CN103312513B - The method and system of use authority are verified under distributed environment - Google Patents

The method and system of use authority are verified under distributed environment Download PDF

Info

Publication number
CN103312513B
CN103312513B CN201310243191.XA CN201310243191A CN103312513B CN 103312513 B CN103312513 B CN 103312513B CN 201310243191 A CN201310243191 A CN 201310243191A CN 103312513 B CN103312513 B CN 103312513B
Authority
CN
China
Prior art keywords
use authority
time
submodule
checking request
controlling vertex
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310243191.XA
Other languages
Chinese (zh)
Other versions
CN103312513A (en
Inventor
邵文韬
王雪山
刘兴辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Teamsun Technology Co Ltd
Original Assignee
Beijing Teamsun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Teamsun Technology Co Ltd filed Critical Beijing Teamsun Technology Co Ltd
Priority to CN201310243191.XA priority Critical patent/CN103312513B/en
Publication of CN103312513A publication Critical patent/CN103312513A/en
Application granted granted Critical
Publication of CN103312513B publication Critical patent/CN103312513B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The method and system of use authority are verified under the invention discloses a kind of distributed environment.Wherein method comprises: the Controlling vertex in distributed environment sends use authority checking request to the XM in described distributed environment, XM resolves the use authority checking request that described Controlling vertex sends, verify its authorization message, and return the result information to Controlling vertex, whether Controlling vertex controls XM according to the result information and can use.Verify the method and system of use authority under distributed environment provided by the invention, whether expired by the use authority of Controlling vertex checking XM, avoid user and unrestrictedly use trial edition software by the mode of amendment system time.

Description

The method and system of use authority are verified under distributed environment
Technical field
The present invention relates to application software protection field, under particularly relating to a kind of distributed environment, verify the method and system of use authority.
Background technology
Distributed Calculation is a computer science, how its research is divided into many little parts the problem that needs very huge computing capability to solve, then these parts are distributed to many computers to process, finally these result of calculations are integrated and obtain final result.Distributed network memory technology is that data scatter is stored in multiple stage independently in machinery equipment.Distributed network storage system adopts extendible system configuration, multiple stage storage server is utilized to share storage load, location server is utilized to locate storage information, not only solve the bottleneck problem of single storage server in traditional centralised storage system, also improve the reliability of system, availability and autgmentability.
Distributed software system adopts the structure of Distributed Calculation, and the share tasks of CPU in original single system to each terminal, different terminals installs different software, between each terminal, mutual co-ordination, realizes systemic-function.
At present, for the application software needing a lot of Large-scale professional installed in a distributed system in each terminal, can try out before purchase within certain time limit, therefore, how the service time of control software design becomes important technical requirement on trial.
Traditional software application time controling adopts the mode of carrying out time accumulation calculating in conjunction with the host computer time to realize usually.For this computational methods, when user revises the host computer time, software protecting equipment will obtain the temporal information of mistake, thus does not reach the object of accurate control software design service time.
In sum, how accurately the service time of control software design is a problem demanding prompt solution.
Summary of the invention
In order to solve the problem, the method and system of use authority are verified under the invention provides a kind of distributed environment, use authority authorization information is sent to XM by the Controlling vertex in distributed system, XM carries out use authority checking, and returning the result to Controlling vertex, Controlling vertex controls whether can using of XM.
Verify the method for use authority under a kind of distributed environment provided by the invention, comprise the following steps:
S100, the Controlling vertex in distributed environment sends use authority checking request to the XM in described distributed environment;
S200, described XM resolves the use authority checking request that described Controlling vertex sends, and verifies its authorization message, and returns the result information to described Controlling vertex;
S300, described Controlling vertex controls described XM according to described the result information.
Preferably, as a kind of embodiment, described S100, comprises the following steps:
S110, Controlling vertex disposes SOA client, and client by a kind of random number x of a kind of random method stochastic generation, and adopts cryptographic algorithm encryption to described x;
S120, after elapsed time x, described client sends use authority checking request to XM by SOAP.
Preferably, as a kind of embodiment, described S200, comprises the following steps:
S210, XM disposes SOA service end after receiving use authority checking request, by the content in described service end analysis request, and the data of enabling decryption of encrypted, obtain described random number x;
S220, XM is by verifying in described service end that the authorization message of the logic of mandate to described XM is verified;
S230, described XM returns the result information to Controlling vertex.
Preferably, as a kind of embodiment, described S220, comprises the following steps:
S221, software license file according to the path searching of software license file, if existed, then performs step S222, otherwise returns use authority authentication failed information;
S222, carry out verifying and comparison according to the particular data in described software license file, judge that whether file is legal or expired, when judging that the data in software license file are legal or the mandate time is expired, return use authority authentication failed information, when there is trial edition in software license file and indicating, perform step S223, otherwise return use authority and be proved to be successful information;
S223, the running time of current XM is obtained by the encrypt file Y under preset path in calling system, the this time cumulative time is calculated by described random number x, encrypting after suing for peace running time with current XM writes in described file Y, and judge whether the running time of the described XM re-write exceedes the mandate time, if it is return use authority authentication failed information, otherwise return use authority and be proved to be successful information.
Based on the system verifying use authority under a kind of distributed environment of same inventive concept, comprise Controlling vertex, XM, use authority checking request module and use authority authentication module, wherein:
Described Controlling vertex, sends use authority checking request to XM for disposing use authority checking request module, and controls described XM;
Described XM, the use authority checking sent for receiving described use authority checking request module asks and disposes described use authority authentication module to carry out use authority checking;
Described use authority checking request module, for sending use authority checking request to XM according to the deployment of described Controlling vertex;
Described use authority authentication module, verifies soft ware authorization situation for the deployment according to XM, and returns the result information.
Preferably, as a kind of embodiment, described use authority checking request module, comprises generating random number submodule and use authority checking request sends submodule, wherein:
Described generating random number submodule, for by a kind of random number x of a kind of random method stochastic generation, and adopts cryptographic algorithm encryption to described random number x;
Described use authority checking request sends submodule, after elapsed time x, sends use authority checking request to XM.
Preferably, as a kind of embodiment, described use authority authentication module, comprises analyzing sub-module, authorization message checking submodule and the result and returns submodule, wherein:
Described analyzing sub-module, for resolving the use authority checking request received, the data of enabling decryption of encrypted, obtain described random number x;
Described authorization message checking submodule, verifies for the use authority information of data to described XM parsed according to analyzing sub-module;
Described the result returns submodule, for returning the result information of described authorization message checking submodule to described Controlling vertex.
Preferably, as a kind of embodiment, described authorization message checking submodule, comprises ff submodule, data check submodule and authorizes time check submodule, wherein:
Described ff submodule, for software license file according to the path searching of software license file;
Described data check submodule, for carrying out verifying and comparison according to the particular data in described software license file, judges that whether file is legal or expired, and judges whether software is trial edition;
Described mandate time check submodule, for being obtained the running time of current XM by the encrypt file Y under preset path in calling system to trial edition software, the this time cumulative time is calculated by described random number x, encrypting after suing for peace running time with current XM writes in described file Y, and judge whether the running time of the described XM re-write exceedes the mandate time, if it is return use authority authentication failed information, otherwise return use authority and be proved to be successful information.
Beneficial effect of the present invention comprises:
The method and system of use authority are verified under a kind of distributed environment provided by the invention, use authority checking request is sent to XM through random time by the Controlling vertex in distributed environment, whether XM expires according to the accumulation checking trial edition software of random time, avoids the mode unconfined use trial edition software of user by amendment system time.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet verifying a specific embodiment of the method for use authority under a kind of distributed environment of the present invention;
Fig. 2 is the system configuration schematic diagram verifying a specific embodiment of the system of use authority under a kind of distributed environment of the present invention;
Fig. 3 is the use authority request module structural representation verifying a specific embodiment of the system of use authority under a kind of distributed environment of the present invention;
Fig. 4 is the use authority authentication module structural representation verifying a specific embodiment of the system of use authority under a kind of distributed environment of the present invention;
Fig. 5 is the authorization message checking sub modular structure schematic diagram verifying a specific embodiment of the system of use authority under a kind of distributed environment of the present invention.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, be described in detail below in conjunction with the embodiment of accompanying drawing to the method and system verifying use authority under distributed environment of the present invention.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
Verify the method for use authority under a kind of distributed environment of the embodiment of the present invention, as shown in Figure 1, comprise the following steps:
S100, the Controlling vertex in distributed environment sends use authority checking request to the XM in described distributed environment;
S200, described XM resolves the use authority checking request that described Controlling vertex sends, and verifies its authorization message, and returns the result information to described Controlling vertex;
S300, described Controlling vertex controls described XM according to described the result information.
Below above step is elaborated:
Preferably, as a kind of embodiment, described S100, the Controlling vertex in distributed environment sends use authority checking request to the XM in described distributed environment, specifically comprises the following steps:
S110, Controlling vertex disposes SOA client, and client by a kind of random method stochastic generation random number x, and adopts cryptographic algorithm encryption to described x;
It should be noted that, described Controlling vertex refers to herein, there is the node being responsible for controlling in distributed environment, namely controls the relation in distributed environment between each terminal and executing state, is referred to as Controlling vertex; In distributed environment, have the node that responsible specific tasks perform, the node of the namely concrete task such as execution emulation, calculating, is referred to as XM.
Described XM number is in two or more, and described Controlling vertex to be generally in distributed system a fixing server.
Described SOA (Service-OrientedArchitecture, Services Oriented Achitecture) be a component model, it defines good interface between being served by these by the different function units (being called service) of application program and contract connects.Interface adopts neutral mode to carry out defining, and it should independent of hardware platform, operating system and the programming language realizing serving.This makes the service be structured in various such system can carry out alternately with a kind of unification and general mode.In the present embodiment, adopt the mode of disposing SOA client, utilize SOA client to generate a random number x, and be sent to XM, it will be understood by those skilled in the art that Controlling vertex also can adopt other similar technological means send stochastic generation count to XM at random.
Controlling vertex disposes the client of described SOA, and namely Controlling vertex transmission task generates a random number x to the client of SOA, SOA by a kind of random method, and adopts cryptographic algorithm encryption to described x.
It should be noted that herein, describedly generate a random number x by a kind of random method, generate random number by traditional random digit generation method, and limit the scope of stochastic generation number, this is mature technology, does not remake herein and describes in detail one by one.
Described random number x is a positive integer, and its span can set, and this is mature technology, does not describe in detail one by one at this.
Preferably, as a kind of embodiment, in the present embodiment, the span of x is set as 5-60, and namely generating random number is a certain number in 5-60.
Preferably, as a kind of embodiment, adopt RSA Algorithm to be encrypted generated x in the present embodiment, this is mature technology, does not repeat them here.
S120, after elapsed time x, described client sends use authority checking request to XM.
Need to illustrate, the random number x that the client of SOA generates limits as a time and uses, and after elapsed time x, client sends use authority checking request to XM herein.
The unit of described time x is minute, and namely after x minute, client sends use authority checking request to XM.
Described XM is the one or more XM in distributed environment, when needing to carry out authority checking to one or several XM in described distributed environment, then sends use authority checking request to the XM needing checking.
It should be noted that herein, because x is stochastic generation number herein, sends so be difficult to postpone use authority checking request by the mode of change control node system time thus extend the XM trial edition software application time.
Described XM is the XM specified by Controlling vertex, when Controlling vertex will carry out use authority checking to certain in distributed system or certain several XM, then appointment XM is the object of the client transmission use authority checking request of SOA.
Preferably, as a kind of embodiment, described S200, described XM resolves the use authority checking request that described Controlling vertex sends, and verifies its authorization message, and returns the result information to described Controlling vertex, specifically comprise the following steps:
S210, XM disposes SOA service end after receiving use authority checking request, by the content in described service end analysis request, and the data of enabling decryption of encrypted, obtain described random number x;
After XM receives use authority checking request, the service end of SOA is disposed according to checking request, the logic that checking is authorized is comprised in described service end, thus utilize the logic of the checking mandate in described service end to verify use authority, the data of described enabling decryption of encrypted are the part in the logic of checking mandate, after decrypt data to encryption, the random number x that the client obtaining SOA sends over, as the parameter in follow-up judgement trial edition time limit service time.
S220, XM is by verifying in described service end that the authorization message of the logic of mandate to described XM is verified;
It should be noted that, described authorization message comprises version, donor's name, the time generating authority, the hardware ID of licensed software and authorizes the information such as expired time herein.
Preferably, as a kind of embodiment, described S220, XM, by verifying in described service end that the authorization message of the logic of mandate to described XM is verified, comprises the following steps:
S221, software license file according to the path searching of software license file, if existed, then performs step S222, otherwise returns use authority authentication failed information.
Software license file is searched in path according to the software license file of software in described XM, if find described software license file in specified path, perform step S222, if do not find described software license file according to the path of predetermined software license file, then to illustrate in this XM not to soft ware authorization, therefore, use authority authentication failed information is returned.
It should be noted that, described mandate authority checking failure information is " not finding software license file ", and returns to Controlling vertex by XM in subsequent step herein.
S222, carry out verifying and comparison according to the particular data in described software license file, judge that whether file is legal or expired, when judging that the data in software license file are illegal or the mandate time is expired, return use authority authentication failed information, when there is trial edition in software license file and indicating, perform step S223, otherwise return use authority and be proved to be successful information;
Particular data in described software license file comprises: donor's name, generate the time of authority, hardware ID, key data of description, date data of description, authorize expired time, the logic that described checking is authorized is verified above-mentioned information, by authorizing the mandate of expired time verifying software whether expired, can the software license file of verifying software whether be legitimate files by other information, if find that described software license file is legitimate files, then return software license file illegal, if authority is out of date, then return authorization file expiry, when finding that including trial edition in software license file indicates, then perform step S232, otherwise return use authority and be proved to be successful information.
Return use authority to be proved to be successful information and to show, in the XM verified, software is the official release through authorizing, and software is in useful life.
S223, the running time of current XM is obtained by the encrypt file Y under preset path in calling system, the this time cumulative time is calculated by described random number x, encrypting after suing for peace running time with current XM writes in described file Y, and judge whether the running time of the described XM re-write exceedes the mandate time, if it is return authorization file expires, otherwise returns use authority and be proved to be successful information.
When having trial edition to indicate in the software license file finding described XM, then illustrate that the software of this XM is trial edition, then should judge the accumulative service time of described software further, whether it reaches the period of time for approval.
Encrypt file Y in the logic calling system that now described checking is authorized under preset path, obtains the running time of current XM.
It should be noted that herein, described preset path is the logic pre-stored position when mounted of described authority checking, described encrypt file Y stores the running time of described XM, all be saved in described encrypt file Y after joint after at every turn the use authority of XM being verified, after calling described encrypt file Y, described encrypt file is decrypted, obtain wherein stored current XM z running time, the running time of current XM and described x are carried out the z ' running time that summation operation obtains new present node, and encrypt in writing in files Y, judge whether the z ' running time of described new present node exceedes the mandate time simultaneously, that is to say and noly exceed the trial period, if exceed the trial period, then return authorization file expires, otherwise return the information that use authority is proved to be successful, the z ' running time of the new present node in encryption writing in files Y can be used as the foundation of use authority checking next time.
Need herein illustrate, the initial value of described node z running time is set as 0, and when namely software brings into operation, integration time is 0.
Verified by the software use authorization of said method to XM, do not rely on the system time of XM, therefore user extends the time of Software probation period mode by amendment XM system time has been evaded, by the service time of the cumulative strict determination XM software of time.
S230, described XM returns the result information to Controlling vertex.
After the XM use authority checking of abovementioned steps, described XM returns corresponding use authority the result to described Controlling vertex, is made further judge and perform decision by Controlling vertex.
S300, described Controlling vertex controls described XM according to described the result information.
The use authority authorization information that Controlling vertex returns according to described XM, judges whether described XM can be used, and controls described XM.
When XM return do not find software license file time, then to control described XM unavailable for Controlling vertex, and point out " not finding software license file "; When XM backspace file authority expires, then to control described XM unavailable for Controlling vertex, and return " authority expires ".
It should be noted that, described authority expires and comprises the formal version of software and exceed and authorize expired time and trial edition software to exceed the mandate time herein.
When XM return software license file illegal time, then to control described XM unavailable for Controlling vertex, and return " software license file is illegal ".
It should be noted that herein, Controlling vertex receive that XM returns result of determination after, the client of disposing SOA immediately produces next random number x '.Again the use authority of XM is verified after elapsed time x '.
Based on same inventive concept, the embodiment of the present invention verifies the system of use authority under additionally providing a kind of distributed environment, to under aforementioned a kind of distributed environment, the principle of dealing with problems due to this system verifies that the method for use authority is similar, therefore, the enforcement of this system can realize by the concrete implementation step of preceding method, repeats part and repeats no more.
Verify the system of use authority under a kind of distributed environment of the embodiment of the present invention, as shown in Figure 2, comprise Controlling vertex 100, XM 200, use authority checking request module 300 and use authority authentication module 400, wherein:
Described Controlling vertex 100, sends use authority checking request to XM for disposing use authority checking request module 300, and controls described XM;
It should be noted that herein, described Controlling vertex controls described XM according to the result that use authority authentication module 400 returns, and Controlling vertex receive the result information that described use authority authentication module 400 returns after dispose use authority checking request module 300 immediately and send the request of use authority checking next time to XM.
Described XM 200, the use authority checking sent for receiving described use authority checking request module 300 asks and disposes described use authority authentication module 400 to carry out use authority checking;
It should be noted that herein, under distributed environment, generally there is XM described in two or more, can specify certain node in multiple XM when Controlling vertex sends use authority checking request by use authority checking request module, certain specified node receives use authority checking request.
Described use authority checking request module 300, for sending use authority checking request to XM according to the deployment of described Controlling vertex 100.
Described use authority authentication module 400, verifies soft ware authorization situation for the deployment according to XM 200, and returns the result information.
Preferably, as a kind of embodiment, described use authority checking request module 300, as shown in Figure 3, comprises generating random number submodule 310 and use authority checking request transmission submodule 320, wherein:
Described generating random number submodule 310, for by a kind of random number x of a kind of random method stochastic generation, and adopts cryptographic algorithm encryption to described random number x;
Described use authority checking request sends submodule 320, after elapsed time x, sends use authority checking request to XM 200.
Preferably, as a kind of embodiment, described use authority authentication module 400, as shown in Figure 4, comprises analyzing sub-module 410, authorization message checking submodule 420 and the result and returns submodule 430, wherein:
Described analyzing sub-module 410, for resolving the use authority checking request received, the data of enabling decryption of encrypted, obtain described random number x;
Described authorization message checking submodule 420, verifies for the use authority information of data to described XM parsed according to analyzing sub-module 410;
Preferably, as a kind of embodiment, described authorization message checking submodule 420, as shown in Figure 5, comprises ff submodule 421, data check submodule 422 and authorizes time check submodule 423, wherein:
Described ff submodule 421, for software license file according to the path searching of software license file;
When not finding software license file, then return " not finding software license file ", when finding software license file, then the data of software license file being given in data check submodule 422 pairs of license files verify.
Described data check submodule 422, for carrying out verifying and comparison according to the particular data in described software license file, judges that whether file is legal or expired, and judges whether software is trial edition;
When judging software license file as illegal file, then return " software license file is illegal ", when judging that software license file is expired, then return " authority expires ", when judging software as trial edition, then utilize and authorize time check submodule 423 pairs of software use authorizations to verify further, otherwise return use authority and be proved to be successful information.
Described mandate time check submodule 423, for being obtained the running time of current XM by the encrypt file Y under preset path in calling system to trial edition software, the this time cumulative time is calculated by described random number x, encrypt after suing for peace running time with current XM and write in described file Y, and whether running time of described XM that judgement re-writes exceedes the mandate time.
Described preset path is the position that encrypt file Y prestores in systems in which, as/etc/encode/time.date.
Described the result returns submodule 430, for returning the result information of described authorization message checking submodule 420 to described Controlling vertex 100.
It should be noted that herein, the relevant information that Controlling vertex 100 returns according to use authority authentication module 400, show corresponding unavailable information when control XM is unavailable simultaneously, " do not find software license file " as elucidated before, " software license file is illegal " " authority expires ".
The above embodiment only have expressed several execution mode of the present invention, and it describes comparatively concrete and detailed, but therefore can not be interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection range of patent of the present invention should be as the criterion with claims.

Claims (4)

1. verify a method for use authority under distributed environment, it is characterized in that, comprise the following steps:
S100, the Controlling vertex in distributed environment sends use authority checking request to the XM in described distributed environment;
S200, described XM resolves the use authority checking request that described Controlling vertex sends, and verifies its authorization message, and returns the result information to described Controlling vertex;
S300, described Controlling vertex controls described XM according to described the result information;
Described S100, comprises the following steps:
S110, Controlling vertex disposes SOA client, and client by a kind of random method stochastic generation random number x, and adopts cryptographic algorithm encryption to described x;
S120, after elapsed time x, described client sends use authority checking request to XM by SOAP; And
Described Controlling vertex, after receiving the result information that described XM returns, is disposed SOA client immediately and is produced next random number x '; And
After elapsed time x ', described client sends use authority checking request to XM again by SOAP;
The unit of described time x and time x ' is minute.
2. verify the method for use authority under distributed environment according to claim 1, it is characterized in that, described S200, comprises the following steps:
S210, XM disposes SOA service end after receiving use authority checking request, by the content in described service end analysis request, and the data of enabling decryption of encrypted, obtain described random number x;
S220, XM is by verifying in described service end that the authorization message of the logic of mandate to described XM is verified;
S230, described XM returns the result information to Controlling vertex;
Described S220, comprises the following steps:
S221, software license file according to the path searching of software license file, if existed, then performs step S222, otherwise returns use authority authentication failed information;
S222, carry out verifying and comparison according to the particular data in described software license file, judge that whether file is legal or expired, when judging that the data in software license file are illegal or the mandate time is expired, return use authority authentication failed information, when there is trial edition in software license file and indicating, perform step S223, otherwise return use authority and be proved to be successful information;
S223, the running time of current XM is obtained by the encrypt file Y under preset path in calling system, the this time cumulative time is calculated by described random number x, encrypting after suing for peace running time with current XM writes in described file Y, and judge whether the running time of the described XM re-write exceedes the mandate time, if it is return use authority authentication failed information, otherwise return use authority and be proved to be successful information;
Wherein, the described this time cumulative time equals x.
3. verify a system for use authority under distributed environment, it is characterized in that, comprise Controlling vertex, XM, use authority checking request module and use authority authentication module, wherein:
Described Controlling vertex, sends use authority checking request to XM for disposing use authority checking request module, and controls described XM;
Described XM, the use authority checking sent for receiving described use authority checking request module asks and disposes described use authority authentication module to carry out use authority checking;
Described use authority checking request module, for sending use authority checking request to XM according to the deployment of described Controlling vertex;
Described use authority authentication module, verifies soft ware authorization situation for the deployment according to XM, and returns the result information;
Described use authority checking request module, comprises generating random number submodule and use authority checking request sends submodule, wherein:
Described generating random number submodule, for by a kind of random number x of a kind of random method stochastic generation, and adopts cryptographic algorithm encryption to described random number x;
Described use authority checking request sends submodule, after elapsed time x, sends use authority checking request to XM; And
Described Controlling vertex, after receiving the result information that described XM returns, is disposed use authority checking request module immediately and is produced next random number x ';
Described use authority checking request sends submodule, also for after elapsed time x ', again sends use authority checking request to XM;
The unit of described time x and time x ' is minute.
4. verify the system of use authority under distributed environment according to claim 3, it is characterized in that, described use authority authentication module, comprise analyzing sub-module, authorization message checking submodule and the result and return submodule, wherein:
Described analyzing sub-module, for resolving the use authority checking request received, the data of enabling decryption of encrypted, obtain described random number x;
Described authorization message checking submodule, verifies for the use authority information of data to described XM parsed according to analyzing sub-module;
Described the result returns submodule, for returning the result information of described authorization message checking submodule to described Controlling vertex;
Described authorization message checking submodule, comprises ff submodule, data check submodule and authorizes time check submodule, wherein:
Described ff submodule, for software license file according to the path searching of software license file;
Described data check submodule, for carrying out verifying and comparison according to the particular data in described software license file, judges that whether file is legal or expired, and judges whether software is trial edition;
Described mandate time check submodule, for being obtained the running time of current XM by the encrypt file Y under preset path in calling system to trial edition software, the this time cumulative time is calculated by described random number x, encrypting after suing for peace running time with current XM writes in described file Y, and judge whether the running time of the described XM re-write exceedes the mandate time, if it is return use authority authentication failed information, otherwise return use authority and be proved to be successful information;
Wherein, the described this time cumulative time equals x.
CN201310243191.XA 2013-06-19 2013-06-19 The method and system of use authority are verified under distributed environment Active CN103312513B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310243191.XA CN103312513B (en) 2013-06-19 2013-06-19 The method and system of use authority are verified under distributed environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310243191.XA CN103312513B (en) 2013-06-19 2013-06-19 The method and system of use authority are verified under distributed environment

Publications (2)

Publication Number Publication Date
CN103312513A CN103312513A (en) 2013-09-18
CN103312513B true CN103312513B (en) 2016-03-02

Family

ID=49137320

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310243191.XA Active CN103312513B (en) 2013-06-19 2013-06-19 The method and system of use authority are verified under distributed environment

Country Status (1)

Country Link
CN (1) CN103312513B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3138019B1 (en) * 2014-04-30 2020-05-20 Pivotal Software, Inc. Validating analytics results
CN108268767A (en) * 2016-12-30 2018-07-10 北京国双科技有限公司 Web application authorization method and device
CN109871715B (en) * 2019-03-12 2022-09-02 深圳市迅雷网络技术有限公司 Access method and device of distributed storage file and storage medium
CN114626067A (en) * 2021-06-25 2022-06-14 江苏航天龙梦信息技术有限公司 Temporary firmware control method
CN114186199B (en) * 2022-02-15 2022-06-28 北京安帝科技有限公司 License authorization method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101241531A (en) * 2007-07-27 2008-08-13 北京深思洛克数据保护中心 Method for controlling software authorized usage time
CN101261667A (en) * 2008-04-10 2008-09-10 北京深思洛克数据保护中心 A software protection method
CN101770557A (en) * 2008-12-30 2010-07-07 上海茂碧信息科技有限公司 Method for calculating service time of software in system
CN102402656A (en) * 2010-09-19 2012-04-04 邹芬 Method for realizing software authorization by using dual power supply system device independent of host computer in real time

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020144124A1 (en) * 2001-03-12 2002-10-03 Remer Eric B. Method and apparatus to monitor use of a program
US20120095877A1 (en) * 2010-10-19 2012-04-19 Apple, Inc. Application usage policy enforcement

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101241531A (en) * 2007-07-27 2008-08-13 北京深思洛克数据保护中心 Method for controlling software authorized usage time
CN101261667A (en) * 2008-04-10 2008-09-10 北京深思洛克数据保护中心 A software protection method
CN101770557A (en) * 2008-12-30 2010-07-07 上海茂碧信息科技有限公司 Method for calculating service time of software in system
CN102402656A (en) * 2010-09-19 2012-04-04 邹芬 Method for realizing software authorization by using dual power supply system device independent of host computer in real time

Also Published As

Publication number Publication date
CN103312513A (en) 2013-09-18

Similar Documents

Publication Publication Date Title
CN111010410B (en) Mimicry defense system based on certificate identity authentication and certificate signing and issuing method
CN111143890B (en) Calculation processing method, device, equipment and medium based on block chain
CN112417379B (en) Cluster license management method and device, authorization server and storage medium
CN109889498B (en) Calculation verification method and system based on block chain
CN110061846B (en) Method, device and computer readable storage medium for identity authentication and confirmation of user node in block chain
CN103312513B (en) The method and system of use authority are verified under distributed environment
CN107743067B (en) Method, system, terminal and storage medium for issuing digital certificate
US20120117380A1 (en) Method for Granting Authorization to Access a Computer-Based Object in an Automation System, Computer Program, and Automation System
US20060047944A1 (en) Secure booting of a computing device
US20120210436A1 (en) System and method for fingerprinting in a cloud-computing environment
CN109284585B (en) Script encryption method, script decryption operation method and related device
US20090086980A1 (en) Enabling a secure oem platform feature in a computing environment
CN112313908B (en) Method and control system for controlling and/or monitoring a device
US9703934B1 (en) Usage license
CN101636965B (en) Systems and methods for determining a time delay for sending a key update request
CN111492355A (en) Method and control system for controlling and/or monitoring a device
CN111414640B (en) Key access control method and device
CN113282946A (en) Information security method and system based on data access process in high-reliability environment
CN111628863A (en) Data signature method and device, electronic equipment and storage medium
CN103336918B (en) Electronic hard disk system authorization method and device
CN110008727B (en) Encryption sensitive parameter processing method and device, computer equipment and storage medium
CN115021995B (en) Multi-channel login method, device, equipment and storage medium
CN109889345B (en) Data processing method and device, user terminal, management platform and service equipment
Reed et al. Bulwark: A framework to store iot data in user accounts
KR101885146B1 (en) Method and apparatus for protecting an application

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant