CN102054135A - Software authorization method and device - Google Patents

Software authorization method and device Download PDF

Info

Publication number
CN102054135A
CN102054135A CN2009102374200A CN200910237420A CN102054135A CN 102054135 A CN102054135 A CN 102054135A CN 2009102374200 A CN2009102374200 A CN 2009102374200A CN 200910237420 A CN200910237420 A CN 200910237420A CN 102054135 A CN102054135 A CN 102054135A
Authority
CN
China
Prior art keywords
soft ware
ware authorization
authorization file
terminal
software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2009102374200A
Other languages
Chinese (zh)
Other versions
CN102054135B (en
Inventor
刘彦君
万巍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New Founder Holdings Development Co ltd
Founder Apabi Technology Ltd
Original Assignee
Peking University Founder Group Co Ltd
Beijing Founder Apabi Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peking University Founder Group Co Ltd, Beijing Founder Apabi Technology Co Ltd filed Critical Peking University Founder Group Co Ltd
Priority to CN2009102374200A priority Critical patent/CN102054135B/en
Publication of CN102054135A publication Critical patent/CN102054135A/en
Application granted granted Critical
Publication of CN102054135B publication Critical patent/CN102054135B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a software authorization method and a software authorization device and relates to the field of digital copyright protection. The method and the device are used for solving the problem that the software authorization is inaccurate because a user, at present, can copy software on one terminal to another terminal to allow other users to use residual software and hardware encryption devices. The invention adopts a technical scheme that: a software authorization file which has an attribute of rejecting to exist in the same terminal with other software authorization files is generated for the terminal configured with the software; and before the configured software is run, the software authorization file and preset information on the hardware encryption devices are verified. The technical scheme provided by the embodiment of the invention can be used in software authorization technique.

Description

A kind of method and apparatus of soft ware authorization
Technical field
The present invention relates to the digital copyright protecting field, relate in particular to a kind of method and apparatus of soft ware authorization.
Background technology
Because the reproducibility of software, the software piracy phenomenon is very general, the software of bootlegging, meeting grievous injury software developer's interests, reduction programmer's enthusiasm.
Distributed software system is a kind of computer system of multiple terminals, constitutes unified software systems by the internet between each terminal.Distributed software system adopts the structure of Distributed Calculation, and the task of CPU in the original single system is disperseed to different terminals, and different software is installed on different terminals, by the mutual co-ordination between each terminal, realizes different systemic-functions.
Existing method of authorizing for a distributed software system is to hardware encipher device of each terminal distribution, to realize soft ware authorization by identification hardware encipher device information.
In realizing process of the present invention, the inventor finds prior art, and there are the following problems at least: owing to give the hardware encipher device of each terminal distribution in the same distributed software system identical, the user can copy to the software on the terminal on another terminal, and use to other users unnecessary software and hardware encryption device, cause soft ware authorization inaccurate.
Summary of the invention
Embodiments of the invention provide a kind of method and apparatus of soft ware authorization, can carry out soft ware authorization like clockwork to distributed software system.
For achieving the above object, embodiments of the invention adopt following technical scheme:
A kind of method of soft ware authorization comprises:
Be the terminal generation soft ware authorization file of install software, described arbitrary soft ware authorization file has the attribute that repels with a terminal of other soft ware authorization file coexistences;
Before operation institute installed software, described soft ware authorization file and the hardware encipher device information that sets in advance are verified.
A kind of device of soft ware authorization comprises:
First generation unit is used to the terminal of install software to generate the soft ware authorization file, and described arbitrary soft ware authorization file has the attribute that repels with a terminal of other soft ware authorization file coexistences;
Authentication unit is used for before operation institute installed software soft ware authorization file that is generated by described first generation unit and the hardware encipher device information that sets in advance being verified.
The method and apparatus of the soft ware authorization that the embodiment of the invention provides is by the two provides soft ware authorization in conjunction with the method for verifying to soft ware authorization file and hardware encipher device.Because described soft ware authorization file has the attribute that repels with a terminal of other soft ware authorization file coexistences, prevented that the soft ware authorization file is copied on other terminal, make the software on each terminal on this terminal, to use, having solved present user can copy to the software on the terminal on another terminal, and use to other users unnecessary software and hardware encryption device, cause the inaccurate problem of soft ware authorization.The technical scheme that the embodiment of the invention provides can be carried out soft ware authorization like clockwork to distributed software system.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, to do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below, apparently, accompanying drawing in describing below is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
The method flow diagram of the soft ware authorization that Fig. 1 provides for the embodiment of the invention;
The method flow diagram of the soft ware authorization that Fig. 2 provides for another embodiment of the present invention;
The method flow diagram of step 205 in the method flow diagram of the soft ware authorization that Fig. 3 provides for another embodiment of the present invention;
The apparatus structure synoptic diagram one of the soft ware authorization that Fig. 4 provides for the embodiment of the invention;
The structural representation of first generation unit 401 in the device of the soft ware authorization that Fig. 5 provides for the embodiment of the invention;
The apparatus structure synoptic diagram two of the soft ware authorization that Fig. 6 provides for the embodiment of the invention;
The structural representation of authentication unit 402 in the device of the soft ware authorization that Fig. 7 provides for the embodiment of the invention.
Embodiment
For the purpose, technical scheme and the advantage that make the embodiment of the invention clearer, below in conjunction with the accompanying drawing in the embodiment of the invention, technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not paying the every other embodiment that is obtained under the creative work prerequisite.
Software on the terminal can be copied on another terminal in order to solve present user, and use to other users unnecessary software and hardware encryption device, cause the inaccurate problem of soft ware authorization, the embodiment of the invention provides a kind of method and apparatus of soft ware authorization.
As shown in Figure 1, the method for the soft ware authorization that the embodiment of the invention provides comprises:
Step 101 is the terminal generation soft ware authorization file of install software, and described arbitrary soft ware authorization file has the attribute that repels with a terminal of other soft ware authorization file coexistences;
Step 102 before operation institute installed software, is verified described soft ware authorization file and the hardware encipher device information that sets in advance.
The method of the soft ware authorization that the embodiment of the invention provides is by the two provides soft ware authorization in conjunction with the method for verifying to soft ware authorization file and hardware encipher device.Because described soft ware authorization file has the attribute that repels with a terminal of other soft ware authorization file coexistences, prevented that the soft ware authorization file is copied on other terminal, make the software on each terminal on this terminal, to use, having solved present user can copy to the software on the terminal on another terminal, and use to other users unnecessary software and hardware encryption device, cause the inaccurate problem of soft ware authorization.The technical scheme that the embodiment of the invention provides can be carried out soft ware authorization like clockwork to distributed software system.
In order to make those skilled in the art can more be expressly understood the technical scheme that the embodiment of the invention provides, below by specific embodiment, the method for the soft ware authorization that another embodiment of the present invention is provided is elaborated.
As shown in Figure 2, the method for the soft ware authorization that another embodiment of the present invention provides comprises:
Step 201 is for an above software on each terminal in the distributed software system is provided with unique sign respectively;
In the present embodiment, be example so that three terminals to be arranged in the distributed software system, three terminals are known as terminal 1, terminal 2 and terminal 3 respectively.Two softwares are installed on terminal 1, unique A, B of being designated are set for these two softwares respectively; A software is installed on terminal 2, give this software setting unique be designated C; Three softwares are installed on terminal 3, unique D, E, F of being designated are set for these three softwares respectively.Wherein, the installation number of described software on terminal can rationally be disposed according to user intention, and be for example bigger if software takies resource, can on a terminal this software only be installed, to improve the processing speed of terminal; Also several less softwares of resource that take can be installed on the terminal together, the concrete condition of the software of buying on the user is decided.
Step 202 is for described each terminal is provided with the hardware encipher device information;
In the present embodiment, the hardware encipher device can be a softdog commonly used at present, also can be other hardware encipher device.For example,, in described three hardware encipher devices, write identical hardware identification sequence number respectively for terminal 1, terminal 2, terminal 3 are distributed a hardware encipher device respectively, or other identical hardware information.Suppose that this hardware identification sequence number is 111, it is 111 hardware encipher device that then described three terminals all have a hardware identification sequence number.
Step 203 is that described terminal generates the soft ware authorization file according to described sign and described hardware encipher device information;
In the present embodiment, corresponding three the different soft ware authorization files of three terminals, the soft ware authorization file of each terminal correspondence be according to this terminal corresponding hardware encryption device information and on this terminal the sign of installed software generate.Preferably, described soft ware authorization file is the XML file layout, and described XML file is generated by Automatic Program.Soft ware authorization file 1 with generation terminal 1 is that example illustrates, the sequence number of the hardware encipher device of terminal 1 is 111, install software is designated A and B on the terminal 1, therefore, form is that the value of the node of the described hardware encipher device of expression in the soft ware authorization file 1 of XML is 111, and the value of representing the node of described software identification is A, B; In like manner, can generate soft ware authorization file 2, the value of wherein said each node is respectively 111, C; Soft ware authorization file 3, the value of wherein said each node is respectively 111, D, E, F.Three soft ware authorization files that generate place respectively on the corresponding terminal, and arbitrary soft ware authorization file has the attribute that repels with a terminal of other soft ware authorization file coexistences, and promptly can only there be a soft ware authorization file in each terminal.For example, three soft ware authorization files adopt identical filename, leave in respectively under the assigned catalogue of each terminal, if soft ware authorization file 2 is copied on the terminal 1, can override original legal soft ware authorization file 1, thereby prevent that the soft ware authorization file is replicated.
Step 204 generates the eap-message digest of described soft ware authorization file;
In the present embodiment, in order to prevent that the soft ware authorization file from being distorted, behind the generation soft ware authorization file, described soft ware authorization file is made eap-message digest, promptly adopt certain cryptographic algorithm to encrypt, generate the fixing eap-message digest of a string length described soft ware authorization file.Described cryptographic algorithm can be MD5, or SHA1, or other cryptographic algorithm.The eap-message digest difference that different soft ware authorization files generates is distinguished called after eap-message digest 1, eap-message digest 2 and eap-message digest 3 with it, three eap-message digests that generate is write respectively in the corresponding soft ware authorization file manage.
Step 205 before operation institute installed software, is verified described soft ware authorization file and described hardware encipher device information.
Further, as shown in Figure 3, to how carrying out user rs authentication be described in detail below, below all to move the software that is designated A on the terminal 1 with the user be that example illustrates:
Step 301 is obtained described soft ware authorization file and described hardware encipher device information;
In the present embodiment, when the user moves software A on the terminal 1, whether at first will judge on the terminal 1 existing hardware encipher device, if the hardware encipher device is not connected to terminal 1, the prompting user does not have the hardware encipher device, and software can not move; If the hardware encipher device has been connected to terminal 1, read the hardware identification sequence number of described hardware encipher device.
In the present embodiment, obtaining the soft ware authorization file is to obtain by the soft ware authorization fileinfo that is stored in advance on the reading terminals 1 under the assigned catalogue.
Step 302 judges whether described soft ware authorization file is modified;
In the present embodiment, the soft ware authorization fileinfo that reads in the step 301 is made eap-message digest, compare and judge whether this soft ware authorization fileinfo is modified with the eap-message digest in being stored in this soft ware authorization file in advance, wherein, that the soft ware authorization fileinfo is made the cryptographic algorithm that adopts in cryptographic algorithm that eap-message digest adopts and the step 204 is identical for this step.For example, if the soft ware authorization fileinfo that reads on terminal 1 in the step 301 is a soft ware authorization file 1, soft ware authorization file 1 is made eap-message digest, compare with the eap-message digest 1 in the described soft ware authorization file 1, see whether both are identical, if identical, then soft ware authorization file 1 is not modified, and changes step 303 over to; If different, prompting user software authority 1 is modified, and software can not move.In like manner, if the soft ware authorization fileinfo that reads on terminal 1 in the step 301 is a soft ware authorization file 2, soft ware authorization file 2 is made eap-message digest, compare with the eap-message digest 2 in the described soft ware authorization file 2, see whether both are identical, if identical, then soft ware authorization file 2 is not modified, and changes step 303 over to; If different, prompting user software authority 2 is modified, and software can not move.
Step 303 judges whether described soft ware authorization file and described hardware encipher device information mate;
In the present embodiment, if what read on terminal 1 in the step 301 is the hardware identification sequence number 111 of the hardware encipher device of this distributed software system, what suppose to read on terminal 1 is the soft ware authorization file 1 that is not modified, the value of the node of expression hardware encipher device is 111 in the then described soft ware authorization file 1, be complementary with hardware identification sequence number 111, change step 304 over to; What suppose to read on terminal 1 in the step 301 is the soft ware authorization file 2 that is not modified, and the value of the node of expression hardware encipher device is 111 in the then described soft ware authorization file 2, is complementary with hardware identification sequence number 111, changes step 304 over to; In like manner, what suppose to read on terminal 1 in the step 301 is the soft ware authorization file 3 that is not modified, and situation is similar, repeats no more.If what read on terminal 1 in the step 301 is the hardware identification sequence number 101 of the hardware encipher device of other distributed software systems, be which soft ware authorization file then regardless of what read, the value of the node of its expression hardware encipher device does not all match with described hardware identification sequence number 101, at this moment, prompting user hardware and software does not match, and software can not move.
Step 304 judges whether comprise the current sign of wanting operating software in the described soft ware authorization file;
In the present embodiment, what read on the terminal 1 is under the situation of hardware identification sequence number 111 of hardware encipher device of this distributed software system, what suppose to read on terminal 1 is the soft ware authorization file 1 that is not modified, the nodal value of expression software identification is A, B in the then described soft ware authorization file 1, the sign A that has comprised the software that the user will move, checking is passed through, and allows user's operation to be designated the software of A; What suppose to read on terminal 1 is the soft ware authorization file 2 that is not modified, the value of the node of expression software identification is C in the then described soft ware authorization file 2, the sign A that does not comprise the software that the user will move, prompting user software authority mistake, software can not move; In like manner, what suppose to read on terminal 1 is the soft ware authorization file 3 that is not modified, the value of the node of expression software identification is D, E, F in the then described soft ware authorization file 3, the sign A that does not comprise the software that the user will move, prompting user software authority mistake, software can not move.
In the present embodiment, can adopt logical value 0 and 1 to represent whether comprise the current sign A that wants operating software in the soft ware authorization file.When described logical value is 0, represent to verify and do not pass through that the user can not move this software A; Otherwise the user is operating software A normally.
The method of the soft ware authorization that the embodiment of the invention provides is by the two provides soft ware authorization in conjunction with the method for verifying to soft ware authorization file and hardware encipher device.Because described soft ware authorization file has the attribute that repels with a terminal of other soft ware authorization file coexistences, prevented that the soft ware authorization file is copied on other terminal, make the software on each terminal on this terminal, to use, having solved present user can copy to the software on the terminal on another terminal, and use to other users unnecessary software and hardware encryption device, cause the inaccurate problem of soft ware authorization.The technical scheme that the embodiment of the invention provides can be carried out soft ware authorization like clockwork to distributed software system.
As shown in Figure 4, the embodiment of the invention also provides a kind of device of soft ware authorization, comprising:
First generation unit 401, be used to the terminal of install software to generate the soft ware authorization file, described arbitrary soft ware authorization file has the attribute that repels with a terminal of other soft ware authorization file coexistences, its concrete implementation method can be described referring to step 201 as shown in Figure 2~203, repeats no more herein.
Authentication unit 402, be used for before operation institute installed software, soft ware authorization file that is generated by described first generation unit 401 and the hardware encipher device information that sets in advance are verified, its concrete implementation method can be described referring to step 301 as shown in Figure 3~304, repeats no more herein.
Further, as shown in Figure 5, described first generation unit 401 comprises:
Unit 4011 is set, is used to an above software of installing on the described terminal that unique sign is set respectively;
First generates subelement 4012, is used for according to by the described hardware encipher device information that the sign of unit 4011 settings is set and sets in advance being described terminal generation soft ware authorization file.
Further, as shown in Figure 6, the device of the soft ware authorization that the embodiment of the invention provides also comprises:
Second generation unit 403 is used to generate the eap-message digest by the soft ware authorization file of described first generation unit 401 generations, and its concrete implementation method can be described referring to step 204 as shown in Figure 2, repeats no more herein.
Further, as shown in Figure 7, described authentication unit 402 comprises:
Acquiring unit 4021 is used to obtain soft ware authorization file and the described hardware encipher device information that is generated by described first generation unit 401;
The 3rd judging unit 4025 is used to judge whether described soft ware authorization file is modified;
First judging unit 4022 is used to judge whether described soft ware authorization file and described hardware encipher device information mate;
Second judging unit 4023 is used for judging whether described soft ware authorization file comprises the current sign of wanting operating software;
Output unit 4024 is used to export the judged result by described first judging unit and described second judging unit.
The device of the soft ware authorization that the embodiment of the invention provides is by the two provides soft ware authorization in conjunction with the method for verifying to soft ware authorization file and hardware encipher device.Because described soft ware authorization file has the attribute that repels with a terminal of other soft ware authorization file coexistences, prevented that the soft ware authorization file is copied on other terminal, make the software on each terminal on this terminal, to use, having solved present user can copy to the software on the terminal on another terminal, and use to other users unnecessary software and hardware encryption device, cause the inaccurate problem of soft ware authorization.The technical scheme that the embodiment of the invention provides can be carried out soft ware authorization like clockwork to distributed software system.
One of ordinary skill in the art will appreciate that all or part of step that realizes in the foregoing description method is to instruct relevant hardware to finish by program, described program can be stored in the computer-readable recording medium, as ROM/RAM, magnetic disc or CD etc.
The above; only be the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, anyly is familiar with those skilled in the art in the technical scope that the present invention discloses; can expect easily changing or replacing, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion by described protection domain with claim.

Claims (12)

1. the method for a soft ware authorization is characterized in that, comprising:
Be the terminal generation soft ware authorization file of install software, described arbitrary soft ware authorization file has the attribute that repels with a terminal of other soft ware authorization file coexistences;
Before operation institute installed software, described soft ware authorization file and the hardware encipher device information that sets in advance are verified.
2. the method for soft ware authorization according to claim 1 is characterized in that, described terminal for install software generates the soft ware authorization file and is: for each terminal in the distributed software system generates the soft ware authorization file respectively.
3. the method for soft ware authorization according to claim 1, it is characterized in that, the implementation method that described arbitrary soft ware authorization file has the attribute of a repulsion and a terminal of other soft ware authorization file coexistences is: described soft ware authorization file is stored under the preassigned catalogue, and the title of each soft ware authorization file is identical
4. the method for soft ware authorization according to claim 1 is characterized in that, described terminal for install software generates the soft ware authorization file and comprises:
For an above software of installing on the described terminal is provided with unique sign respectively;
According to described sign and the hardware encipher device information that sets in advance is that described terminal generates the soft ware authorization file.
5. the method for soft ware authorization according to claim 1 is characterized in that, described is that the terminal of install software generates after the soft ware authorization file, also comprises:
Generate the eap-message digest of described soft ware authorization file.
6. the method for soft ware authorization according to claim 1 is characterized in that, and is described before operation institute installed software, described soft ware authorization file verified with the hardware encipher device information that sets in advance comprise:
Obtain described soft ware authorization file and described hardware encipher device information;
When described soft ware authorization file and described hardware encipher device information coupling, and when comprising the current sign of wanting operating software in the described soft ware authorization file, checking is passed through.
7. the method for soft ware authorization according to claim 6 is characterized in that, described obtaining after the described soft ware authorization file also comprises:
Judge whether described soft ware authorization file is modified.
8. the device of a soft ware authorization is characterized in that, comprising:
First generation unit is used to the terminal of install software to generate the soft ware authorization file, and described arbitrary soft ware authorization file has the attribute that repels with a terminal of other soft ware authorization file coexistences;
Authentication unit is used for before operation institute installed software soft ware authorization file that is generated by described first generation unit and the hardware encipher device information that sets in advance being verified.
9. the device of soft ware authorization according to claim 8 is characterized in that, described first generation unit comprises:
The unit is set, is used to an above software of installing on the described terminal that unique sign is set respectively;
First generates subelement, is used for according to by the described hardware encipher device information that the sign of unit setting is set and sets in advance being described terminal generation soft ware authorization file.
10. the device of soft ware authorization according to claim 8 is characterized in that, also comprises:
Second generation unit is used to generate the eap-message digest by the soft ware authorization file of described first generation unit generation.
11. the device of soft ware authorization according to claim 8 is characterized in that, described authentication unit comprises:
Acquiring unit is used to obtain soft ware authorization file and the described hardware encipher device information that is generated by described first generation unit;
First judging unit is used to judge whether described soft ware authorization file and described hardware encipher device information mate;
Second judging unit is used for judging whether described soft ware authorization file comprises the current sign of wanting operating software;
Output unit is used to export the judged result by described first judging unit and described second judging unit.
12. the device of soft ware authorization according to claim 11 is characterized in that, described authentication unit also comprises:
The 3rd judging unit is used to judge whether described soft ware authorization file is modified.
CN2009102374200A 2009-11-06 2009-11-06 Software authorization method and device Expired - Fee Related CN102054135B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009102374200A CN102054135B (en) 2009-11-06 2009-11-06 Software authorization method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009102374200A CN102054135B (en) 2009-11-06 2009-11-06 Software authorization method and device

Publications (2)

Publication Number Publication Date
CN102054135A true CN102054135A (en) 2011-05-11
CN102054135B CN102054135B (en) 2013-07-10

Family

ID=43958445

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009102374200A Expired - Fee Related CN102054135B (en) 2009-11-06 2009-11-06 Software authorization method and device

Country Status (1)

Country Link
CN (1) CN102054135B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102236759A (en) * 2011-07-29 2011-11-09 飞天诚信科技股份有限公司 Method and device for adjusting authorization of encryption lock module
CN104537282A (en) * 2014-12-04 2015-04-22 中国电子科技集团公司第二十二研究所 Encryption flash disk and large data computation technology based authorization use method
CN104751037A (en) * 2015-04-10 2015-07-01 无锡海斯凯尔医学技术有限公司 Use control method and system for medical inspection equipment and medical inspection equipment
CN105930693A (en) * 2016-04-29 2016-09-07 杭州华三通信技术有限公司 Software authorization method and apparatus
CN106650328A (en) * 2016-12-15 2017-05-10 广州视源电子科技股份有限公司 Terminal function authorization method and device
CN107784206A (en) * 2017-11-10 2018-03-09 北京深思数盾科技股份有限公司 Method for protecting software and device and software verification method and device
CN108038354A (en) * 2017-12-08 2018-05-15 珠海华索软件科技有限公司 A kind of method and system of plug-in type software anti-copying

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6697948B1 (en) * 1999-05-05 2004-02-24 Michael O. Rabin Methods and apparatus for protecting information
DE10023820B4 (en) * 2000-05-15 2006-10-19 Siemens Ag Software protection mechanism
JP2002108482A (en) * 2000-10-04 2002-04-10 Morisawa:Kk Method for managing software license
CN1584771A (en) * 2004-05-27 2005-02-23 深圳市宏宇新科技有限公司 Software encrypting method
CN1315017C (en) * 2004-12-20 2007-05-09 四川大学 Method for software copyright protection
CN101119207B (en) * 2007-09-21 2012-09-05 北京意科通信技术有限责任公司 Authorization control method aimed at server

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102236759B (en) * 2011-07-29 2013-11-13 飞天诚信科技股份有限公司 Method and device for adjusting authorization of encryption lock module
CN102236759A (en) * 2011-07-29 2011-11-09 飞天诚信科技股份有限公司 Method and device for adjusting authorization of encryption lock module
CN104537282A (en) * 2014-12-04 2015-04-22 中国电子科技集团公司第二十二研究所 Encryption flash disk and large data computation technology based authorization use method
CN104537282B (en) * 2014-12-04 2017-10-27 中国电子科技集团公司第二十二研究所 It is a kind of that method is licensed based on encryption flash memory disk and big data computing
CN104751037B (en) * 2015-04-10 2018-06-12 无锡海斯凯尔医学技术有限公司 Use control method, system and the medical treatment detection device of medical treatment detection device
CN104751037A (en) * 2015-04-10 2015-07-01 无锡海斯凯尔医学技术有限公司 Use control method and system for medical inspection equipment and medical inspection equipment
WO2016161704A1 (en) * 2015-04-10 2016-10-13 无锡海斯凯尔医学技术有限公司 Usage control method and system for medical detection device and medical detection device
US11205512B2 (en) 2015-04-10 2021-12-21 Wuxi Hisky Medical Technologies Co., Ltd. Usage control method and system for medical detection device, and medical detection device
CN105930693A (en) * 2016-04-29 2016-09-07 杭州华三通信技术有限公司 Software authorization method and apparatus
CN105930693B (en) * 2016-04-29 2019-04-09 新华三技术有限公司 A kind of method and apparatus of soft ware authorization
CN106650328A (en) * 2016-12-15 2017-05-10 广州视源电子科技股份有限公司 Terminal function authorization method and device
CN107784206A (en) * 2017-11-10 2018-03-09 北京深思数盾科技股份有限公司 Method for protecting software and device and software verification method and device
CN108038354A (en) * 2017-12-08 2018-05-15 珠海华索软件科技有限公司 A kind of method and system of plug-in type software anti-copying

Also Published As

Publication number Publication date
CN102054135B (en) 2013-07-10

Similar Documents

Publication Publication Date Title
CN102054135B (en) Software authorization method and device
KR100338397B1 (en) Method and apparatus for verifying that the data in the data file is genuine
CN101375542B (en) Methods and apparatus for managing secured software for a wireless device
US8074287B2 (en) Renewable and individualizable elements of a protected environment
KR101008448B1 (en) Systems and methods for deterring software piracy in a volume license environment
KR101301332B1 (en) Secure machine counting
EP1735939A1 (en) Digital license sharing system and method
KR20060015547A (en) Method of storing revocation list
JP2002319230A (en) Recording medium, information processor, server, and method, program for contents distribution and recording medium thereof
CN102479305A (en) Software licensing verification method and system
KR20140109952A (en) Detection of invalid escrow keys
US20100223469A1 (en) Method, System and Computer Program Product for Certifying Software Origination
EP1785901B1 (en) Secure License Key Method and System
CN114398686A (en) Block chain-based file storage method, device, equipment and storage medium
WO2004097606A1 (en) Method of updating revocation list
JP5141056B2 (en) Information processing apparatus and data transfer method of information processing apparatus
JP2010072760A (en) Device, system and program for cooperating with authentication function
CN112101945B (en) Method and system for supervising block chain content
CN101849239A (en) Computer enabled method and apparatus to inhibit content and other copying
CN110889126A (en) Optimized Web application permission control method
US8438624B2 (en) Systems and methods of modifying system resources
CN109977631B (en) Software authorization method and system based on cluster deployment
EP1971073A2 (en) Method and apparatus for conditionally decrypting content
JP2013511090A (en) Content merge at first access
KR101738604B1 (en) System and method for preventing illegal use of library

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220620

Address after: 3007, Hengqin international financial center building, No. 58, Huajin street, Hengqin new area, Zhuhai, Guangdong 519031

Patentee after: New founder holdings development Co.,Ltd.

Patentee after: FOUNDER APABI TECHNOLOGY Ltd.

Address before: 100871, Beijing, Haidian District Cheng Fu Road 298, founder building, 5 floor

Patentee before: PEKING UNIVERSITY FOUNDER GROUP Co.,Ltd.

Patentee before: FOUNDER APABI TECHNOLOGY Ltd.

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130710

CF01 Termination of patent right due to non-payment of annual fee