of the invention
In view of this, the invention provides a kind of method, thereby solve because the problem that the soft ware authorization license management program is cracked in the permission of network edition software protecting equipment inner management soft ware authorization.
Technical scheme of the present invention is: when bringing into use network edition software protecting equipment, software includes a changeable key part that all can be updated when at every turn using this soft ware authorization permission earlier from soft ware authorization permission of network edition software protecting equipment application in this soft ware authorization permission; In software running process, software all must provide this soft ware authorization permission at every turn when calling network edition software protecting equipment; Network edition software protecting equipment is checked the soft ware authorization permission at every turn when using software, comprising changeable key; If the soft ware authorization permission is illegal, then do not allow to call the soft ware authorization permission, if the soft ware authorization permission is legal, then allow to call the soft ware authorization permission, and upgrade changeable key part in this soft ware authorization permission.When finishing to use network edition software protecting equipment, software will discharge acquired soft ware authorization permission, reclaims the soft ware authorization permission by network edition software protecting equipment.
According to an aspect of the present invention, provide a kind of method of client terminal quantity of Control Network version software protecting equipment, it is characterized in that the method comprising the steps of:
A, when bringing into use network edition software protecting equipment, software is permitted to network edition software protecting equipment application soft ware authorization;
B, in software running process, software uses the soft ware authorization permission to call network edition software protecting equipment;
C, at every turn use soft ware authorization permission after, network edition software protecting equipment is the update software authorization all;
D, when finish using network edition software protecting equipment, software discharges the soft ware authorization permission.
According to an aspect of the present invention, its feature also is, also comprises in the steps A: whether the inspection of network edition software protecting equipment has idle soft ware authorization permission.
According to an aspect of the present invention, its feature is that also if idle soft ware authorization permission is arranged, network edition software protecting equipment is that software is issued the soft ware authorization permission so; If do not have idle soft ware authorization permission, so, finish the application of soft ware authorization permission.
According to an aspect of the present invention, its feature also is, also comprises among the step B: software all must provide described soft ware authorization permission at every turn when calling network edition software protecting equipment.
According to an aspect of the present invention, its feature also is, also comprises among the step B: network edition software protecting equipment is checked the soft ware authorization permission.
According to an aspect of the present invention, its feature is that also network edition software protecting equipment checks this soft ware authorization permission whether legal by other information of the fixed key in the permission of inspection soft ware authorization and/or changeable key and/or soft ware authorization permission.
According to an aspect of the present invention, its feature also is, if the soft ware authorization permission is legal, then allows software transfer network edition software protecting equipment, otherwise stops software transfer network edition software protecting equipment.
According to an aspect of the present invention, its feature also is, also comprises among the step B: use fixed key and/or changeable key in the soft ware authorization permission that the communication data between software and the network edition software protecting equipment is encrypted.
According to an aspect of the present invention, its feature also is, also comprises among the step C: network edition software protecting equipment is according to changeable key in the predetermined Policy Updates soft ware authorization permission.
According to an aspect of the present invention, its feature also is, also comprises after step C: determine whether to finish calling network edition software protecting equipment.
According to an aspect of the present invention, its feature also is, if continue to use software protecting equipment, then returns step B, otherwise execution in step D.
According to an aspect of the present invention, its feature also is, comprises among the step D: software sends the application that discharges the soft ware authorization permission to network edition software protecting equipment.
According to an aspect of the present invention, its feature also is, also comprises after step D: network edition software protecting equipment reclaims the soft ware authorization permission.
According to an aspect of the present invention, its feature is that also the information of other of the fixed key during network edition software protecting equipment is permitted by the inspection soft ware authorization and/or changeable key and/or soft ware authorization permission checks the soft ware authorization permission whether legal.
According to an aspect of the present invention, its feature also is, if the soft ware authorization permission is legal, then reclaims the soft ware authorization permission, otherwise does not allow software to discharge the soft ware authorization permission.
Description of drawings
Fig. 1: schematic flow sheet of the present invention.
Fig. 2: the soft ware authorization permission structural representation of one embodiment of the invention.
Fig. 3: the software license authorized application schematic flow sheet of one embodiment of the invention.
Fig. 4: the use schematic flow sheet of the soft ware authorization permission of one embodiment of the invention.
Fig. 5: the schematic flow sheet that the soft ware authorization of one embodiment of the invention discharges.
Embodiment
For making purpose of the present invention, technical scheme and advantage clearer, below with reference to the accompanying drawing embodiment that develops simultaneously, the present invention is further elaborated.
Fig. 1 is a process flow diagram of the present invention, as shown in Figure 1, and of the present invention may further comprise the steps:
Software end workflow:
Step 101, the permission of software application soft ware authorization.
In this step, when bringing into use network edition software protecting equipment, software is permitted to network edition software protecting equipment application soft ware authorization.
Step 102, software use the permission of acquisition soft ware authorization to call network edition software protecting equipment.
In this step, software is provided at the soft ware authorization permission of issuing in 114 steps to network edition software protecting equipment when calling network edition software protecting equipment.Can also comprise that simultaneously fixing the and/or changeable key that uses in the soft ware authorization permission encrypts the communication data between software and the network edition software protecting equipment.
Step 103 determines whether to finish calling network edition software protecting equipment.
In this step, software determines whether to need to continue to use software protecting equipment, continues if desired to use software protecting equipment, then returns step 102, otherwise execution in step 104.
Step 104, software discharge the soft ware authorization permission.
In this step, software sends the application that discharges the soft ware authorization permission to network edition software protecting equipment.
Network edition software protecting equipment end workflow:
Step 112 checks whether idle soft ware authorization permission is arranged.
In this step, whether the inspection of network edition software protecting equipment has idle soft ware authorization permission, and if any the soft ware authorization permission of free time, then execution in step 114, otherwise execution in step 113.
Step 113 finishes the application of soft ware authorization permission.
In this step, network edition software protecting equipment stops the process of software application soft ware authorization permission.Because software does not obtain the usage license of network edition software protecting equipment, thereby causes software can't use network edition software protecting equipment, reached the restriction purpose of the copy number of the software of use simultaneously.
Step 114, network edition software protecting equipment are that software is issued the soft ware authorization permission.
In this step, network edition software protecting equipment is issued the soft ware authorization permission for the software of application soft ware authorization permission.After software running process in software can get permission to call network edition software protecting equipment according to the permission of this soft ware authorization.Comprise a changeable key part in the soft ware authorization permission, the changeable key part after all can be updated in each use according to the rule that sets in advance.
Step 115, network edition software protecting equipment are checked the soft ware authorization permission.
In this step, whether the information of other of fixed key during the soft ware authorization that network edition software protecting equipment is sent by software end in the inspection step 102 is permitted and/or changeable key and/or soft ware authorization permission checks this soft ware authorization permission legal.If the soft ware authorization permission is legal, then execution in step 117, otherwise execution in step 116.
Step 116 finishes this and calls.
In this step, network edition software protecting equipment stops this invoked procedure.Because network edition software protecting equipment has stopped this invoked procedure, software can not get its data that need, so software can not continue operation.
Step 117 allows this to call.
In this step, the data that network edition software protecting equipment process software end is sent, and return result.Can also comprise simultaneously that the fixed key and/or the changeable key that use in the soft ware authorization permission are decrypted communication data.
Step 118, the changeable key in the network edition software protecting equipment update software authorization.
Network edition software protecting equipment in this step is according to the changeable key part in the Policy Updates soft ware authorization permission of preliminary election setting.
Step 119, network edition software protecting equipment reclaim the soft ware authorization permission.
In this step, whether the information of other of the fixed key during network edition software protecting equipment is permitted by the inspection soft ware authorization and/or changeable key and/or soft ware authorization permission checks this soft ware authorization permission legal.If legal, then reclaim the soft ware authorization permission, otherwise do not allow software to discharge this soft ware authorization permission.
The solution of the present invention is because the management of soft ware authorization permission is in network edition software protecting equipment inside, and the cracker can't obtain illegal software license by the authorization supervisory routine that cracks.
Fig. 2 is the structure of the soft ware authorization permission of one embodiment of the invention, and the soft ware authorization permission in the present embodiment comprises authorization index, authorization ID, key.Each soft ware authorization that uses permits that key all can be updated afterwards.
Fig. 3 is the soft ware authorization application process synoptic diagram of one embodiment of the invention, and as shown in Figure 3, soft ware authorization permission application may further comprise the steps:
Step 300, the software end generates the soft ware authorization license ID.
In this step, the software end generates the data of 4 bytes as the soft ware authorization license ID.
Step 301, the application soft ware authorization is permitted, and is sent the soft ware authorization license ID that generates to network edition software protecting equipment.
In this step, software sends to network edition software protecting equipment and generates the soft ware authorization license ID, permits to network edition software protecting equipment application soft ware authorization.
Step 302, whether have idle soft ware authorization permission, if having, issue the soft ware authorization permission if checking.
Whether the inspection of network edition software protecting equipment has idle soft ware authorization permission in this step.If have then issue soft ware authorization permission for software, and write down this soft ware authorization license ID, return soft ware authorization and permit to software.
Fig. 4 be one embodiment of the invention soft ware authorization can the use schematic flow sheet, as shown in Figure 4, this flow process comprises following steps:
The workflow of software end:
Step 400 uses the soft ware authorization license key to encrypt the data of calling network edition software protecting equipment.
The cryptographic algorithm of using in this step can be symmetry algorithm, asymmetric arithmetic.The algorithm that present embodiment uses is encrypted soft ware authorization license ID and software license index with the DES algorithm earlier.Use the des encryption result that data are made XOR.
Step 401 uses the soft ware authorization permission to call network edition software protecting equipment.
In this step, software from the application of network edition software protecting equipment to soft ware authorization permission all or part of information and encrypt after the data of calling send to network edition software protecting equipment.In the present embodiment, software only needs to permit soft ware authorization the key of index, soft ware authorization permission and the software protecting equipment that data encrypted sends to the network edition to get final product.
Step 402, the key part in the permission of software upgrading soft ware authorization.
In this step, the software end is according to the key part in the rule transformation soft ware authorization permission that sets in advance.With the new key data decryption to returning in step 403 after changing, and in calling next time, data are encrypted.
Step 403, the data of using the new key deciphering to return.
In this step, the data that software uses the new key decryption step 415 after upgrading to return, the decipherment algorithm of use is identical with the employed algorithm of step 400.
The workflow of network edition software protecting equipment:
Step 412, network edition software protecting equipment are checked the soft ware authorization permission.
In this step; network edition software protecting equipment by check key whether with network edition software protecting equipment in the key agreement preserved check whether the soft ware authorization permission legal; if inconsistent then think that soft ware authorization permission is illegal, if unanimity then think that the soft ware authorization permission is legal.
Step 413 if the soft ware authorization permission is legal, allows to call, otherwise does not allow.
In this step,, then stop this and call if the soft ware authorization permission is illegal in the step 412; If legal, then use the call data of the secret key decryption of soft ware authorization permission from software termination receipts, allow software transfer network edition software protecting equipment.The decipherment algorithm that uses is identical with the employed algorithm of step 400.
Step 414, the key of update software authorization.
In this step, network edition software protecting equipment is used for the data that step 415 encryption return data and next deciphering are called according to the key part of the Policy Updates soft ware authorization permission that sets in advance.
Step 415 uses new key to encrypt the data of returning.
In this step, network edition software protecting equipment uses the secret key encryption return data after upgrading.The cryptographic algorithm of using is identical with the employed algorithm of step 400.
Fig. 5 is the release schematic flow sheet of soft ware authorization permission, and as shown in Figure 5, the release flow process of soft ware authorization permission comprises following steps
Step 501, software discharge the soft ware authorization permission.
In this step, software sends to network edition software protecting equipment to the key of soft ware authorization permission index and soft ware authorization permission.
Step 502, network edition software protecting equipment reclaim the soft ware authorization permission.
In this step, the soft ware authorization license key that the inspection of network edition software protecting equipment is received from the software termination.If legal, network edition software protecting equipment reclaims the soft ware authorization permission.Otherwise do not allow the release of this soft ware authorization permission.

Claims (15)

1, a kind of method of client terminal quantity of Control Network version software protecting equipment is characterized in that the method comprising the steps of:
A, when bringing into use network edition software protecting equipment, software is permitted to network edition software protecting equipment application soft ware authorization;
B, in software running process, software uses the soft ware authorization permission to call network edition software protecting equipment;
C, at every turn use soft ware authorization permission after, network edition software protecting equipment is the update software authorization all;
D, when finish using network edition software protecting equipment, software discharges the soft ware authorization permission.
2, method according to claim 1 is characterized in that, also comprises in the steps A: whether the inspection of network edition software protecting equipment has idle soft ware authorization permission.
3, method according to claim 2 is characterized in that, if idle soft ware authorization permission is arranged, network edition software protecting equipment is that software is issued the soft ware authorization permission so; If do not have idle soft ware authorization permission, finish the application of soft ware authorization permission so.
4, method according to claim 1 is characterized in that, also comprises among the step B: software all must provide described soft ware authorization permission at every turn when calling network edition software protecting equipment.
5, method according to claim 4 is characterized in that, also comprises among the step B: network edition software protecting equipment is checked the soft ware authorization permission.
6, method according to claim 5; it is characterized in that network edition software protecting equipment checks this soft ware authorization permission whether legal by other information of the fixed key in the permission of inspection soft ware authorization and/or changeable key and/or soft ware authorization permission.
7, method according to claim 6 is characterized in that, if the soft ware authorization permission is legal, then allows software transfer network edition software protecting equipment, otherwise stops software transfer network edition software protecting equipment.
8, method according to claim 4 is characterized in that, also comprises among the step B: use fixed key and/or changeable key in the soft ware authorization permission that the communication data between software and the network edition software protecting equipment is encrypted.
9, method according to claim 8 is characterized in that, also comprises among the step C: network edition software protecting equipment is according to changeable key in the predetermined Policy Updates soft ware authorization permission.
10, method according to claim 9 is characterized in that, also comprises after step C: determine whether to finish calling network edition software protecting equipment.
11, method according to claim 10 is characterized in that, if continue to use software protecting equipment, then returns step B, otherwise execution in step D.
12, according to the described method of claim 1-11, it is characterized in that, comprise among the step D: software sends the application that discharges the soft ware authorization permission to network edition software protecting equipment.
13, method according to claim 12 is characterized in that, also comprises after step D: network edition software protecting equipment reclaims the soft ware authorization permission.
14, method according to claim 13; it is characterized in that the information of other of the fixed key during network edition software protecting equipment is permitted by the inspection soft ware authorization and/or changeable key and/or soft ware authorization permission checks the soft ware authorization permission whether legal.
15, method according to claim 14 is characterized in that, if the soft ware authorization permission is legal, then reclaims the soft ware authorization permission, otherwise does not allow software to discharge the soft ware authorization permission.
CNA2008101065667A 2008-05-14 2008-05-14 Method for using network edition software protecting equipment to control software client terminal quantity Pending CN101281569A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008101065667A CN101281569A (en) 2008-05-14 2008-05-14 Method for using network edition software protecting equipment to control software client terminal quantity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008101065667A CN101281569A (en) 2008-05-14 2008-05-14 Method for using network edition software protecting equipment to control software client terminal quantity

Publications (1)

Publication Number Publication Date
CN101281569A true CN101281569A (en) 2008-10-08

Family

ID=40014033

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008101065667A Pending CN101281569A (en) 2008-05-14 2008-05-14 Method for using network edition software protecting equipment to control software client terminal quantity

Country Status (1)

Country Link
CN (1) CN101281569A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105354448A (en) * 2015-12-07 2016-02-24 北京金山安全软件有限公司 Authorization management method and device
CN106951741A (en) * 2017-03-15 2017-07-14 北京深思数盾科技股份有限公司 A kind of software license management method and device
CN108111534A (en) * 2018-01-11 2018-06-01 新华三云计算技术有限公司 A kind of method and device for controlling authorization
CN111737660A (en) * 2020-06-28 2020-10-02 浙江大华技术股份有限公司 Method, system and storage medium for realizing software authorization

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105354448A (en) * 2015-12-07 2016-02-24 北京金山安全软件有限公司 Authorization management method and device
CN106951741A (en) * 2017-03-15 2017-07-14 北京深思数盾科技股份有限公司 A kind of software license management method and device
CN108111534A (en) * 2018-01-11 2018-06-01 新华三云计算技术有限公司 A kind of method and device for controlling authorization
CN108111534B (en) * 2018-01-11 2021-02-05 新华三云计算技术有限公司 Method and device for controlling authorization permission
CN111737660A (en) * 2020-06-28 2020-10-02 浙江大华技术股份有限公司 Method, system and storage medium for realizing software authorization
CN111737660B (en) * 2020-06-28 2023-11-17 浙江大华技术股份有限公司 Method, system and storage medium for realizing software authorization

Similar Documents

Publication Publication Date Title
CN103026347B (en) Virutal machine memory in multicore architecture divides
CN101404056B (en) Software protection method, apparatus and equipment
US8660964B2 (en) Secure device licensing
CN112074836A (en) Apparatus and method for protecting data through trusted execution environment
CN100495421C (en) Authentication protection method based on USB device
CN102855446A (en) Resource management system and corresponding method
CN101494541B (en) System and method for implementing security protection of PIN code
CN103906054A (en) Method and system for authorization of software function modules of internet of things
CN104700002A (en) Software protecting, authorizing and registering method
JP2003506921A (en) Adapter having protection function and computer protection system using the same
US20120173884A1 (en) Method for remotely controlling and monitoring the data produced on desktop on desktop software
CN101866404A (en) Software system module independent authorization control method and device
CN104573549A (en) Credible method and system for protecting confidentiality of database
CN109598104B (en) Software authorization protection system and method based on timestamp and secret authentication file
US7603566B2 (en) Authenticated process switching on a microprocessor
CN105740725A (en) File protection method and system
CN110990851B (en) Static data encryption protection method and system
US7770001B2 (en) Process and method to distribute software product keys electronically to manufacturing entities
CN103268435A (en) Intranet license generation method and system, and intranet license protection method and system
CN109918934A (en) Research and development data safety and secrecy system based on tri- layers of dynamic encryption technology of AES
CN101281569A (en) Method for using network edition software protecting equipment to control software client terminal quantity
CN101286987B (en) Method for transferring authority license of software
CN101458744A (en) Digital copyright management proxy system based on dependable computing concept
CN101860436A (en) Technology for accurately controlling system user data authority
JP2007179357A (en) Method for installing computer program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20081008