CN102750479A - Method and system for layered software copyright protection - Google Patents
Method and system for layered software copyright protection Download PDFInfo
- Publication number
- CN102750479A CN102750479A CN2012101927345A CN201210192734A CN102750479A CN 102750479 A CN102750479 A CN 102750479A CN 2012101927345 A CN2012101927345 A CN 2012101927345A CN 201210192734 A CN201210192734 A CN 201210192734A CN 102750479 A CN102750479 A CN 102750479A
- Authority
- CN
- China
- Prior art keywords
- host node
- node
- registrar
- authorization message
- file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
An embodiment of the invention provides a system for layered software copyright protection. The system comprises a register server, a host node connected with the register server and at least one non-host node connected with the host node. The system is characterized in that the register server is used for releasing host node authorization information to the host node; the host node is used for receiving the host node authorization information from the register server, generating non-host node authorization information according to the host node authorization information, and releasing the non-host node authorization information to the non-host node; and the non-host node is used for receiving the authorization information from the host node and carrying out corresponding operation according to the non-host node authorization information.
Description
Technical field
The present invention relates to communication technical field, relate in particular to a kind of delamination software copy-right protection method and system.
Background technology
Current software copyright protection mechanism is to single system or single node environment.
Invention 200810106560 is a typical network copyright guard methods.This method is extracted from program file and is protected code to remote server, when carrying out by the protection code, needs far call by protection module, and the run time version function is also enjoyed.It is that protected object must can connect network that the maximum of this invention relies on, and obtains some key message through network.Its shortcoming is big to the network dependence, to privately owned cloud, possibly can't connect network, and this kind copy-right protection method will influence client's normal use; In addition, the global network circumstance complication is that performance and security all can't obtain to guarantee that therefore, for the cloud system of high performance demands, this copyright protection scheme can't be used.
Summary of the invention
A kind of delamination software copyright protecting system that the embodiment of the invention provides; Comprise registrar; The host node that links to each other with registrar and at least one the non-host node that links to each other with said host node; It is characterized in that: said registrar is used for to master node issues host node authorization message; Said host node is used for receiving the host node authorization message from registrar, and produces non-host node authorization message according to the host node authorization message, and to the non-host node authorization message of non-master node issues; Said non-host node is used for receiving authorization message from host node, and carries out corresponding operation according to said non-host node authorization message.
A kind of delamination software copy-right protection method that the embodiment of the invention provides; Be applied to the delamination software copyright protecting system; This system comprises registrar, and the host node that links to each other with registrar and at least one the non-host node that links to each other with said host node is characterized in that:
Step 1: host node sends the host node register requirement to registrar;
Step 2: whether registrar checking host node register requirement is effective, if invalid, then refusal registration, flow process finishes; If effectively, then generate the host node authorization message, send to host node;
Step 3: host node receives said host node authorization message;
Step 4: non-host node sends non-host node register requirement to host node;
Step 5: host node judges whether non-host node register requirement is effective, if effectively, then generate non-host node authorization message according to the host node authorization message; And non-host node authorization message sent to non-host node;
Step 6: non-host node is carried out corresponding operating according to non-host node authorization message.
Through the two-layer set-up mode of main non-host node, make and effectively to control non-host node scale; Total system adopts a safety encipher module can accomplish copyright protection, and the copyright protection cost is cheap relatively.
Description of drawings
The delamination software copyright protecting system general structure synoptic diagram that Fig. 1 provides for the embodiment of the invention;
The delamination software copyright protecting system concrete structure synoptic diagram that Fig. 2 provides for the embodiment of the invention;
The delamination software copy-right protection method overall procedure synoptic diagram that Fig. 3 provides for the embodiment of the invention;
Delamination software copy-right protection method first partial view that Fig. 4 provides for the embodiment of the invention;
Delamination software copy-right protection method second partial view that Fig. 5 provides for the embodiment of the invention;
Delamination software copy-right protection method the 3rd partial view that Fig. 6 provides for the embodiment of the invention;
Delamination software copy-right protection method the 4th partial view that Fig. 7 provides for the embodiment of the invention.
?
Embodiment
Referring to Fig. 1; The general illustration of the delamination software copyright protecting system that provides for the embodiment of the invention; This system comprises a registrar 101, the host node 201 that links to each other with registrar and at least one the non-host node 201 and 202 that links to each other with said host node.
Registrar is used for to master node issues host node authorization message; Said host node is used for receiving the host node authorization message from registrar, and produces non-host node authorization message according to the host node authorization message, and to the non-host node authorization message of non-master node issues; Said non-host node is used for receiving authorization message from host node, and carries out corresponding operation according to said non-host node authorization message.
Participate in Fig. 2, be the concrete synoptic diagram of delamination software copyright protecting system that the embodiment of the invention provides, wherein said registrar comprises the host node registrar, and said host node comprises the host node registered client.
Said have a host node registered client, is used for sending a registration sequence number to said host node registrar.
Said host node registrar is used to judge whether said registration sequence is number effective, if effectively then to master node issues host node authorization message.
Said host node authorization message comprises the maximum-norm and/or the type of extendible non-host node.
Said non-host node comprises non-host node registered client, and said host node comprises non-host node registrar, and said non-host node registered client is used for sending non-host node register requirement to non-host node registrar.
Non-host node registrar judges whether non-host node register requirement is effective, if effectively then to the non-host node authorization message of non-master node issues, said non-host node authorization message comprises the employable software function of said non-host node.Preferably, judge whether effective actual conditions comprises non-host node register requirement: said non-host node is not registered, and the quantity of non-host node surpasses maximum-norm.
Host node also comprises: a safety encipher module is used for the information on the host node is encrypted and/or decryption processing.But not host node then need not comprise the safety encipher module.
Host node also comprises: a host node copyright authentication module is used to verify the legitimacy and the validity of function in the host node.
Non-host node comprises a non-host node copyright authentication module, is used to verify the legitimacy and the validity of function in the non-host node.
Host node can be accomplished registration through LAN or global network, generates the certificate file with operator's signature, and certificate file has comprised the content of copyright file; Content file has defined the essential information of cloud system; The scale of cloud system, node type, information such as the valid period of system; Content file has also been stipulated nodal function, information such as node hardware attributes.In addition, certificate file has comprised that also data encryption is to carry out through hardware encipher equipment to content of copyright file and system hardware finger print data summary encrypted ciphertext data.For the legitimacy that guarantees to authorize, certificate file has also comprised the digital signature of content file and hardware fingerprint being carried out by operator.Adopt this single host node copyright control pattern, make when change takes place for the framework of system and lower floor's equipment, need not to change the mode of copyright control, increased the dirigibility of system simultaneously.
Non-host node passes through LAN; Host node through legal is authorized, according to authorized content (nodal function, node hardware attributes) the generation content file of host node; Hardware fingerprint information together with non-host node; The common certificate file that makes up non-host node also comprises the non-host node content file encrypted through host node and the summary ciphertext of finger print information in the certificate file, and the encrypting module of the encryption key of will making a summary through host node carries out encipherment protection; Protected data only is stored on the host node, makes on the non-host node by the operation of the protection module host node that places one's entire reliance upon.Non-host node is obtained the authorization from host node through LAN, has improved the speed of obtaining the authorization greatly, has reduced and has authorized the delay that is brought, and has improved the performance of system.
Encryption can be avoided the informative abstract of ciphertext protection is distorted, and promptly can prevent revision power content file and hardware fingerprint information, has guaranteed the integrality of content file information and hardware fingerprint.The integrality of content file information and hardware fingerprint can guarantee the legitimacy of content file and hardware platform, through the Sino-German constraint of legal content file, and scale that can Control Software System, valid period, nodal function, information such as node hardware attributes.The checking burden that the two-stage registration of host node and non-host node and authentication mechanism can reduce host node reduces communicating by letter of host node and non-host node, improves the efficient of authority checking.Simultaneously only on host node, carry out encipherment protection, reduced the cost and the expense of hardware encipher.
The safety encipher module can be according to actual needs, considers to adopt the realization of different security encrypting module according to level of security or equipment cost; It can realize importing the symmetric cryptography (AES of data; DES, 3DES or the like) and decryption oprerations, extraneous interface can not be operated (read/write) to key.The safety encipher module is supported a plurality of keys, is divided into a secondary key and two kinds of keys repeatedly, and a secondary key only can once be encrypted and repeatedly deciphering, and this key is used for the data protection of host node.Repeatedly key can be used for repeatedly the encryption and decryption operation of data, and this key is used for the data protection of non-host node.The safety encipher module is not reproducible hardware unit, can be smart card, and single-chip microcomputer also can be other embedded device etc.In each cloud system, only need to dispose a safety encipher module and get final product.
The method has defined registration management server, host node, non-host node.Registration management server cloud system provider is that the client provides the equipment of system registry service, can be that be deployed in the network can remote access server, and personal computer also can be of portable form.Host node is the core node in the cloud system, can control the normal operation and the scale of whole cloud system, and non-host node is the functional node in the cloud system, can accomplish specific calculating or memory function.
Functional module in host node and the non-host node is the software protection object, and these modules can be accomplished and satisfy cloud platform primary demand.Host node is accomplished system registry through the host node registrar, and non-host node is accomplished registration through the non-host node registrar of host node deploy.The legitimacy of intranodal function and validity are accomplished through the copyright authentication module.The safety encipher module can realize sensitive data is carried out the security module of symmetric cryptography deciphering, can be software module, also can be hardware module.
Participate in Fig. 3, the delamination software copy-right protection method overall procedure synoptic diagram that provides for the embodiment of the invention.
Be applied to like Fig. 1 or the described delamination software copyright protecting system of Fig. 2, this system comprises registrar, the host node that links to each other with registrar and at least one the non-host node that links to each other with said host node.
This method flow comprises the steps:
Step 1: host node sends the host node register requirement to registrar;
Step 2: whether registrar checking host node register requirement is effective, if invalid, then refusal registration, flow process finishes; If effectively, then generate the host node authorization message, send to host node;
Step 3: host node receives said host node authorization message;
Step 4: non-host node sends non-host node register requirement to host node;
Step 5: host node judges whether non-host node register requirement is effective, if effectively, then generate non-host node authorization message according to the host node authorization message; And non-host node authorization message sent to non-host node;
Step 6: non-host node is carried out corresponding operating according to non-host node authorization message.
The detail of step 1-3 among Fig. 3 is described with reference to figure 4.
Step 11: the system registry sequence number that the client provides through friendly interface input system provider, each system all should create unique registration sequence number in advance.
Preferably, can comprise step 12: the host node registered client is obtained hardware information (can be Equipment Serial Numbers such as mainboard, CPU, internal memory, hard disk, network interface card) as hardware fingerprint, and sends to registrar together with sequence number and register.
Step 13: registration service judges that registration sequence number effectively, will and create the host node authorization message service time according to predefined software function, content of copyright file just here, and the content of copyright file mainly comprises:
The cloud system essential information;
The effective storage life of system;
System allows the maximum-norm of expansion;
Allow the node type of interpolation in the system;
Every category node effective efficiency is described and restriction in the system;
Other management or control information.
Step 14: calculate the informative abstract (MD2, MD5, SHA1, or SHA512 or the like) of content of copyright file, and the private key of using system provider signs, content file is sent to host node together with signature, and revise the registration sequence state.
Step 15: the validity of host node certifying signature.
Step 16: host node calculates the complex data summary of content file and hardware fingerprint information architecture, through the safety encipher module summary is encrypted, and generates the summary ciphertext.
Step 17: content file, signature and summary ciphertext are write rights file.
The detail of step 4-5 among Fig. 3 is described with reference to figure 5.
Step 21: non-host node sends to the registrar that operates on the host node with hardware fingerprint and node type.
Step 22: host node is judged register requirement effectively (this node is not by registration or do not exceed maximum-norm), based on authorized content in the rights file, generates the content file to this node.
Step 23: host node has the ID of uniqueness and creates a random symmetric key for this register node distribution, and content file, key and ID are sent to non-host node.
Step 24: at non-host node, will calculate content file and hardware fingerprint merges, and calculate the informative abstract of blended data, and summary encrypted, and destroy key through key.
Step 25: ID, content file and ciphertext are write certificate file, and the result is returned to host node.
Step 26: after host node is received correct result, through the safety encipher module key is encrypted the generation ciphertext, with ciphertext and together with ID, the register node hardware fingerprint is carried out this locality and is preserved the registration end.
The details of the step 6 among Fig. 3 is described with reference to accompanying drawing 6.
Step 31: non-host node ID and hardware fingerprint are sent to host node;
Step 32: host node is retrieved corresponding hardware fingerprint through ID, and two hardware fingerprint are identical, and host node will be deciphered encryption key through the safety encipher module, and key is sent to non-host node;
Step 33: non-host node is decomposed into content of copyright file and original digest cipher-text information with certificate file;
Step 34: non-host node obtains original digest through the secret key decryption ciphertext;
Step 35: the blended data summary that obtains content file and hardware fingerprint information;
Step 36:, show that then content file is effective if original digest is identical with new calculating summary;
Step 37: obtain corresponding function or control information according to content file, if operation meets the requirements, checking is passed through, and operation carries out.
After the step 3 of Fig. 3, if host node need be used the resource on any host node, need to carry out a host node proof procedure, this process is described with reference to accompanying drawing 7.
Step 41: certificate file is decomposed into content of copyright file and cipher-text information.
Step 42:, obtain original digest through safety encipher module decrypts ciphertext.
Step 43: the blended data summary that obtains content file and hardware fingerprint information.
Step 44:, show that then content file is effective if original digest is identical with new calculating summary.
Step 45: obtain corresponding function or control information according to content file, if operation meets the requirements, checking is passed through, and operation carries out.
Those skilled in the art should understand that embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt the form of the embodiment of complete hardware embodiment, complete software implementation example or combination software and hardware aspect.And the present invention can be employed in one or more computing machine storage availability that wherein include computer usable program code and tell the form that medium (including but not limited to magnetic disk memory and optical memory etc.) is gone up the computer program of implementing.
Obviously, those skilled in the art can carry out various changes and modification to the present invention and not break away from the spirit and scope of the present invention.Like this, belong within the scope of claim of the present invention and equivalent technologies thereof if of the present invention these are revised with modification, then the present invention also is intended to comprise these changes and modification interior.
Claims (13)
1. a delamination software copyright protecting system comprises registrar, and the host node that links to each other with registrar and at least one the non-host node that links to each other with said host node is characterized in that:
Said registrar is used for to master node issues host node authorization message;
Said host node is used for receiving the host node authorization message from registrar, and produces non-host node authorization message according to the host node authorization message, and to the non-host node authorization message of non-master node issues;
Said non-host node is used for receiving authorization message from host node, and carries out corresponding operation according to said non-host node authorization message.
2. according to the system of claim 1, said registrar comprises the host node registrar, and said host node comprises the host node registered client, wherein:
Said host node registered client is sent a registration sequence number to said host node registrar, and said host node registrar judges whether said registration sequence is number effective, if effectively then to master node issues host node authorization message.
3. according to any system among the claim 1-2, said host node authorization message comprises the maximum-norm and/or the type of extendible non-host node.
4. according to any system among the claim 1-3; Said non-host node comprises non-host node registered client; Said host node comprises non-host node registrar, and said non-host node registered client is used for sending non-host node register requirement to non-host node registrar.
5. according to the system of claim 4; Non-host node registrar judges whether non-host node register requirement is effective; If effectively then to the non-host node authorization message of non-master node issues, said non-host node authorization message comprises the employable software function of said non-host node.
6. according to the system of claim 5, described non-host node registrar judges whether effective actual conditions comprises non-host node register requirement: said non-host node is not registered, and the quantity of non-host node surpasses maximum-norm.
7. according to any system among the claim 1-6, said host node comprises:
A safety encipher module is used for the information on the host node is encrypted and/or decryption processing; And/or a host node copyright authentication module, be used to verify the legitimacy and the validity of function in the host node.
8. according to any system among the claim 1-7, said non-host node comprises a non-host node copyright authentication module, is used to verify the legitimacy and the validity of function in the non-host node.
9. a delamination software copy-right protection method is applied to the delamination software copyright protecting system, and this system comprises registrar, and the host node that links to each other with registrar and at least one the non-host node that links to each other with said host node is characterized in that:
Step 1: host node sends the host node register requirement to registrar;
Step 2: whether registrar checking host node register requirement is effective, if invalid, then refusal registration, flow process finishes; If effectively, then generate the host node authorization message, send to host node;
Step 3: host node receives said host node authorization message;
Step 4: non-host node sends non-host node register requirement to host node;
Step 5: host node judges whether non-host node register requirement is effective, if effectively, then generate non-host node authorization message according to the host node authorization message; And non-host node authorization message sent to non-host node;
Step 6: non-host node is carried out corresponding operating according to non-host node authorization message.
10. method as claimed in claim 9,1-3 is specially with step:
Step 11: the system registry sequence number that the client provides through friendly interface input system provider, each system all should create unique registration sequence number in advance;
Step 12: the host node registered client is obtained hardware information (can be Equipment Serial Numbers such as mainboard, CPU, internal memory, hard disk, network interface card) as hardware fingerprint, and sends to registrar together with sequence number and register;
Step 13: registration service judges that registration sequence number effectively, will and create the host node authorization message service time according to predefined software function, content of copyright file just here, and the content of copyright file mainly comprises:
The cloud system essential information;
The effective storage life of system;
System allows the maximum-norm of expansion;
Allow the node type of interpolation in the system;
Every category node effective efficiency is described and restriction in the system;
Other management or control information;
Step 14: calculate the informative abstract (MD2, MD5, SHA1, or SHA512 or the like) of content of copyright file, and the private key of using system provider signs, content file is sent to host node together with signature, and revise the registration sequence state;
Step 15: the validity of host node certifying signature;
Step 16: host node calculates the complex data summary of content file and hardware fingerprint information architecture, through the safety encipher module summary is encrypted, and generates the summary ciphertext;
Step 17: content file, signature and summary ciphertext are write rights file.
11. method as claimed in claim 9,4-5 is specially with step:
Step 21: non-host node sends to the registrar that operates on the host node with hardware fingerprint and node type;
Step 22: host node is judged register requirement effectively (this node is not by registration or do not exceed maximum-norm), based on authorized content in the rights file, generates the content file to this node;
Step 23: host node has the ID of uniqueness and creates a random symmetric key for this register node distribution, and content file, key and ID are sent to non-host node;
Step 24: at non-host node, will calculate content file and hardware fingerprint merges, and calculate the informative abstract of blended data, and summary encrypted, and destroy key through key;
Step 25: ID, content file and ciphertext are write certificate file, and the result is returned to host node; Step 26: after host node is received correct result, through the safety encipher module key is encrypted the generation ciphertext, with ciphertext and together with ID, the register node hardware fingerprint is carried out this locality and is preserved the registration end.
12. method as claimed in claim 9 is specially step 6:
Step 31: non-host node ID and hardware fingerprint are sent to host node;
Step 32: host node is retrieved corresponding hardware fingerprint through ID, and two hardware fingerprint are identical, and host node will be deciphered encryption key through the safety encipher module, and key is sent to non-host node;
Step 33: non-host node is decomposed into content of copyright file and original digest cipher-text information with certificate file;
Step 34: non-host node obtains original digest through the secret key decryption ciphertext;
Step 35: the blended data summary that obtains content file and hardware fingerprint information;
Step 36:, show that then content file is effective if original digest is identical with new calculating summary;
Step 37: obtain corresponding function or control information according to content file, if operation meets the requirements, checking is passed through, and operation carries out.
13. method as claimed in claim 9 after step 3, if host node need be used the resource on any host node, needs to carry out a host node proof procedure, is specially:
Step 41: certificate file is decomposed into content of copyright file and cipher-text information;
Step 42:, obtain original digest through safety encipher module decrypts ciphertext;
Step 43: the blended data summary that obtains content file and hardware fingerprint information;
Step 44:, show that then content file is effective if original digest is identical with new calculating summary;
Step 45: obtain corresponding function or control information according to content file, if operation meets the requirements, checking is passed through, and operation carries out.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210192734.5A CN102750479B (en) | 2012-06-12 | 2012-06-12 | A kind of delamination software copy-right protection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210192734.5A CN102750479B (en) | 2012-06-12 | 2012-06-12 | A kind of delamination software copy-right protection method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102750479A true CN102750479A (en) | 2012-10-24 |
CN102750479B CN102750479B (en) | 2018-08-07 |
Family
ID=47030652
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210192734.5A Active CN102750479B (en) | 2012-06-12 | 2012-06-12 | A kind of delamination software copy-right protection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102750479B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104537284A (en) * | 2014-12-19 | 2015-04-22 | 葛胜锦 | Software protecting system and method based on remote service |
CN109547215A (en) * | 2018-12-28 | 2019-03-29 | 鞍钢集团自动化有限公司 | A kind of document information guard method based on mobile terminal fingerprint |
CN109561095A (en) * | 2018-06-20 | 2019-04-02 | 安徽省泰岳祥升软件有限公司 | micro-service authorization management method and device |
CN109753403A (en) * | 2017-11-06 | 2019-05-14 | 阿里巴巴集团控股有限公司 | Server operation method, apparatus, equipment and system |
CN110187892A (en) * | 2019-04-11 | 2019-08-30 | 中国人民解放军92942部队 | A kind of grading management method of information processing equipment |
CN111737660A (en) * | 2020-06-28 | 2020-10-02 | 浙江大华技术股份有限公司 | Method, system and storage medium for realizing software authorization |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1738248A (en) * | 2004-02-25 | 2006-02-22 | 索尼株式会社 | Information-processing method, information-processing apparatus and computer program |
CN1889586A (en) * | 2005-06-30 | 2007-01-03 | 华为技术有限公司 | A log-on/log-down system and log-on/log-down method |
CN101521660A (en) * | 2008-02-27 | 2009-09-02 | 华为技术有限公司 | Session initiation protocol registry method, certification and authorization method, system and equipment |
US20100162231A1 (en) * | 2008-12-19 | 2010-06-24 | Babeldreams S.L | Personalized, automated modification method and system for software applications and contents |
CN102289630A (en) * | 2011-07-29 | 2011-12-21 | 天津同阳科技发展有限公司 | Copyright protection method for continuous emission monitoring system (CEMS) |
-
2012
- 2012-06-12 CN CN201210192734.5A patent/CN102750479B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1738248A (en) * | 2004-02-25 | 2006-02-22 | 索尼株式会社 | Information-processing method, information-processing apparatus and computer program |
CN1889586A (en) * | 2005-06-30 | 2007-01-03 | 华为技术有限公司 | A log-on/log-down system and log-on/log-down method |
CN101521660A (en) * | 2008-02-27 | 2009-09-02 | 华为技术有限公司 | Session initiation protocol registry method, certification and authorization method, system and equipment |
US20100162231A1 (en) * | 2008-12-19 | 2010-06-24 | Babeldreams S.L | Personalized, automated modification method and system for software applications and contents |
CN102289630A (en) * | 2011-07-29 | 2011-12-21 | 天津同阳科技发展有限公司 | Copyright protection method for continuous emission monitoring system (CEMS) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104537284A (en) * | 2014-12-19 | 2015-04-22 | 葛胜锦 | Software protecting system and method based on remote service |
CN104537284B (en) * | 2014-12-19 | 2017-05-03 | 葛胜锦 | Software protecting system and method based on remote service |
CN109753403A (en) * | 2017-11-06 | 2019-05-14 | 阿里巴巴集团控股有限公司 | Server operation method, apparatus, equipment and system |
CN109561095A (en) * | 2018-06-20 | 2019-04-02 | 安徽省泰岳祥升软件有限公司 | micro-service authorization management method and device |
CN109547215A (en) * | 2018-12-28 | 2019-03-29 | 鞍钢集团自动化有限公司 | A kind of document information guard method based on mobile terminal fingerprint |
CN109547215B (en) * | 2018-12-28 | 2022-05-10 | 鞍钢集团自动化有限公司 | Document information protection method based on mobile terminal fingerprint |
CN110187892A (en) * | 2019-04-11 | 2019-08-30 | 中国人民解放军92942部队 | A kind of grading management method of information processing equipment |
CN111737660A (en) * | 2020-06-28 | 2020-10-02 | 浙江大华技术股份有限公司 | Method, system and storage medium for realizing software authorization |
CN111737660B (en) * | 2020-06-28 | 2023-11-17 | 浙江大华技术股份有限公司 | Method, system and storage medium for realizing software authorization |
Also Published As
Publication number | Publication date |
---|---|
CN102750479B (en) | 2018-08-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111708991B (en) | Service authorization method, device, computer equipment and storage medium | |
CN103078858B (en) | Based on the soft ware authorization trial method of web services and signing certificate | |
CN101821746B (en) | Device and method for backup of rights objects | |
CN1985466B (en) | Method of delivering direct proof private keys in signed groups to devices using a distribution CD | |
CN101605137B (en) | Safe distribution file system | |
US20130028419A1 (en) | System and a method for use in a symmetric key cryptographic communications | |
CN101771699A (en) | Method and system for improving SaaS application security | |
US20120303967A1 (en) | Digital rights management system and method for protecting digital content | |
CN106936588B (en) | Hosting method, device and system of hardware control lock | |
CN101379487A (en) | Method and apparatus for generating rights object by means of delegation of authority | |
CN102123031A (en) | Hardware attestation techniques | |
CN102750479A (en) | Method and system for layered software copyright protection | |
JP5380583B1 (en) | Device authentication method and system | |
JP2010514000A (en) | Method for securely storing program state data in an electronic device | |
CN101286994A (en) | Digital literary property management method, server and system for content sharing within multiple devices | |
CN102567685A (en) | Software copyright protection method based on asymmetric public key password system | |
CN103186720A (en) | Digital rights management method, equipment and system | |
CN111695097A (en) | Login checking method and device and computer readable storage medium | |
JP4823704B2 (en) | Authentication system, authentication information delegation method and security device in the same system | |
CN113378119A (en) | Software authorization method, device, equipment and storage medium | |
CN100410829C (en) | Granting an access to a computer-based object | |
CN101399663B (en) | Method, system and device for digital content authentication | |
KR20100114321A (en) | Digital content transaction-breakdown the method thereof | |
JP4840575B2 (en) | Terminal device, certificate issuing device, certificate issuing system, certificate acquisition method and certificate issuing method | |
CN102739656A (en) | Method and system for controlling type and scale of non-host node |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 100086 Chaoyang District, Beijing futung East Street 1 hospital 3 Building 2 unit 15 level 121806 Applicant after: Yinghua Hightech Co., Ltd. Address before: 100086 Beijing Haidian District Zhongguancun South Avenue a 6 building A710 Applicant before: Yinghua Hightech Co., Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |