CN102750479B - A kind of delamination software copy-right protection method - Google Patents
A kind of delamination software copy-right protection method Download PDFInfo
- Publication number
- CN102750479B CN102750479B CN201210192734.5A CN201210192734A CN102750479B CN 102750479 B CN102750479 B CN 102750479B CN 201210192734 A CN201210192734 A CN 201210192734A CN 102750479 B CN102750479 B CN 102750479B
- Authority
- CN
- China
- Prior art keywords
- host node
- master
- content
- file
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Storage Device Security (AREA)
Abstract
An embodiment of the present invention provides a kind of delamination software copyright protecting system, including registrar, a host node being connected with registrar and at least one non-master being connected with the host node, it is characterised in that:The registrar, for issuing host node authorization message to host node;The host node for receiving host node authorization message from registrar, and according to host node authorization message to generate non-master authorization message, and issues non-master authorization message to non-master;The non-master for receiving authorization message from host node, and executes corresponding operation according to the non-master authorization message.
Description
Technical field
The present invention relates to field of communication technology more particularly to a kind of delamination software copy-right protection method and systems.
Background technology
Current software copyright protection mechanism is to be directed to single system or single node environment.
Invention 200810106560 is a typical network copyright protection method.This method is extracted from program file
By protection code to remote server, when executing by protection code, needs far call by protection module, execute code function
And it enjoys.The maximum dependence of the invention, which is protected object, must can connect network, and certain key messages are obtained by network.
The disadvantage is that it is big to mesh dependence, for private clound, possibly network can not be connected, such copy-right protection method will influence visitor
The normal use at family;In addition, global network environment is complicated, either performance and safety can not all be ensured, therefore, for
The cloud system of high performance demands, the Copyright protection scheme can not use.
Invention content
A kind of delamination software copyright protecting system provided in an embodiment of the present invention, including registrar, with registration service
An at least one non-master connected host node of device and be connected with the host node, it is characterised in that:The registration clothes
Business device, for issuing host node authorization message to host node;The host node, for receiving host node mandate from registrar
Information, and according to host node authorization message to generate non-master authorization message, and issue non-master mandate to non-master
Information;The non-master for receiving authorization message from host node, and executes accordingly according to the non-master authorization message
Operation.
A kind of delamination software copy-right protection method provided in an embodiment of the present invention is applied to delamination software copyright protection system
System, which includes registrar, be connected with registrar a host node and is connected at least with the host node
One non-master, it is characterised in that:
Step 1:Host node sends out host node registration request to registrar;
Step 2:Whether registrar verification host node registration request is effective, if in vain, refusing to register, flow knot
Beam;If it is valid, generating host node authorization message, it is sent to host node;
Step 3:Host node receives the host node authorization message;
Step 4:Non-master sends out non-master registration request to host node;
Step 5:Host node judges whether non-master registration request is effective, if it is valid, being believed according to host node mandate
It ceases to generate non-master authorization message;And non-master authorization message is sent to non-master;
Step 6:Non-master executes corresponding operating according to non-master authorization message.
Pass through two layers of set-up mode of main non-master so that can effectively control non-master scale;Whole system is adopted
Copyright protection, copyright protection relative inexpensiveness can be completed with a Security Encryption module.
Description of the drawings
Fig. 1 is delamination software copyright protecting system general structure schematic diagram provided in an embodiment of the present invention;
Fig. 2 is delamination software copyright protecting system concrete structure schematic diagram provided in an embodiment of the present invention;
Fig. 3 is delamination software copy-right protection method overall procedure schematic diagram provided in an embodiment of the present invention;
Fig. 4 is delamination software copy-right protection method First partial figure provided in an embodiment of the present invention;
Fig. 5 is the second Local map of delamination software copy-right protection method provided in an embodiment of the present invention;
Fig. 6 is delamination software copy-right protection method third Local map provided in an embodiment of the present invention;
Fig. 7 is the 4th Local map of delamination software copy-right protection method provided in an embodiment of the present invention.
Specific implementation mode
It is the general illustration of delamination software copyright protecting system provided in an embodiment of the present invention, the system packet referring to Fig. 1
A registrar 101 is included, a host node 201 being connected with registrar and be connected with the host node at least one
A non-master 201 and 202.
Registrar, for issuing host node authorization message to host node;The host node is used for from registrar
Host node authorization message is received, and according to host node authorization message to generate non-master authorization message, and is sent out to non-master
Cloth non-master authorization message;The non-master for receiving authorization message from host node, and is awarded according to the non-master
It weighs information and executes corresponding operation.
It is the specific schematic diagram of delamination software copyright protecting system provided in an embodiment of the present invention, wherein the note referring to Fig. 2
Volume server includes host node registrar, and the host node includes host node registered client.
It is described to have host node registered client, for sending out a registration sequence number to the host node registrar.
The host node registrar, for whether effectively to judge the registration sequence number, to main section if effectively
Point publication host node authorization message.
The host node authorization message includes the maximum-norm and/or type of expansible non-master.
The non-master includes non-master registered client, and the host node includes non-master registrar,
The non-master registered client is used to send non-master registration request to non-master registrar.
Non-master registrar judges whether non-master registration request is effective, is sent out to non-master if effectively
Cloth non-master authorization message, the non-master authorization message include the software function that the non-master can use.It is preferred that
, judge that the whether effective actual conditions of non-master registration request include:The non-master is not registered, and non-master
Quantity be not above maximum-norm.
Host node further includes:One Security Encryption module, for the information on host node be encrypted and/or decryption at
Reason.And non-master need not include then Security Encryption module.
Host node further includes:One host node copyright authentication module, for verifying the legitimacy of function in host node and having
Effect property.
Non-master includes a non-master copyright authentication module, for verify in non-master the legitimacy of function and
Validity.
Host node can complete registration by local area network or global network, generate the certificate text with operator's signature
Part, certificate file contain content of copyright file, and content file defines the essential information of cloud system, the scale of cloud system, section
Vertex type, the information such as term of validity of system, content file also specify nodal function, the information such as node hardware attribute.In addition,
Certificate file is further comprised to content of copyright file and the encrypted ciphertext data of system hardware finger print data abstract, and data encryption is
It is carried out by hardware encryption device.In order to ensure that the legitimacy authorized, certificate file are further comprised by operator to content file
The digital signature carried out with hardware fingerprint.Using this single host node copyright control pattern so that system framework and under
When layer equipment is changed, without changing the mode of copyright control, while the flexibility of system is increased.
Non-master is authorized by LAN through legal host node, according to authorized content (the node work(of host node
Can, node hardware attribute) content file is generated, together with the hardware fingerprint information of non-master, the common card for building non-master
Written matter also includes the abstract ciphertext through host node encrypted non-master content file and finger print information in certificate file, and
And protection is encrypted by the encrypting module of host node in abstract encryption key, protected data is only stored on host node,
Make to be placed one's entire reliance upon host node by the operation of protection module in non-master.Non-master is awarded by LAN from host node
Power substantially increases the speed for obtaining and authorizing, and reduces delay caused by mandate, improves the performance of system.
Encryption can be distorted to avoid to the informative abstract that ciphertext is protected, you can with prevent revision power content file and
Hardware fingerprint information ensure that the integrality of content file information and hardware fingerprint.Content file information and hardware fingerprint it is complete
Whole property can ensure the legitimacy of content file and hardware platform, by the legal Sino-German constraint of content file, can control soft
The scale of part system, term of validity, nodal function, the information such as node hardware attribute.The two-stage of host node and non-master is registered
The verification burden that host node can be reduced with authentication mechanism, reduces the communication of host node and non-master, improves authority checking
Efficiency.Protection is only encrypted on the primary node simultaneously, reduces the encrypted cost of hardware and expense.
Security Encryption module can be considered as different peaces according to security level or equipment cost according to actual needs
The realization of full encrypting module, symmetric cryptography (AES, DES, 3DES etc.) and the decryption oprerations of input data may be implemented in it,
Extraneous interface is inoperable to key (read/write).Security Encryption module supports multiple keys, is divided into a secondary key and multiple key
Two kinds, a secondary key is only capable of carrying out one-time pad encryption and repeatedly decryption, which is used for the data protection of host node.Multiple key can
It is operated for the encryption and decryption of multiple data, which is used for the data protection of non-master.Security Encryption module is can not to answer
The hardware device of system, can be smart card, and microcontroller can also be other embedded devices etc..In each cloud system, only need
Dispose a Security Encryption module.
The method defines registration management server, host node, non-master.Registration management server cloud system provider
For the equipment that client provides system registry service, can be deployed in the server that can be remotely accessed in network, can also be
Portable personal computer.Host node is the core node in cloud system, can control entire cloud system normal operation and
Scale, non-master are the functional nodes in cloud system, can complete specifically calculating or store function.
Function module in host node and non-master is software protection object, these modules can be completed to meet cloud platform
Primary demand.Host node completes system registry by host node registrar, and non-master is non-by what is disposed on host node
Host node registrar completes registration.The legitimacy of function and validity are completed by copyright authentication module in node.Safety
Encrypting module may be implemented to carry out sensitive data the security module of symmetric cryptography decryption, can be software module, can also be
Hardware module.
It is delamination software copy-right protection method overall procedure schematic diagram provided in an embodiment of the present invention referring to Fig. 3.
Applied to the delamination software copyright protecting system as described in Fig. 1 or Fig. 2, which includes registrar, with note
A volume server host node being connected and at least one non-master being connected with the host node.
This method flow includes the following steps:
Step 1:Host node sends out host node registration request to registrar;
Step 2:Whether registrar verification host node registration request is effective, if in vain, refusing to register, flow knot
Beam;If it is valid, generating host node authorization message, it is sent to host node;
Step 3:Host node receives the host node authorization message;
Step 4:Non-master sends out non-master registration request to host node;
Step 5:Host node judges whether non-master registration request is effective, if it is valid, being believed according to host node mandate
It ceases to generate non-master authorization message;And non-master authorization message is sent to non-master;
Step 6:Non-master executes corresponding operating according to non-master authorization message.
The detail of step 13 in Fig. 3, is described with reference to Figure 4.
Step 11:The system registry sequence number that client is provided by friendly interface input system provider, each system
Unique registration sequence number should be all pre-created.
Preferably, it may include step 12:It (can be mainboard, CPU, interior that host node registered client, which obtains hardware information,
Deposit, the equipment Serial Numbers such as hard disk, network interface card) it is used as hardware fingerprint, and be sent collectively to registrar together with sequence number and noted
Volume.
Step 13:Registration service judges that registration sequence number is effective, will be according to preset software function and usage time
Host node authorization message is created, namely content of copyright file, content of copyright file include mainly herein:
Cloud system essential information;
The effective storage life of system;
System allows the maximum-norm of extension;
Allow the node type of addition in system;
Per the description of class node effective efficiency and limitation in system;
Other management or control information.
Step 14:The informative abstract (MD2, MD5, SHA1 or SHA512 etc.) of content of copyright file is calculated, and is made
It is signed with the private key of service provider, content file is sent jointly into host node together with signature, and change registration sequence
Number state.
Step 15:The validity of host node verification signature.
Step 16:The complex data that host node calculates content file and hardware fingerprint information architecture is made a summary, by adding safely
Abstract is encrypted in close module, generates abstract ciphertext.
Step 17:Rights file is written into content file, signature and abstract ciphertext.
The detail of step 45 in Fig. 3, is described with reference to Figure 5.
Step 21:Hardware fingerprint and node type are sent to the registrar of operation on the primary node by non-master.
Step 22:Host node judges registration request effectively (node is not registered or without departing from maximum-norm), base
The authorized content in rights file generates the content file for the node.
Step 23:Host node is that the register node distributes ID with uniqueness and creates a random symmetric key,
And content file, key and ID are sent to non-master.
Step 24:In non-master, content file will be calculated and hardware fingerprint merges, calculate the information of blended data
Abstract, and be encrypted by key pair abstract, destroy key.
Step 25:Certificate file is written into ID, content file and ciphertext, and returns result to host node.
Step 26:After host node receives correct result, generation ciphertext is encrypted to key by Security Encryption module, it will
Ciphertext and together with ID, register node hardware fingerprint carries out local preservation, and registration terminates.
The details of step 6 in Fig. 3, refer to the attached drawing 6 describe.
Step 31:Non-master ID and hardware fingerprint are sent to host node;
Step 32:Host node retrieves corresponding hardware fingerprint by ID, and two hardware fingerprints are identical, and host node will pass through safety
Encryption key is decrypted in encrypting module, and key is sent to non-master;
Step 33:Certificate file is decomposed into content of copyright file and original digest cipher-text information by non-master;
Step 34:Non-master obtains original digest by secret key decryption ciphertext;
Step 35:Obtain content file and the blended data abstract of hardware fingerprint information;
Step 36:If original digest is identical with the new abstract that calculates, show that content file is effective;
Step 37:Corresponding function is obtained according to content file or control information is verified if operation meets the requirements,
Operation operation carries out.
After the step 3 of Fig. 3, if host node needs to use the resource on any host node, need to execute a main section
Point verification process, the process refer to the attached drawing 7 describe.
Step 41:Certificate file is decomposed into content of copyright file and cipher-text information.
Step 42:Ciphertext is decrypted by Security Encryption module, obtains original digest.
Step 43:Obtain content file and the blended data abstract of hardware fingerprint information.
Step 44:If original digest is identical with the new abstract that calculates, show that content file is effective.
Step 45:Corresponding function is obtained according to content file or control information is verified if operation meets the requirements,
Operation operation carries out.
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention
Apply the form of example.Moreover, the present invention can be used in one or more wherein include computer usable program code computer
Medium can be spat with storage(Including but not limited to magnetic disk storage and optical memory etc.)The computer program product of upper implementation
Form.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art
God and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to include these modifications and variations.
Claims (4)
1. a kind of delamination software copy-right protection method is applied to delamination software copyright protecting system, which includes registration service
Device, a host node being connected with registrar and at least one non-master being connected with the host node, feature exist
In:
Step 1:Host node sends out host node registration request to registrar;
Step 2:Whether registrar verification host node registration request is effective, if in vain, refusing to register, flow terminates;
If it is valid, generating host node authorization message, it is sent to host node;
Step 3:Host node receives the host node authorization message;
Step 4:Non-master sends out non-master registration request to host node;
Step 5:Host node judges whether non-master registration request effective, if it is valid, according to host node authorization message come
Generate non-master authorization message;And non-master authorization message is sent to non-master;
Step 6:Non-master executes corresponding operating according to non-master authorization message;
It is specially by step 1-3:
Step 11:The system registry sequence number that client is provided by friendly interface input system provider, each system are answered
This has been pre-created unique registration sequence number;
Step 12:Host node registered client obtains hardware information and is sent collectively to note as hardware fingerprint, and together with sequence number
Volume server is registered;
Step 13:Registration service judges that registration sequence number is effective, will be created according to preset software function and usage time
Host node authorization message, namely content of copyright file, content of copyright file include herein:
Cloud system essential information;
The effective storage life of system;
System allows the maximum-norm of extension;
Allow the node type of addition in system;
Per the description of class node effective efficiency and limitation in system;
Step 14:The informative abstract of content of copyright file is calculated, and is signed using the private key of service provider, it will be in copyright
Hold file and send jointly to host node together with signature, and changes registration sequence state;
Step 15:The validity of host node verification signature;
Step 16:Host node calculates content of copyright file and the complex data of hardware fingerprint information architecture is made a summary, by adding safely
Abstract is encrypted in close module, generates abstract ciphertext;
Step 17:Rights file is written into content of copyright file, signature and abstract ciphertext.
2. step 4-5 is specially by method as claimed in claim 1:
Step 21:Hardware fingerprint and node type are sent to the registrar of operation on the primary node by non-master;
Step 22:Host node judges that registration request is effective, based on authorized content in rights file, generates for the non-master
Content of copyright file;
Step 23:Host node is that register node distributes ID with uniqueness and creates a random symmetric key, and by version
Power content file, key and ID are sent to non-master;
Step 24:In non-master, content of copyright file will be calculated and hardware fingerprint merges, calculate the information of blended data
Abstract, and be encrypted by key pair abstract, destroy key;
Step 25:Certificate file is written into ID, content of copyright file and ciphertext, and returns result to host node;
Step 26:After host node receives correct result, generation ciphertext is encrypted to key by Security Encryption module, by ciphertext
And together with ID, register node hardware fingerprint carries out local preservation, and registration terminates.
3. step 6 is specially by method as claimed in claim 1:
Step 31:Non-master ID and hardware fingerprint are sent to host node;
Step 32:Host node retrieves corresponding hardware fingerprint by ID, and two hardware fingerprints are identical, and host node will be by encrypting safely
Encryption key is decrypted in module, and key is sent to non-master;
Step 33:Certificate file is decomposed into content of copyright file and original digest cipher-text information by non-master;
Step 34:Non-master obtains original digest by secret key decryption ciphertext;
Step 35:Obtain content of copyright file and the blended data abstract of hardware fingerprint information;
Step 36:If original digest is identical with the new abstract that calculates, show that content of copyright file is effective;
Step 37:It is verified according to content of copyright file acquisition corresponding function or control information if operation meets the requirements,
Operation operation carries out.
4. method as claimed in claim 1 if host node needs to use the resource on any host node, needs after step 3
A host node verification process is executed, specially:
Step 41:Certificate file is decomposed into content of copyright file and cipher-text information;
Step 42:Ciphertext is decrypted by Security Encryption module, obtains original digest;
Step 43:Obtain content of copyright file and the blended data abstract of hardware fingerprint information;
Step 44:If original digest is identical with the new abstract that calculates, show that content of copyright file is effective;
Step 45:It is verified according to content of copyright file acquisition corresponding function or control information if operation meets the requirements,
Operation operation carries out.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210192734.5A CN102750479B (en) | 2012-06-12 | 2012-06-12 | A kind of delamination software copy-right protection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210192734.5A CN102750479B (en) | 2012-06-12 | 2012-06-12 | A kind of delamination software copy-right protection method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102750479A CN102750479A (en) | 2012-10-24 |
CN102750479B true CN102750479B (en) | 2018-08-07 |
Family
ID=47030652
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210192734.5A Active CN102750479B (en) | 2012-06-12 | 2012-06-12 | A kind of delamination software copy-right protection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102750479B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104537284B (en) * | 2014-12-19 | 2017-05-03 | 葛胜锦 | Software protecting system and method based on remote service |
CN109753403B (en) * | 2017-11-06 | 2022-09-23 | 阿里巴巴集团控股有限公司 | Server operation method, device, equipment and system |
CN108737444A (en) * | 2018-06-20 | 2018-11-02 | 北京玄科技有限公司 | Micro services authorization management method and device applied to intelligent robot |
CN109547215B (en) * | 2018-12-28 | 2022-05-10 | 鞍钢集团自动化有限公司 | Document information protection method based on mobile terminal fingerprint |
CN110187892A (en) * | 2019-04-11 | 2019-08-30 | 中国人民解放军92942部队 | A kind of grading management method of information processing equipment |
CN111737660B (en) * | 2020-06-28 | 2023-11-17 | 浙江大华技术股份有限公司 | Method, system and storage medium for realizing software authorization |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1738248A (en) * | 2004-02-25 | 2006-02-22 | 索尼株式会社 | Information-processing method, information-processing apparatus and computer program |
CN1889586A (en) * | 2005-06-30 | 2007-01-03 | 华为技术有限公司 | A log-on/log-down system and log-on/log-down method |
CN101521660A (en) * | 2008-02-27 | 2009-09-02 | 华为技术有限公司 | Session initiation protocol registry method, certification and authorization method, system and equipment |
CN102289630A (en) * | 2011-07-29 | 2011-12-21 | 天津同阳科技发展有限公司 | Copyright protection method for continuous emission monitoring system (CEMS) |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2199902A1 (en) * | 2008-12-19 | 2010-06-23 | Babeldreams S.L. | Personalized, automated modification method and system for software applications and contents |
-
2012
- 2012-06-12 CN CN201210192734.5A patent/CN102750479B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1738248A (en) * | 2004-02-25 | 2006-02-22 | 索尼株式会社 | Information-processing method, information-processing apparatus and computer program |
CN1889586A (en) * | 2005-06-30 | 2007-01-03 | 华为技术有限公司 | A log-on/log-down system and log-on/log-down method |
CN101521660A (en) * | 2008-02-27 | 2009-09-02 | 华为技术有限公司 | Session initiation protocol registry method, certification and authorization method, system and equipment |
CN102289630A (en) * | 2011-07-29 | 2011-12-21 | 天津同阳科技发展有限公司 | Copyright protection method for continuous emission monitoring system (CEMS) |
Also Published As
Publication number | Publication date |
---|---|
CN102750479A (en) | 2012-10-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8997198B1 (en) | Techniques for securing a centralized metadata distributed filesystem | |
CN103138939B (en) | Based on the key access times management method of credible platform module under cloud memory module | |
CN102750479B (en) | A kind of delamination software copy-right protection method | |
US20140270179A1 (en) | Method and system for key generation, backup, and migration based on trusted computing | |
CN103780607B (en) | The method of the data de-duplication based on different rights | |
CN106936588B (en) | Hosting method, device and system of hardware control lock | |
CN103221961A (en) | Method and apparatus including architecture for protecting multi-ser sensitive code and data | |
JPH11225142A (en) | Authentication system and method | |
CN109587101A (en) | A kind of digital certificate management method, device and storage medium | |
CN102567685B (en) | Software copyright protection method based on asymmetric public key password system | |
US8700909B2 (en) | Revocation of a biometric reference template | |
JP4525609B2 (en) | Authority management server, authority management method, authority management program | |
JP2010514000A (en) | Method for securely storing program state data in an electronic device | |
CN101286994A (en) | Digital literary property management method, server and system for content sharing within multiple devices | |
CN111241492A (en) | Product multi-tenant secure credit granting method, system and electronic equipment | |
CN104486087A (en) | Digital signature method based on remote hardware security modules | |
JP2014006691A (en) | Device authentication method and system | |
CN108521424B (en) | Distributed data processing method for heterogeneous terminal equipment | |
CN104104650A (en) | Data file visit method and terminal equipment | |
JP2007334417A (en) | Distributed information sharing method and terminal equipment | |
Mukundan et al. | Replicated Data Integrity Verification in Cloud. | |
CN101048971B (en) | Method and system for managing authentication and payment for use of broadcast material | |
CN116964586A (en) | Authorization encryption | |
JP2014022920A (en) | Electronic signature system, electronic signature method, and electronic signature program | |
CN103336918B (en) | Electronic hard disk system authorization method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 100086 Chaoyang District, Beijing futung East Street 1 hospital 3 Building 2 unit 15 level 121806 Applicant after: Yinghua Hightech Co., Ltd. Address before: 100086 Beijing Haidian District Zhongguancun South Avenue a 6 building A710 Applicant before: Yinghua Hightech Co., Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |