CN102088354B - Software licensing authentication method based on digital mobile communication - Google Patents

Software licensing authentication method based on digital mobile communication Download PDF

Info

Publication number
CN102088354B
CN102088354B CN2011100682134A CN201110068213A CN102088354B CN 102088354 B CN102088354 B CN 102088354B CN 2011100682134 A CN2011100682134 A CN 2011100682134A CN 201110068213 A CN201110068213 A CN 201110068213A CN 102088354 B CN102088354 B CN 102088354B
Authority
CN
China
Prior art keywords
user
data
authentication
software
authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2011100682134A
Other languages
Chinese (zh)
Other versions
CN102088354A (en
Inventor
程必中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2011100682134A priority Critical patent/CN102088354B/en
Publication of CN102088354A publication Critical patent/CN102088354A/en
Application granted granted Critical
Publication of CN102088354B publication Critical patent/CN102088354B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to a software licensing authentication method based on digital mobile communication, which is performed among a user intelligent terminal, a mobile communication service provider and a software licensing authentication server. An external hardware used in the invention is a mobile phone or a mobile net card which can be used as a modem, so the authentication codes are not changed with the change of internal hardware to cause the failure of authentication; the same account number theoretically has no limit to the number of software which needs licensing authentication, and the software can be increased or reduced according to requirements; the authentication of software licensing is completed at a server terminal, so as to avoid the cracking of relevant cracking toolslike a memory patch, and a key generator and the like to the licensed software; a digital mobile communication account number provided by a mobile communication service provider is used; and the mobile service provider can ensure the uniqueness of the account number which is used as a unique licensed authentication account number of the server terminal, so that the safety of the software licensing authentication is ensured.

Description

Soft ware authorization authentication method based on digital mobile communication
Technical field
The present invention relates to soft ware authorization authentication method technical field, especially a kind of soft ware authorization authentication method based on digital mobile communication.
Background technology
Existing soft ware authorization authentication method roughly is divided three classes: registration code authorization identifying, unit hardware lock (claiming software locks again) authorization identifying and network authorization authentication.Their main pluses and minuses have:
1, registration code authentication is usually used in intelligent terminals such as computer, authenticate simple and convenient, cost is low.The correlation ID that its digital authenticating sign indicating number derives from the internal hardware of the intelligent terminal that needs authentication calculates by certain method, changes as internal hardware then to cause the digital authenticating sign indicating number to change and authentification failure, then needs authentication again.On the other hand, the digital authenticating code authentication is based on a kind of authenticated memory method of intelligent terminal, causes crack tools such as internal memory patch, register machine to develop simply, use easily, and its authentication method is had a greatly reduced quality to the protection of software.
2, unit hardware lock authorization identifying is existing a kind of popular comparative maturity soft ware authorization authentication method, and equal visible its trace on intelligent terminals such as all kinds of computers only needs during use corresponding lock inserted the corresponding port of intelligent terminal and respective drive is installed to get final product.The authorization and authentication method of this software has suitable raising than registration code authentication method to the protection of software, and the object of its authentication is transferred to the external hardware lock from the internal hardware of intelligent terminals such as computer, and authentication strength increases and can control.But this causes a series of problem in use equally, has a plurality of softwares to use this kind method that software is authenticated the position deficiency that intelligent terminals such as may causing computer patches the hardware identification lock simultaneously as this machine; When a plurality of hardware lock, carry inconvenience, need and to obtain again from provider if any losing, but the hardware lock of losing can continue use, make up a hardware lock and will make its authorization object many one, also will pay many hardware lock costs in addition; It is many to crack means at this kind authentication method now in addition, also than being easier to, as hardware lock copy, hardware lock signal intercept etc.
3, network authorization authentication mainly is to be applied to the grouping of the world economy target client, and is fewer at the unit individual subject.Because its authentication the time must connect local area network (LAN) or the Internet, and its authentication object essence is the internal hardware of intelligent terminal such as computer.The affirmation information source of its authentication object is in the internal hardware of intelligent terminal, changes as the internal hardware of intelligent terminal then to cause confirmation to change and authentification failure.Also have a kind of method commonly used to be based on the method for network authorization of user name, password, this method must connect outside local area network (LAN) or the Internet equally, has also directly expedited the emergence of corresponding trojan horse program such as network steal-number and has spread unchecked.
Summary of the invention
At the deficiency of above existing soft ware authorization authentication method, the purpose of this invention is to provide a kind of soft ware authorization authentication method based on digital mobile communication.
The objective of the invention is by realizing by the following technical solutions: a kind of soft ware authorization authentication method based on digital mobile communication, it may further comprise the steps:
The 1st step: the employed application software of user's intelligent terminal is chosen a part of key procedure data or code when distribution, its packing is stored on the radius authentication server, and the remainder public publication also is installed on user's intelligent terminal;
The 2nd step: during the running software of user's intelligent terminal, when need using the key procedure data that are stored on the radius authentication server or code, the user drives to the soft ware authorization authentication that is installed on described user's intelligent terminal in advance and sends demand, applies for the data that oneself needs;
The 3rd step: the soft ware authorization authentication of user's intelligent terminal drives receives application, analyze applying type, the first kind is that the data of desired data process associated encryption algorithm for encryption are positioned at current intelligent terminal this locality, second class is that desired data is positioned at radius authentication server, and the 3rd class is that current application software does not need particular data; When applying type is the first kind, obtain corresponding secret key from radius authentication server and decipher its data, as to be second time-like download desired data immediately from radius authentication server uses for program, as be the 3rd time-like from as described in the message whether passed through of radius authentication server access authentication;
The 4th step: the authentication of user's intelligent terminal soft ware authorization drives and generates the authorization identifying request for data;
The 5th step: user's intelligent terminal soft ware authorization authentication drives and the 4th step was generated the authorization identifying request for data sends the authorization identifying request for data that generated to mobile communication server by user's intelligent terminal;
The 6th step: data are received and analyzed to mobile communication server, and radius authentication server is repacked and sent to further user relevant information when decision data is the authorization identifying request for data with the authorization identifying request for data;
The 7th step: mobile communication server is transferred to the soft ware authorization certificate server with the authorization identifying request for data of repacking, radius authentication server is analyzed request for data and the authorization identifying request for data is split as: active user's authorization identifying drives version, current authentication application software I D, current authentication application software version, current authentication application user account relevant information;
The 8th step: radius authentication server goes on foot existing subscriber's database in the user account information querying server that obtains according to the 7th, draw server and whether have active user's relevant information, as not existing the active user namely to change for the 101st step over to, mate account if any the active user and namely changed for the 9th step over to;
The 9th step: radius authentication server is inquired about active user's account database according to the software information of the current authentication application software that the 7th step obtained, draw whether current software and respective version are arranged in active user's account, as namely not changing for the 102nd step over to current software information occurrence, if any namely changing for the 10th step over to current software information occurrence;
The 10th step: radius authentication server is inquired about the 9th and is gone on foot the active user's account current application software information that obtains, determine by active user's use whether before the deadline current software, as in effective life, namely not changing for the 103rd step over to, as namely changing for the 11st step before the deadline over to;
The 101st step: connect the 8th step radius authentication server and do not have active user's account, then the relevant user information of obtaining according to the 7th step is set up the proper account database and was changed for the 102nd step over to;
The 102nd step: connect the 101st newly-built user account of step radius authentication server or connect in the 9th step active user's account and do not have current software information occurrence, then go on foot the occurrence whether current software is arranged in the software relevant information querying server that obtains according to the 7th, then set up the corresponding software item and changed for the 103rd step in active user's account if any occurrence, as do not have occurrence then to change for the 104th step over to;
The 103rd step: newly-built authentication software item or phase of licensing of connecing current software in the 10th step active user account be not before the deadline in active user's account database to connect the 102nd step radius authentication server, then take off the associated authorization usage charges by legal and valid program and process, as the active user disagree with the payment corresponding license expense then the soft ware authorization authentification failure and change over to the 104th the step, successfully pay the corresponding expense of licensing as the user, then authorization identifying success, and finish authorization identifying and changed for the 11st step over to;
The 104th step: connecing for the 102nd step does not exist in the radius authentication server current software or the 103rd step active user's difference to mean current software payment authorization usage charges, the authorization identifying failure, generate the authorization identifying return data, by mobile communication server return data is sent to user's intelligent terminal;
The 11st step: connect that the 103rd step active user has bought current software license or current software of the 10th step is in active user's account and licenses in the term of validity, the soft ware authorization authentication success then generates the authorization identifying return data by described applying type of the 3rd step;
The 12nd step: mobile communication server is sent to user's intelligent terminal to return data, and drives reception by the soft ware authorization authentication of user's intelligent terminal;
The 13rd step: the soft ware authorization authentication of user's intelligent terminal drives the analysis return data and whether authorizes establishment;
The 14th step: set up as soft ware authorization, then the soft ware authorization authentication drives and obtains these data and these data are sent to user terminal software, makes it continue operation;
The 15th step: the soft ware authorization authentication drives and changes the predefine handling procedure over to if authorization identifying is failed.
As optimized technical scheme of the present invention, the contained information of the 4th described authorization identifying request for data of step comprises: current application software numeral ID and the version that needs data, the necessary flag information of the version that active user's terminal software authorization identifying drives and packet does not contain any out of Memory of active user's intelligent terminal.
As optimized technical scheme of the present invention, the 6th step, described additional user information only contained the communication number of the account of user's intelligent terminal.
With respect to prior art, the present invention has the following advantages:
1, the soft ware authorization authentication object is transferred to the digital mobile communication number of the account from intelligent terminal internal hardwares such as computer or hardware lock, is unique authorization identifying object with the digital mobile communication number of the account.Employed external hardware is one one and can be used as mobile phone or the mobile Internet access card that modulator-demodulator uses, and can not cause authentication code change authentification failure because of the internal hardware change; If any accidents such as loss damages, purchase a mobile phone or mobile Internet access card again, make up back corresponding number of the account with individual corresponding information to mobile service provider's application again, original phonecard lost efficacy; The same number of the account amount of software to required authorization identifying in theory is unrestricted, can add as required or reduce.
2, the authentication of soft ware authorization is finished at server end, avoids the internal memory patch, and relevant crack tool such as register machine cracks the software of authorizing.
3, owing to use the digital mobile communication number of the account, number of the account is provided by mobile communication service provider, and this number of the account is as unique authorization identifying number of the account of server end, and the mobile service provider can guarantee the uniqueness of number of the account, thereby guarantees the soft ware authorization authenticating safety.
Description of drawings
The invention will be further described below in conjunction with accompanying drawing and specific embodiment:
Fig. 1 is the soft ware authorization authentication method model schematic diagram that the present invention is based on digital mobile communication;
Fig. 2 is the flow chart that the present invention is based on the soft ware authorization authentication method of digital mobile communication.
Embodiment
As shown in Figures 1 and 2, the soft ware authorization authentication method that the present invention is based on digital mobile communication is to carry out at user's intelligent terminal, mobile communication service provider and soft ware authorization certificate server three party.Wherein, user's intelligent terminal is the intelligent terminal that smart mobile phone, P103 machine etc. can be accepted the mobile communication service; The server that is used for authorization identifying that the soft ware authorization certificate server arranges for software publishing side.
The present invention includes following steps:
S1: the employed application software of user's intelligent terminal is chosen a part of key procedure data or code when distribution, its packing is stored on the radius authentication server, and the remainder public publication also is installed on user's intelligent terminal;
S2: during the running software of user's intelligent terminal, when needing to use the key procedure data that are stored on the radius authentication server or code, the user drives to the soft ware authorization authentication that is installed on intelligent terminal in advance and sends demand, apply for oneself need data;
S3: the soft ware authorization authentication of user's intelligent terminal drives receives application, analyze the applying type of current request for data, type is divided three classes: the first kind is that the data of desired data process associated encryption algorithm for encryption are positioned at current intelligent terminal this locality, second class is that desired data is positioned at radius authentication server, and the 3rd class is that current application software does not need particular data; When applying type is the first kind, obtain corresponding secret key from radius authentication server and decipher its data, as to be second time-like download desired data immediately from radius authentication server uses for program, as be the 3rd time-like from as described in the message whether passed through of radius authentication server access authentication;
S4: the demand data that the authentication of user terminal soft ware authorization drives according to S2 generates the authorization identifying request for data, the contained information of this authorization identifying request for data has: the current application software numeral ID(of data that needs is also in the registration of soft ware authorization certificate server) and version, the necessary flag information of the version that active user's terminal software authorization identifying drives and packet does not contain any out of Memory of active user's intelligent terminal;
S5: user terminal soft ware authorization authentication drives and S4 is generated the authorization identifying request for data sends the authorization identifying request for data that generated to mobile communication server by mobile communication terminal;
S6: data are received and analyzed to mobile communication server, further user relevant information when being the authorization identifying request for data as data, the soft ware authorization certificate server is repacked and sent to the authorization identifying request for data, and additional user information only contains the number of the account (as current communicating number) of communication user;
S7: mobile communication server is transferred to the soft ware authorization certificate server with the authorization identifying request for data of repacking, and radius authentication server is analyzed request for data and the authorization identifying request for data is split as: active user's authorization identifying drives relevant informations such as version, current authentication application software I D, current authentication application software version and current authentication application user account;
S8: existing customer data base in the user account information querying server that the soft ware authorization certificate server obtains according to S7, draw server and whether have active user's relevant information, as not existing the active user namely to change S101 over to, mate account if any the active user and namely change S9 over to;
S9: radius authentication server is inquired about active user's account database according to the software information of the current authentication application software that S7 obtains, draw whether current software and respective version are arranged in active user's account, as namely not changing S102 over to current software information occurrence, if any namely changing S10 over to current software information occurrence;
S10: the current application information of software of active user's account that radius authentication server inquiry S7 obtains, by active user's use whether before the deadline to determine current software, as in effective life, namely not changing S103 over to, as namely changing S11 before the deadline over to;
S101: connect the S8 radius authentication server and do not have active user's account, then the relevant user information of obtaining according to S7 is set up the relative users account database and is changed S102 over to;
S102: connect the newly-built user account of S101 radius authentication server or connect and do not have current software information occurrence in the S9 active user account, the occurrence whether current software is then arranged in the software relevant information querying server that obtains according to S7, then set up the corresponding software database and change S103 in active user's account if any occurrence, as do not have occurrence then to change S104 over to;
S103: connecing S102 radius authentication server newly-built authentication software item or phase of licensing of connecing current software in the S10 active user account in active user's account database then takes off the associated authorization usage charges by legal and valid program and process not before the deadline; Disagree with the corresponding then soft ware authorization authentification failure and change S104 over to of expense of licensing of payment or payment failure as the active user, successfully pay the corresponding then authorization identifying success and finish authorization identifying and change S11 over to of expense of licensing as the user;
S104: connect and do not exist current software or S103 active user to disagree with payment or the current software payment authorization usage charges of payment failure in the S102 radius authentication server, the authorization identifying failure generates the authorization identifying return data; The reason-code and the conventional processing method index that comprise the current soft ware authorization authentification failure of active user in the data of returning send to user's intelligent terminal by mobile communication server generating data;
S11: meet the S103 active user and bought current software license or the current software of S9 and be in active user's account and license in the term of validity, the soft ware authorization authentication success then generates the authorization identifying return data by described applying type of the 3rd step;
The 12nd step: mobile communication server is sent to user's intelligent terminal to return data, and drives reception by the soft ware authorization authentication of user terminal;
The 13rd step: the soft ware authorization authentication of user terminal drives the analysis return data and whether authorizes establishment;
The 14th step: set up as soft ware authorization, then the soft ware authorization authentication drives and obtains these data and these data are sent to user terminal software, makes it continue operation;
The 15th step: the soft ware authorization authentication drives and changes the predefine handling procedure over to if authorization identifying is failed.

Claims (4)

1. the soft ware authorization authentication method based on digital mobile communication is characterized in that, may further comprise the steps:
The 1st step: the employed application software of user's intelligent terminal is chosen a part of key procedure data or code when distribution, its packing is stored on the radius authentication server, and the remainder public publication also is installed on user's intelligent terminal;
The 2nd step: during the running software of user's intelligent terminal, when need using the key procedure data that are stored on the radius authentication server or code, the user drives to the soft ware authorization authentication that is installed on described user's intelligent terminal in advance and sends demand, applies for the data that oneself needs;
The 3rd step: the soft ware authorization authentication of user's intelligent terminal drives receives application, analyze applying type, the first kind is that the data of desired data process associated encryption algorithm for encryption are positioned at current intelligent terminal this locality, second class is that desired data is positioned at radius authentication server, and the 3rd class is that current application software does not need particular data; When applying type is the first kind, obtain corresponding secret key from radius authentication server and decipher its data, as be that second time-like is downloaded desired data for the program use immediately from radius authentication server, as be the message whether the 3rd time-like passes through from the radius authentication server access authentication;
The 4th step: the authentication of user's intelligent terminal soft ware authorization drives and generates the authorization identifying request for data;
The 5th step: user's intelligent terminal soft ware authorization authentication drives and the 4th step was generated the authorization identifying request for data sends the authorization identifying request for data that generated to mobile communication server by user's intelligent terminal;
The 6th step: data are received and analyzed to mobile communication server, and radius authentication server is repacked and sent to further user relevant information when decision data is the authorization identifying request for data with the authorization identifying request for data;
The 7th step: mobile communication server is transferred to radius authentication server with the authorization identifying request for data of repacking, radius authentication server is analyzed request for data and the authorization identifying request for data is split as: active user's authorization identifying drives version, current authentication application software I D, current authentication application software version, current authentication application user account relevant information;
The 8th step: radius authentication server goes on foot existing subscriber's database in the user account information querying server that obtains according to the 7th, draw server and whether have active user's relevant information, as not existing the active user namely to change for the 101st step over to, mate account if any the active user and namely changed for the 9th step over to;
The 9th step: radius authentication server is inquired about active user's account database according to the software information of the current authentication application software that the 7th step obtained, draw whether current software and respective version are arranged in active user's account, as namely not changing for the 102nd step over to current software information occurrence, if any namely changing for the 10th step over to current software information occurrence;
The 10th step: radius authentication server is inquired about the 9th and is gone on foot the active user's account current application software information that obtains, determine by active user's use whether before the deadline current software, as in effective life, namely not changing for the 103rd step over to, as namely changing for the 11st step before the deadline over to;
The 101st step: connect the 8th step radius authentication server and do not have active user's account, then the relevant user information of obtaining according to the 7th step is set up the proper account database and was changed for the 102nd step over to;
The 102nd step: connect the 101st newly-built user account of step radius authentication server or connect in the 9th step active user's account and do not have current software information occurrence, then go on foot the occurrence whether current software is arranged in the software relevant information querying server that obtains according to the 7th, then set up the corresponding software item and changed for the 103rd step in active user's account if any occurrence, as do not have occurrence then to change for the 104th step over to;
The 103rd step: newly-built authentication software item or phase of licensing of connecing current software in the 10th step active user account be not before the deadline in active user's account database to connect the 102nd step radius authentication server, then take off the associated authorization usage charges by legal and valid program and process, as the active user disagree with the payment corresponding license expense then the soft ware authorization authentification failure and change over to the 104th the step, successfully pay the corresponding expense of licensing as the user, then authorization identifying success, and finish authorization identifying and changed for the 11st step over to;
The 104th step: connecing for the 102nd step does not exist in the radius authentication server current software or the 103rd step active user's difference to mean current software payment authorization usage charges, the authorization identifying failure, generate the authorization identifying return data, by mobile communication server return data is sent to user's intelligent terminal;
The 11st step: connect that the 103rd step active user has bought current software license or current software of the 10th step is in active user's account and licenses in the term of validity, the soft ware authorization authentication success then generates the authorization identifying return data by described applying type of the 3rd step;
The 12nd step: mobile communication server is sent to user's intelligent terminal to return data, and drives reception by the soft ware authorization authentication of user's intelligent terminal;
The 13rd step: the soft ware authorization authentication of user's intelligent terminal drives the analysis return data and whether authorizes establishment;
The 14th step: set up as soft ware authorization, then the soft ware authorization authentication drives and obtains these data and these data are sent to user terminal software, makes it continue operation;
The 15th step: the soft ware authorization authentication drives and changes the predefine handling procedure over to if authorization identifying is failed.
2. the soft ware authorization authentication method based on digital mobile communication according to claim 1, it is characterized in that: the 4th step described authorization identifying request for data contained information has and comprises: current application software numeral ID and the version that needs data, the necessary flag information of the version that active user's terminal software authorization identifying drives and packet does not contain any out of Memory of active user's intelligent terminal.
3. the soft ware authorization authentication method based on digital mobile communication according to claim 1 is characterized in that: the 6th step, described additional user information only contained the communication number of the account of user's intelligent terminal.
4. the soft ware authorization authentication method based on digital mobile communication according to claim 1, it is characterized in that: described user's intelligent terminal is smart mobile phone or P103 machine.
CN2011100682134A 2011-03-22 2011-03-22 Software licensing authentication method based on digital mobile communication Expired - Fee Related CN102088354B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011100682134A CN102088354B (en) 2011-03-22 2011-03-22 Software licensing authentication method based on digital mobile communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011100682134A CN102088354B (en) 2011-03-22 2011-03-22 Software licensing authentication method based on digital mobile communication

Publications (2)

Publication Number Publication Date
CN102088354A CN102088354A (en) 2011-06-08
CN102088354B true CN102088354B (en) 2013-09-11

Family

ID=44099977

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011100682134A Expired - Fee Related CN102088354B (en) 2011-03-22 2011-03-22 Software licensing authentication method based on digital mobile communication

Country Status (1)

Country Link
CN (1) CN102088354B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105871915A (en) * 2016-06-07 2016-08-17 得理电子(上海)有限公司 Software network authentication binding method and system
CN111511084A (en) * 2020-04-20 2020-08-07 北京智米科技有限公司 Intelligent lamp control method and system and lamp

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1852205A (en) * 2006-04-05 2006-10-25 阿里巴巴公司 Network-based software registration method and system
CN101034991A (en) * 2007-04-06 2007-09-12 中兴通讯股份有限公司 Secure guiding system, method, code signature construction method and authentication method
CN101238493A (en) * 2005-08-01 2008-08-06 Igt公司 Methods and devices for authentication and licensing in a gaming network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7515718B2 (en) * 2000-12-07 2009-04-07 Igt Secured virtual network in a gaming environment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101238493A (en) * 2005-08-01 2008-08-06 Igt公司 Methods and devices for authentication and licensing in a gaming network
CN1852205A (en) * 2006-04-05 2006-10-25 阿里巴巴公司 Network-based software registration method and system
CN101034991A (en) * 2007-04-06 2007-09-12 中兴通讯股份有限公司 Secure guiding system, method, code signature construction method and authentication method

Also Published As

Publication number Publication date
CN102088354A (en) 2011-06-08

Similar Documents

Publication Publication Date Title
CN110537195B (en) Method for permitting card use and server using same
CN107609848B (en) Intellectual property licensing method and system based on Internet of things
CN107146120B (en) Electronic invoice generation method and generation device
TW201741922A (en) Biological feature based safety certification method and device
CN112202772B (en) Authorization management method, device, electronic equipment and medium
CN101448001B (en) System for realizing WAP mobile banking transaction security control and method thereof
CN103942616B (en) Car insurance calculation quotation service system based on mobile internet
CN101379487A (en) Method and apparatus for generating rights object by means of delegation of authority
CN101383709A (en) System and method enhancing safety of network account and cipher
EP2420036A2 (en) Method and apparatus for electronic ticket processing
CN112165382B (en) Software authorization method and device, authorization server side and terminal equipment
US20140172741A1 (en) Method and system for security information interaction based on internet
CN101010903A (en) Method for generating and verifying an electronic signature
US8863241B2 (en) System and method for managing usage rights of software applications
CN104484620A (en) Method for avoiding false declaration of sales volume and inventory in fast-selling sales management cloud system
CN104125230A (en) Short message authentication service system and authentication method
CN109118377A (en) A kind of processing method, system and the electronic equipment of the Claims Resolution event based on block chain
CN103186721A (en) Digital copyright service control method, device and system
CN102088354B (en) Software licensing authentication method based on digital mobile communication
CN107395600B (en) Service data verification method, service platform and mobile terminal
US20220131685A1 (en) Method and apparatus for registering shared key
CN108964883A (en) It is a kind of using smart phone as the digital certificate store of medium and endorsement method
CA3135088A1 (en) System and method for providing secure data access
CN115170322B (en) Real estate property right transfer method, device, terminal device and computer medium
CN115482132A (en) Data processing method and device for electronic contract based on block chain and server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130911

Termination date: 20210322

CF01 Termination of patent right due to non-payment of annual fee