CN103745139A - Software authorization control method - Google Patents

Software authorization control method Download PDF

Info

Publication number
CN103745139A
CN103745139A CN201310746054.8A CN201310746054A CN103745139A CN 103745139 A CN103745139 A CN 103745139A CN 201310746054 A CN201310746054 A CN 201310746054A CN 103745139 A CN103745139 A CN 103745139A
Authority
CN
China
Prior art keywords
platform
software
outer net
mac address
intranet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310746054.8A
Other languages
Chinese (zh)
Other versions
CN103745139B (en
Inventor
关班记
曾崇海
张宗仁
季统凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
G Cloud Technology Co Ltd
Original Assignee
G Cloud Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by G Cloud Technology Co Ltd filed Critical G Cloud Technology Co Ltd
Priority to CN201310746054.8A priority Critical patent/CN103745139B/en
Publication of CN103745139A publication Critical patent/CN103745139A/en
Application granted granted Critical
Publication of CN103745139B publication Critical patent/CN103745139B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention relates to the technical field of software development, in particular to a software authorization control method. Operating platforms of other servers are monitored by deploying a monitoring system. When the platforms are firstly started, internal network IP (internet protocol), external network IP and MAC (media access control) addresses of the servers with the platforms are transmitted to a monitoring platform. When the monitoring platform acquires server information of the servers, an authentication code is generated through IP addresses, the external network IP, the MAC addresses and a temporal timestamp and stored in the monitoring system, and the platforms are marked unregistered until the platforms are registered. By the method, registration information is generated according to the internal network IP, the external network IP and the MAC addresses of the servers and the timestamp of the monitoring platform, users can be effectively prevented from obtaining software registration by the aid of fake server information, a software system is prevented from being embezzled, and the method can be used for software authorization control.

Description

A kind of soft ware authorization control method
Technical field
The present invention relates to software development technique field, be specifically related to a kind of soft ware authorization control method.
Background technology
In the R&D process of computer software platform, after a set of research and development of software success, can for salely give user at present.How to protect the significant problem of the copyright of software and the interests Cheng Liao software company of company.Because after a company has bought a software, if can sell again other user, can cause the phenomenon of directly usurping company's copyright.
Summary of the invention
The technical matters that the present invention solves is to provide a kind of method of soft ware authorization and control.
The technical scheme that the present invention solves the problems of the technologies described above is:
First dispose a set of supervisory system that can extranet access; When disposing a set of application platform, need to be the server configuration extranet access IP of this platform; When starting, application platform by the mode of interface, the MAC Address of Platform Server, outer net IP address, IP address of internal network are sent to monitor supervision platform; Monitor supervision platform passes through the information of reception the timestamp in conjunction with monitoring server, generates a certain record and makes es; Application platform can all be docked with supervisory system by timer every day, and the Intranet IP of server, outer net IP and MAC Address are sent to monitor supervision platform, and monitor supervision platform, according to Intranet IP and MAC Address, can obtain making es record; Then pass through outer net IP, the registration interface of access platform, and log-on message is sent in platform; Platform passes through to resolve the information of monitor supervision platform, and according to local Intranet IP and MAC Address, judges that whether software is registered, and the login state of update software system.
Mainly comprise the steps:
The 1st step, deployment supervisory system, and configure extranet access IP, open authentication interface simultaneously;
The 2nd step, deployment software platform, and configure outer net IP, open registration interface simultaneously;
The 3rd step, software platform start, and by the authentication interface of outer net IP access monitoring system, and the MAC Address of the Intranet IP of software platform, outer net IP and server is encrypted to password MsgA is sent to monitor supervision platform;
The 4th step, supervisory system, by deciphering MsgA information, obtain server Intranet IP, MAC Address and the outer net IP address of platform;
The 5th step, monitor supervision platform judge whether this MAC Address and outer net IP address exist; If there is no, record this software platform unregistered, return to unregistered state to software platform, skip to the 10th step simultaneously;
The 6th step, monitor supervision platform judge that whether this MAC Address, Intranet IP and outer net IP address be registered, if unregistered, return to unregistered state to software platform, skip to the 10th step simultaneously;
The 7th step, that monitor supervision platform identifies this software platform is registered, follow Intranet IP, MAC Address and outer net IP according to platform simultaneously, and by public key information, generate private key information, public key information and private key information are accessed to its registration interface by the outer net IP of software platform A simultaneously;
The 8th step, software platform A are with public key information and private key information according to returning, and the MAC Address, Intranet IP and the outer net IP address that obtain server, verify that whether this private key information is effective, if invalid, skip to the 10th step;
The 9th step, software platform are proved to be successful, and remove platform registered user and measure and limit and cancel platform response speed restriction;
The 10th step, sign software platform unregistered, and start registered user measure restriction with request response limits.
This method is supported remote monitoring, as long as startup of server supervisory system can receive corresponding information.The method, by Intranet IP, MAC Address and the outer net IP address of server, is bound a log-on message.Stipulate that software platform must register outer net IP simultaneously, otherwise think that platform is invalid.Because outer net IP address is unique, and the login state of software to be monitor supervision platform send to the outer net IP by software platform to software platform, effectively solve software pirate problem.
Accompanying drawing explanation
Below in conjunction with accompanying drawing, the present invention is further described:
Accompanying drawing is the process flow diagram of software authentication.
Embodiment
As shown in the figure, the present invention disposes a set of supervisory system that can extranet access; When disposing a set of application platform, need to be the server configuration extranet access IP of this platform.When platform start time by the mode of interface, the MAC Address of Platform Server, outer net IP address, IP address of internal network are sent to monitor supervision platform; Monitor supervision platform passes through the information of reception the timestamp in conjunction with monitoring server, generates a certain record and makes es.Platform can all dock with supervisory system by timer every day, and the Intranet IP of server, outer net IP and MAC Address are sent to monitor supervision platform, monitor supervision platform will be according to Intranet IP and MAC Address, can obtain making es record, then by outer net IP, the registration interface of access platform, and log-on message is sent in platform.Platform passes through to resolve the information of monitor supervision platform, and according to local Intranet IP and MAC Address, can judge that whether software is registered, and the login state of update software system.Because the log-on message of platform, is the outer net IP that monitor supervision platform passes through software platform, be sent to software platform, this is a two-way process, and outer net IP cannot forge, therefore can solve user by the mode of spoofed IP and MAC Address, reach the effect to unregistered software registration.
The inventive method concrete steps are as follows:
The 1st step, deployment supervisory system, and configure extranet access IP, open authentication interface simultaneously;
The 2nd step, deployment software platform, and configure outer net IP, open registration interface simultaneously;
The 3rd step, software platform start, and by the authentication interface of outer net IP access monitoring system, and the MAC Address of the Intranet IP of software platform, outer net IP and server is encrypted to password MsgA is sent to monitor supervision platform;
The 4th step, supervisory system, by deciphering MsgA information, obtain server Intranet IP, MAC Address and the outer net IP address of platform;
The 5th step, monitor supervision platform judge whether this MAC Address and outer net IP address exist; If there is no, record this software platform unregistered, return to unregistered state to software platform, skip to the 10th step simultaneously;
The 6th step, monitor supervision platform judge that whether this MAC Address, Intranet IP and outer net IP address be registered, if unregistered, return to unregistered state to software platform, skip to the 10th step simultaneously;
The 7th step, that monitor supervision platform identifies this software platform is registered, follow Intranet IP, MAC Address and outer net IP according to platform simultaneously, and by public key information, generate private key information, public key information and private key information are accessed to its registration interface by the outer net IP of software platform A simultaneously;
The 8th step, software platform A are with public key information and private key information according to returning, and the MAC Address, Intranet IP and the outer net IP address that obtain server, verify that whether this private key information is effective, if invalid, skip to the 10th step;
The 9th step, software platform are proved to be successful, and releasing platform registered user measures and limits and get Xiao's platform response speed restriction;
The 10th step, sign software platform unregistered, and start registered user measure restriction with request response limits.

Claims (2)

1. a soft ware authorization control method, is characterized in that: first dispose a set of supervisory system that can extranet access; When disposing a set of application platform, need to be the server configuration extranet access IP of this platform; When starting, application platform by the mode of interface, the MAC Address of Platform Server, outer net IP address, IP address of internal network are sent to monitor supervision platform; Monitor supervision platform passes through the information of reception the timestamp in conjunction with monitoring server, generates a certain mes of record; Application platform can all be docked with supervisory system by timer every day, and the Intranet IP of server, outer net IP and MAC Address are sent to monitor supervision platform, and monitor supervision platform, according to Intranet IP and MAC Address, can obtain mes record; Then pass through outer net IP, the registration interface of access platform, and log-on message is sent in platform; Platform passes through to resolve the information of monitor supervision platform, and according to local Intranet IP and MAC Address, judges that whether software is registered, and the login state of update software system.
2. soft ware authorization control method according to claim 1, is characterized in that:
Mainly comprise the steps:
The 1st step, deployment supervisory system, and configure extranet access IP, open authentication interface simultaneously;
The 2nd step, deployment software platform, and configure outer net IP, open registration interface simultaneously;
The 3rd step, software platform start, and by the authentication interface of outer net IP access monitoring system, and the MAC Address of the Intranet IP of software platform, outer net IP and server is encrypted to password MsgA is sent to monitor supervision platform;
The 4th step, supervisory system, by deciphering MsgA information, obtain server Intranet IP, MAC Address and the outer net IP address of platform;
The 5th step, monitor supervision platform judge whether this MAC Address and outer net IP address exist; If there is no, record this software platform unregistered, return to unregistered state to software platform, skip to the 10th step simultaneously;
The 6th step, monitor supervision platform judge that whether this MAC Address, Intranet IP and outer net IP address be registered, if unregistered, return to unregistered state to software platform, skip to the 10th step simultaneously;
The 7th step, that monitor supervision platform identifies this software platform is registered, follow Intranet IP, MAC Address and outer net IP according to platform simultaneously, and by public key information, generate private key information, public key information and private key information are accessed to its registration interface by the outer net IP of software platform A simultaneously;
The 8th step, software platform A are with public key information and private key information according to returning, and the MAC Address, Intranet IP and the outer net IP address that obtain server, verify that whether this private key information is effective, if invalid, skip to the 10th step;
The 9th step, software platform are proved to be successful, and remove platform registered user and measure and limit and cancel platform response speed restriction;
The 10th step, sign software platform unregistered, and start registered user measure restriction with request response limits.
CN201310746054.8A 2013-12-29 2013-12-29 A kind of software authorization control method Active CN103745139B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310746054.8A CN103745139B (en) 2013-12-29 2013-12-29 A kind of software authorization control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310746054.8A CN103745139B (en) 2013-12-29 2013-12-29 A kind of software authorization control method

Publications (2)

Publication Number Publication Date
CN103745139A true CN103745139A (en) 2014-04-23
CN103745139B CN103745139B (en) 2016-04-20

Family

ID=50502156

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310746054.8A Active CN103745139B (en) 2013-12-29 2013-12-29 A kind of software authorization control method

Country Status (1)

Country Link
CN (1) CN103745139B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105262760A (en) * 2015-10-30 2016-01-20 北京奇虎科技有限公司 Method and device for preventing action of maliciously visiting login/register interface
CN105471810A (en) * 2014-05-28 2016-04-06 北京奇虎科技有限公司 Verification method and verification system for software authorization information
CN105471809A (en) * 2014-05-28 2016-04-06 北京奇虎科技有限公司 Verification method and verification system for software authorization information
CN105577666A (en) * 2015-12-25 2016-05-11 北京像素软件科技股份有限公司 Method and system for verifying network server
CN104331645B (en) * 2014-11-24 2017-05-10 中国航空工业集团公司洛阳电光设备研究所 Encryption method of test system
CN107704731A (en) * 2017-09-28 2018-02-16 成都安恒信息技术有限公司 A kind of cloud platform mirror image method for preventing piracy based on HOTP
CN108109625A (en) * 2017-12-21 2018-06-01 北京华夏电通科技有限公司 Mobile phone speech identifies intranet and extranet Transmission system and method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040128376A1 (en) * 2002-12-25 2004-07-01 Fujitsu Limited Identification information creating method, information processing apparatus, computer program product, recording device monitoring method, terminal apparatus management method, and communication network system
CN101067859A (en) * 2007-02-02 2007-11-07 张文 Antipirating method for network software
CN102215273A (en) * 2010-04-12 2011-10-12 杭州华三通信技术有限公司 Method and device for providing external network access for internal network user
CN102760214A (en) * 2012-06-13 2012-10-31 上海方正数字出版技术有限公司 Novel software copyright protecting method and device
CN103237010A (en) * 2010-10-25 2013-08-07 北京中科联众科技股份有限公司 Server side for providing digital content in encryption mode

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040128376A1 (en) * 2002-12-25 2004-07-01 Fujitsu Limited Identification information creating method, information processing apparatus, computer program product, recording device monitoring method, terminal apparatus management method, and communication network system
CN101067859A (en) * 2007-02-02 2007-11-07 张文 Antipirating method for network software
CN102215273A (en) * 2010-04-12 2011-10-12 杭州华三通信技术有限公司 Method and device for providing external network access for internal network user
CN103237010A (en) * 2010-10-25 2013-08-07 北京中科联众科技股份有限公司 Server side for providing digital content in encryption mode
CN102760214A (en) * 2012-06-13 2012-10-31 上海方正数字出版技术有限公司 Novel software copyright protecting method and device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105471810A (en) * 2014-05-28 2016-04-06 北京奇虎科技有限公司 Verification method and verification system for software authorization information
CN105471809A (en) * 2014-05-28 2016-04-06 北京奇虎科技有限公司 Verification method and verification system for software authorization information
CN105471810B (en) * 2014-05-28 2018-07-31 北京奇安信科技有限公司 The verification method and system of soft ware authorization information
CN105471809B (en) * 2014-05-28 2018-11-09 北京奇安信科技有限公司 The verification method and system of soft ware authorization information
CN104331645B (en) * 2014-11-24 2017-05-10 中国航空工业集团公司洛阳电光设备研究所 Encryption method of test system
CN105262760A (en) * 2015-10-30 2016-01-20 北京奇虎科技有限公司 Method and device for preventing action of maliciously visiting login/register interface
CN105577666A (en) * 2015-12-25 2016-05-11 北京像素软件科技股份有限公司 Method and system for verifying network server
CN107704731A (en) * 2017-09-28 2018-02-16 成都安恒信息技术有限公司 A kind of cloud platform mirror image method for preventing piracy based on HOTP
CN107704731B (en) * 2017-09-28 2021-03-09 成都安恒信息技术有限公司 Cloud platform mirror image anti-piracy method based on HOTP
CN108109625A (en) * 2017-12-21 2018-06-01 北京华夏电通科技有限公司 Mobile phone speech identifies intranet and extranet Transmission system and method

Also Published As

Publication number Publication date
CN103745139B (en) 2016-04-20

Similar Documents

Publication Publication Date Title
CN103745139A (en) Software authorization control method
CN103916490B (en) DNS tamper-proof method and device
TWI436236B (en) Method and system for securely updating field upgradeable units
CN103995991B (en) Method for binding hardware information and secret keys in software copyright protection
CN103607712B (en) The cut-in method and device of wireless network
CN101047504B (en) Network log-in authorization method and authorization system
WO2014187393A1 (en) Client and method for maintaining byod security
CN102438028B (en) A kind of prevent Dynamic Host Configuration Protocol server from cheating method, Apparatus and system
US20160308864A1 (en) Access terminal
CN102693375A (en) Information processing apparatus, information processing method, and information processing system
CN101873298A (en) Registration method, terminal, server and system
WO2010007289A3 (en) Remote network access via a visited network
CN104660593A (en) Method for filtering OPC security gateway data packets
WO2021042736A1 (en) Encryption method for application data unit in water conservancy industrial control system
CN103428211A (en) Network authentication system on basis of switchboards and authentication method for network authentication system
TW201712581A (en) Method, apparatus and system for preventing cross-site request forgery
CN101197785A (en) MAC authentication method and apparatus
CN108243413A (en) A kind of method and system of wireless access railway information network
CN105278398A (en) Secure power supply related to industrial control system
CN105450714A (en) Method and device for remotely controlling terminal application installation
WO2016062113A1 (en) Wireless network access security detection method and terminal
CN102045309A (en) Method and device for preventing computer from being attacked by virus
CN102377731A (en) Virtual private network system and network device thereof
CN104618360A (en) Bypass authentication method and system based on 802.1X protocol
WO2015139442A1 (en) Local network access control method and device, and computer storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP02 Change in the address of a patent holder
CP02 Change in the address of a patent holder

Address after: 523808 19th Floor, Cloud Computing Center, Chinese Academy of Sciences, No. 1 Kehui Road, Songshan Lake Hi-tech Industrial Development Zone, Dongguan City, Guangdong Province

Patentee after: G-Cloud Technology Co., Ltd.

Address before: 523808 No. 14 Building, Songke Garden, Songshan Lake Science and Technology Industrial Park, Dongguan City, Guangdong Province

Patentee before: G-Cloud Technology Co., Ltd.