CN102750479B - A kind of delamination software copy-right protection method - Google Patents

A kind of delamination software copy-right protection method Download PDF

Info

Publication number
CN102750479B
CN102750479B CN201210192734.5A CN201210192734A CN102750479B CN 102750479 B CN102750479 B CN 102750479B CN 201210192734 A CN201210192734 A CN 201210192734A CN 102750479 B CN102750479 B CN 102750479B
Authority
CN
China
Prior art keywords
host node
master
content
file
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210192734.5A
Other languages
Chinese (zh)
Other versions
CN102750479A (en
Inventor
白树伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
YINGHUA HIGHTECH CO Ltd
Original Assignee
YINGHUA HIGHTECH CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by YINGHUA HIGHTECH CO Ltd filed Critical YINGHUA HIGHTECH CO Ltd
Priority to CN201210192734.5A priority Critical patent/CN102750479B/en
Publication of CN102750479A publication Critical patent/CN102750479A/en
Application granted granted Critical
Publication of CN102750479B publication Critical patent/CN102750479B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

An embodiment of the present invention provides a kind of delamination software copyright protecting system, including registrar, a host node being connected with registrar and at least one non-master being connected with the host node, it is characterised in that:The registrar, for issuing host node authorization message to host node;The host node for receiving host node authorization message from registrar, and according to host node authorization message to generate non-master authorization message, and issues non-master authorization message to non-master;The non-master for receiving authorization message from host node, and executes corresponding operation according to the non-master authorization message.

Description

A kind of delamination software copy-right protection method
Technical field
The present invention relates to field of communication technology more particularly to a kind of delamination software copy-right protection method and systems.
Background technology
Current software copyright protection mechanism is to be directed to single system or single node environment.
Invention 200810106560 is a typical network copyright protection method.This method is extracted from program file By protection code to remote server, when executing by protection code, needs far call by protection module, execute code function And it enjoys.The maximum dependence of the invention, which is protected object, must can connect network, and certain key messages are obtained by network. The disadvantage is that it is big to mesh dependence, for private clound, possibly network can not be connected, such copy-right protection method will influence visitor The normal use at family;In addition, global network environment is complicated, either performance and safety can not all be ensured, therefore, for The cloud system of high performance demands, the Copyright protection scheme can not use.
Invention content
A kind of delamination software copyright protecting system provided in an embodiment of the present invention, including registrar, with registration service An at least one non-master connected host node of device and be connected with the host node, it is characterised in that:The registration clothes Business device, for issuing host node authorization message to host node;The host node, for receiving host node mandate from registrar Information, and according to host node authorization message to generate non-master authorization message, and issue non-master mandate to non-master Information;The non-master for receiving authorization message from host node, and executes accordingly according to the non-master authorization message Operation.
A kind of delamination software copy-right protection method provided in an embodiment of the present invention is applied to delamination software copyright protection system System, which includes registrar, be connected with registrar a host node and is connected at least with the host node One non-master, it is characterised in that:
Step 1:Host node sends out host node registration request to registrar;
Step 2:Whether registrar verification host node registration request is effective, if in vain, refusing to register, flow knot Beam;If it is valid, generating host node authorization message, it is sent to host node;
Step 3:Host node receives the host node authorization message;
Step 4:Non-master sends out non-master registration request to host node;
Step 5:Host node judges whether non-master registration request is effective, if it is valid, being believed according to host node mandate It ceases to generate non-master authorization message;And non-master authorization message is sent to non-master;
Step 6:Non-master executes corresponding operating according to non-master authorization message.
Pass through two layers of set-up mode of main non-master so that can effectively control non-master scale;Whole system is adopted Copyright protection, copyright protection relative inexpensiveness can be completed with a Security Encryption module.
Description of the drawings
Fig. 1 is delamination software copyright protecting system general structure schematic diagram provided in an embodiment of the present invention;
Fig. 2 is delamination software copyright protecting system concrete structure schematic diagram provided in an embodiment of the present invention;
Fig. 3 is delamination software copy-right protection method overall procedure schematic diagram provided in an embodiment of the present invention;
Fig. 4 is delamination software copy-right protection method First partial figure provided in an embodiment of the present invention;
Fig. 5 is the second Local map of delamination software copy-right protection method provided in an embodiment of the present invention;
Fig. 6 is delamination software copy-right protection method third Local map provided in an embodiment of the present invention;
Fig. 7 is the 4th Local map of delamination software copy-right protection method provided in an embodiment of the present invention.
Specific implementation mode
It is the general illustration of delamination software copyright protecting system provided in an embodiment of the present invention, the system packet referring to Fig. 1 A registrar 101 is included, a host node 201 being connected with registrar and be connected with the host node at least one A non-master 201 and 202.
Registrar, for issuing host node authorization message to host node;The host node is used for from registrar Host node authorization message is received, and according to host node authorization message to generate non-master authorization message, and is sent out to non-master Cloth non-master authorization message;The non-master for receiving authorization message from host node, and is awarded according to the non-master It weighs information and executes corresponding operation.
It is the specific schematic diagram of delamination software copyright protecting system provided in an embodiment of the present invention, wherein the note referring to Fig. 2 Volume server includes host node registrar, and the host node includes host node registered client.
It is described to have host node registered client, for sending out a registration sequence number to the host node registrar.
The host node registrar, for whether effectively to judge the registration sequence number, to main section if effectively Point publication host node authorization message.
The host node authorization message includes the maximum-norm and/or type of expansible non-master.
The non-master includes non-master registered client, and the host node includes non-master registrar, The non-master registered client is used to send non-master registration request to non-master registrar.
Non-master registrar judges whether non-master registration request is effective, is sent out to non-master if effectively Cloth non-master authorization message, the non-master authorization message include the software function that the non-master can use.It is preferred that , judge that the whether effective actual conditions of non-master registration request include:The non-master is not registered, and non-master Quantity be not above maximum-norm.
Host node further includes:One Security Encryption module, for the information on host node be encrypted and/or decryption at Reason.And non-master need not include then Security Encryption module.
Host node further includes:One host node copyright authentication module, for verifying the legitimacy of function in host node and having Effect property.
Non-master includes a non-master copyright authentication module, for verify in non-master the legitimacy of function and Validity.
Host node can complete registration by local area network or global network, generate the certificate text with operator's signature Part, certificate file contain content of copyright file, and content file defines the essential information of cloud system, the scale of cloud system, section Vertex type, the information such as term of validity of system, content file also specify nodal function, the information such as node hardware attribute.In addition, Certificate file is further comprised to content of copyright file and the encrypted ciphertext data of system hardware finger print data abstract, and data encryption is It is carried out by hardware encryption device.In order to ensure that the legitimacy authorized, certificate file are further comprised by operator to content file The digital signature carried out with hardware fingerprint.Using this single host node copyright control pattern so that system framework and under When layer equipment is changed, without changing the mode of copyright control, while the flexibility of system is increased.
Non-master is authorized by LAN through legal host node, according to authorized content (the node work(of host node Can, node hardware attribute) content file is generated, together with the hardware fingerprint information of non-master, the common card for building non-master Written matter also includes the abstract ciphertext through host node encrypted non-master content file and finger print information in certificate file, and And protection is encrypted by the encrypting module of host node in abstract encryption key, protected data is only stored on host node, Make to be placed one's entire reliance upon host node by the operation of protection module in non-master.Non-master is awarded by LAN from host node Power substantially increases the speed for obtaining and authorizing, and reduces delay caused by mandate, improves the performance of system.
Encryption can be distorted to avoid to the informative abstract that ciphertext is protected, you can with prevent revision power content file and Hardware fingerprint information ensure that the integrality of content file information and hardware fingerprint.Content file information and hardware fingerprint it is complete Whole property can ensure the legitimacy of content file and hardware platform, by the legal Sino-German constraint of content file, can control soft The scale of part system, term of validity, nodal function, the information such as node hardware attribute.The two-stage of host node and non-master is registered The verification burden that host node can be reduced with authentication mechanism, reduces the communication of host node and non-master, improves authority checking Efficiency.Protection is only encrypted on the primary node simultaneously, reduces the encrypted cost of hardware and expense.
Security Encryption module can be considered as different peaces according to security level or equipment cost according to actual needs The realization of full encrypting module, symmetric cryptography (AES, DES, 3DES etc.) and the decryption oprerations of input data may be implemented in it, Extraneous interface is inoperable to key (read/write).Security Encryption module supports multiple keys, is divided into a secondary key and multiple key Two kinds, a secondary key is only capable of carrying out one-time pad encryption and repeatedly decryption, which is used for the data protection of host node.Multiple key can It is operated for the encryption and decryption of multiple data, which is used for the data protection of non-master.Security Encryption module is can not to answer The hardware device of system, can be smart card, and microcontroller can also be other embedded devices etc..In each cloud system, only need Dispose a Security Encryption module.
The method defines registration management server, host node, non-master.Registration management server cloud system provider For the equipment that client provides system registry service, can be deployed in the server that can be remotely accessed in network, can also be Portable personal computer.Host node is the core node in cloud system, can control entire cloud system normal operation and Scale, non-master are the functional nodes in cloud system, can complete specifically calculating or store function.
Function module in host node and non-master is software protection object, these modules can be completed to meet cloud platform Primary demand.Host node completes system registry by host node registrar, and non-master is non-by what is disposed on host node Host node registrar completes registration.The legitimacy of function and validity are completed by copyright authentication module in node.Safety Encrypting module may be implemented to carry out sensitive data the security module of symmetric cryptography decryption, can be software module, can also be Hardware module.
It is delamination software copy-right protection method overall procedure schematic diagram provided in an embodiment of the present invention referring to Fig. 3.
Applied to the delamination software copyright protecting system as described in Fig. 1 or Fig. 2, which includes registrar, with note A volume server host node being connected and at least one non-master being connected with the host node.
This method flow includes the following steps:
Step 1:Host node sends out host node registration request to registrar;
Step 2:Whether registrar verification host node registration request is effective, if in vain, refusing to register, flow knot Beam;If it is valid, generating host node authorization message, it is sent to host node;
Step 3:Host node receives the host node authorization message;
Step 4:Non-master sends out non-master registration request to host node;
Step 5:Host node judges whether non-master registration request is effective, if it is valid, being believed according to host node mandate It ceases to generate non-master authorization message;And non-master authorization message is sent to non-master;
Step 6:Non-master executes corresponding operating according to non-master authorization message.
The detail of step 13 in Fig. 3, is described with reference to Figure 4.
Step 11:The system registry sequence number that client is provided by friendly interface input system provider, each system Unique registration sequence number should be all pre-created.
Preferably, it may include step 12:It (can be mainboard, CPU, interior that host node registered client, which obtains hardware information, Deposit, the equipment Serial Numbers such as hard disk, network interface card) it is used as hardware fingerprint, and be sent collectively to registrar together with sequence number and noted Volume.
Step 13:Registration service judges that registration sequence number is effective, will be according to preset software function and usage time Host node authorization message is created, namely content of copyright file, content of copyright file include mainly herein:
Cloud system essential information;
The effective storage life of system;
System allows the maximum-norm of extension;
Allow the node type of addition in system;
Per the description of class node effective efficiency and limitation in system;
Other management or control information.
Step 14:The informative abstract (MD2, MD5, SHA1 or SHA512 etc.) of content of copyright file is calculated, and is made It is signed with the private key of service provider, content file is sent jointly into host node together with signature, and change registration sequence Number state.
Step 15:The validity of host node verification signature.
Step 16:The complex data that host node calculates content file and hardware fingerprint information architecture is made a summary, by adding safely Abstract is encrypted in close module, generates abstract ciphertext.
Step 17:Rights file is written into content file, signature and abstract ciphertext.
The detail of step 45 in Fig. 3, is described with reference to Figure 5.
Step 21:Hardware fingerprint and node type are sent to the registrar of operation on the primary node by non-master.
Step 22:Host node judges registration request effectively (node is not registered or without departing from maximum-norm), base The authorized content in rights file generates the content file for the node.
Step 23:Host node is that the register node distributes ID with uniqueness and creates a random symmetric key, And content file, key and ID are sent to non-master.
Step 24:In non-master, content file will be calculated and hardware fingerprint merges, calculate the information of blended data Abstract, and be encrypted by key pair abstract, destroy key.
Step 25:Certificate file is written into ID, content file and ciphertext, and returns result to host node.
Step 26:After host node receives correct result, generation ciphertext is encrypted to key by Security Encryption module, it will Ciphertext and together with ID, register node hardware fingerprint carries out local preservation, and registration terminates.
The details of step 6 in Fig. 3, refer to the attached drawing 6 describe.
Step 31:Non-master ID and hardware fingerprint are sent to host node;
Step 32:Host node retrieves corresponding hardware fingerprint by ID, and two hardware fingerprints are identical, and host node will pass through safety Encryption key is decrypted in encrypting module, and key is sent to non-master;
Step 33:Certificate file is decomposed into content of copyright file and original digest cipher-text information by non-master;
Step 34:Non-master obtains original digest by secret key decryption ciphertext;
Step 35:Obtain content file and the blended data abstract of hardware fingerprint information;
Step 36:If original digest is identical with the new abstract that calculates, show that content file is effective;
Step 37:Corresponding function is obtained according to content file or control information is verified if operation meets the requirements, Operation operation carries out.
After the step 3 of Fig. 3, if host node needs to use the resource on any host node, need to execute a main section Point verification process, the process refer to the attached drawing 7 describe.
Step 41:Certificate file is decomposed into content of copyright file and cipher-text information.
Step 42:Ciphertext is decrypted by Security Encryption module, obtains original digest.
Step 43:Obtain content file and the blended data abstract of hardware fingerprint information.
Step 44:If original digest is identical with the new abstract that calculates, show that content file is effective.
Step 45:Corresponding function is obtained according to content file or control information is verified if operation meets the requirements, Operation operation carries out.
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, the present invention can be used in one or more wherein include computer usable program code computer Medium can be spat with storage(Including but not limited to magnetic disk storage and optical memory etc.)The computer program product of upper implementation Form.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art God and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to include these modifications and variations.

Claims (4)

1. a kind of delamination software copy-right protection method is applied to delamination software copyright protecting system, which includes registration service Device, a host node being connected with registrar and at least one non-master being connected with the host node, feature exist In:
Step 1:Host node sends out host node registration request to registrar;
Step 2:Whether registrar verification host node registration request is effective, if in vain, refusing to register, flow terminates; If it is valid, generating host node authorization message, it is sent to host node;
Step 3:Host node receives the host node authorization message;
Step 4:Non-master sends out non-master registration request to host node;
Step 5:Host node judges whether non-master registration request effective, if it is valid, according to host node authorization message come Generate non-master authorization message;And non-master authorization message is sent to non-master;
Step 6:Non-master executes corresponding operating according to non-master authorization message;
It is specially by step 1-3:
Step 11:The system registry sequence number that client is provided by friendly interface input system provider, each system are answered This has been pre-created unique registration sequence number;
Step 12:Host node registered client obtains hardware information and is sent collectively to note as hardware fingerprint, and together with sequence number Volume server is registered;
Step 13:Registration service judges that registration sequence number is effective, will be created according to preset software function and usage time Host node authorization message, namely content of copyright file, content of copyright file include herein:
Cloud system essential information;
The effective storage life of system;
System allows the maximum-norm of extension;
Allow the node type of addition in system;
Per the description of class node effective efficiency and limitation in system;
Step 14:The informative abstract of content of copyright file is calculated, and is signed using the private key of service provider, it will be in copyright Hold file and send jointly to host node together with signature, and changes registration sequence state;
Step 15:The validity of host node verification signature;
Step 16:Host node calculates content of copyright file and the complex data of hardware fingerprint information architecture is made a summary, by adding safely Abstract is encrypted in close module, generates abstract ciphertext;
Step 17:Rights file is written into content of copyright file, signature and abstract ciphertext.
2. step 4-5 is specially by method as claimed in claim 1:
Step 21:Hardware fingerprint and node type are sent to the registrar of operation on the primary node by non-master;
Step 22:Host node judges that registration request is effective, based on authorized content in rights file, generates for the non-master Content of copyright file;
Step 23:Host node is that register node distributes ID with uniqueness and creates a random symmetric key, and by version Power content file, key and ID are sent to non-master;
Step 24:In non-master, content of copyright file will be calculated and hardware fingerprint merges, calculate the information of blended data Abstract, and be encrypted by key pair abstract, destroy key;
Step 25:Certificate file is written into ID, content of copyright file and ciphertext, and returns result to host node;
Step 26:After host node receives correct result, generation ciphertext is encrypted to key by Security Encryption module, by ciphertext And together with ID, register node hardware fingerprint carries out local preservation, and registration terminates.
3. step 6 is specially by method as claimed in claim 1:
Step 31:Non-master ID and hardware fingerprint are sent to host node;
Step 32:Host node retrieves corresponding hardware fingerprint by ID, and two hardware fingerprints are identical, and host node will be by encrypting safely Encryption key is decrypted in module, and key is sent to non-master;
Step 33:Certificate file is decomposed into content of copyright file and original digest cipher-text information by non-master;
Step 34:Non-master obtains original digest by secret key decryption ciphertext;
Step 35:Obtain content of copyright file and the blended data abstract of hardware fingerprint information;
Step 36:If original digest is identical with the new abstract that calculates, show that content of copyright file is effective;
Step 37:It is verified according to content of copyright file acquisition corresponding function or control information if operation meets the requirements, Operation operation carries out.
4. method as claimed in claim 1 if host node needs to use the resource on any host node, needs after step 3 A host node verification process is executed, specially:
Step 41:Certificate file is decomposed into content of copyright file and cipher-text information;
Step 42:Ciphertext is decrypted by Security Encryption module, obtains original digest;
Step 43:Obtain content of copyright file and the blended data abstract of hardware fingerprint information;
Step 44:If original digest is identical with the new abstract that calculates, show that content of copyright file is effective;
Step 45:It is verified according to content of copyright file acquisition corresponding function or control information if operation meets the requirements, Operation operation carries out.
CN201210192734.5A 2012-06-12 2012-06-12 A kind of delamination software copy-right protection method Active CN102750479B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210192734.5A CN102750479B (en) 2012-06-12 2012-06-12 A kind of delamination software copy-right protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210192734.5A CN102750479B (en) 2012-06-12 2012-06-12 A kind of delamination software copy-right protection method

Publications (2)

Publication Number Publication Date
CN102750479A CN102750479A (en) 2012-10-24
CN102750479B true CN102750479B (en) 2018-08-07

Family

ID=47030652

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210192734.5A Active CN102750479B (en) 2012-06-12 2012-06-12 A kind of delamination software copy-right protection method

Country Status (1)

Country Link
CN (1) CN102750479B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104537284B (en) * 2014-12-19 2017-05-03 葛胜锦 Software protecting system and method based on remote service
CN109753403B (en) * 2017-11-06 2022-09-23 阿里巴巴集团控股有限公司 Server operation method, device, equipment and system
CN108737444A (en) * 2018-06-20 2018-11-02 北京玄科技有限公司 Micro services authorization management method and device applied to intelligent robot
CN109547215B (en) * 2018-12-28 2022-05-10 鞍钢集团自动化有限公司 Document information protection method based on mobile terminal fingerprint
CN110187892A (en) * 2019-04-11 2019-08-30 中国人民解放军92942部队 A kind of grading management method of information processing equipment
CN111737660B (en) * 2020-06-28 2023-11-17 浙江大华技术股份有限公司 Method, system and storage medium for realizing software authorization

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1738248A (en) * 2004-02-25 2006-02-22 索尼株式会社 Information-processing method, information-processing apparatus and computer program
CN1889586A (en) * 2005-06-30 2007-01-03 华为技术有限公司 A log-on/log-down system and log-on/log-down method
CN101521660A (en) * 2008-02-27 2009-09-02 华为技术有限公司 Session initiation protocol registry method, certification and authorization method, system and equipment
CN102289630A (en) * 2011-07-29 2011-12-21 天津同阳科技发展有限公司 Copyright protection method for continuous emission monitoring system (CEMS)

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2199902A1 (en) * 2008-12-19 2010-06-23 Babeldreams S.L. Personalized, automated modification method and system for software applications and contents

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1738248A (en) * 2004-02-25 2006-02-22 索尼株式会社 Information-processing method, information-processing apparatus and computer program
CN1889586A (en) * 2005-06-30 2007-01-03 华为技术有限公司 A log-on/log-down system and log-on/log-down method
CN101521660A (en) * 2008-02-27 2009-09-02 华为技术有限公司 Session initiation protocol registry method, certification and authorization method, system and equipment
CN102289630A (en) * 2011-07-29 2011-12-21 天津同阳科技发展有限公司 Copyright protection method for continuous emission monitoring system (CEMS)

Also Published As

Publication number Publication date
CN102750479A (en) 2012-10-24

Similar Documents

Publication Publication Date Title
US8997198B1 (en) Techniques for securing a centralized metadata distributed filesystem
CN103138939B (en) Based on the key access times management method of credible platform module under cloud memory module
CN102750479B (en) A kind of delamination software copy-right protection method
US20140270179A1 (en) Method and system for key generation, backup, and migration based on trusted computing
CN103780607B (en) The method of the data de-duplication based on different rights
CN106936588B (en) Hosting method, device and system of hardware control lock
CN103221961A (en) Method and apparatus including architecture for protecting multi-ser sensitive code and data
JPH11225142A (en) Authentication system and method
CN109587101A (en) A kind of digital certificate management method, device and storage medium
CN102567685B (en) Software copyright protection method based on asymmetric public key password system
US8700909B2 (en) Revocation of a biometric reference template
JP4525609B2 (en) Authority management server, authority management method, authority management program
JP2010514000A (en) Method for securely storing program state data in an electronic device
CN101286994A (en) Digital literary property management method, server and system for content sharing within multiple devices
CN111241492A (en) Product multi-tenant secure credit granting method, system and electronic equipment
CN104486087A (en) Digital signature method based on remote hardware security modules
JP2014006691A (en) Device authentication method and system
CN108521424B (en) Distributed data processing method for heterogeneous terminal equipment
CN104104650A (en) Data file visit method and terminal equipment
JP2007334417A (en) Distributed information sharing method and terminal equipment
Mukundan et al. Replicated Data Integrity Verification in Cloud.
CN101048971B (en) Method and system for managing authentication and payment for use of broadcast material
CN116964586A (en) Authorization encryption
JP2014022920A (en) Electronic signature system, electronic signature method, and electronic signature program
CN103336918B (en) Electronic hard disk system authorization method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100086 Chaoyang District, Beijing futung East Street 1 hospital 3 Building 2 unit 15 level 121806

Applicant after: Yinghua Hightech Co., Ltd.

Address before: 100086 Beijing Haidian District Zhongguancun South Avenue a 6 building A710

Applicant before: Yinghua Hightech Co., Ltd.

GR01 Patent grant
GR01 Patent grant