CN103745139A - Software authorization control method - Google Patents
Software authorization control method Download PDFInfo
- Publication number
- CN103745139A CN103745139A CN201310746054.8A CN201310746054A CN103745139A CN 103745139 A CN103745139 A CN 103745139A CN 201310746054 A CN201310746054 A CN 201310746054A CN 103745139 A CN103745139 A CN 103745139A
- Authority
- CN
- China
- Prior art keywords
- platform
- software
- outer net
- mac address
- intranet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 16
- 238000012544 monitoring process Methods 0.000 claims abstract description 12
- 238000013475 authorization Methods 0.000 claims description 5
- 230000003203 everyday effect Effects 0.000 claims description 3
- 230000002123 temporal effect Effects 0.000 abstract 1
- 238000005516 engineering process Methods 0.000 description 2
- 238000012827 research and development Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention relates to the technical field of software development, in particular to a software authorization control method. Operating platforms of other servers are monitored by deploying a monitoring system. When the platforms are firstly started, internal network IP (internet protocol), external network IP and MAC (media access control) addresses of the servers with the platforms are transmitted to a monitoring platform. When the monitoring platform acquires server information of the servers, an authentication code is generated through IP addresses, the external network IP, the MAC addresses and a temporal timestamp and stored in the monitoring system, and the platforms are marked unregistered until the platforms are registered. By the method, registration information is generated according to the internal network IP, the external network IP and the MAC addresses of the servers and the timestamp of the monitoring platform, users can be effectively prevented from obtaining software registration by the aid of fake server information, a software system is prevented from being embezzled, and the method can be used for software authorization control.
Description
Technical field
The present invention relates to software development technique field, be specifically related to a kind of soft ware authorization control method.
Background technology
In the R&D process of computer software platform, after a set of research and development of software success, can for salely give user at present.How to protect the significant problem of the copyright of software and the interests Cheng Liao software company of company.Because after a company has bought a software, if can sell again other user, can cause the phenomenon of directly usurping company's copyright.
Summary of the invention
The technical matters that the present invention solves is to provide a kind of method of soft ware authorization and control.
The technical scheme that the present invention solves the problems of the technologies described above is:
First dispose a set of supervisory system that can extranet access; When disposing a set of application platform, need to be the server configuration extranet access IP of this platform; When starting, application platform by the mode of interface, the MAC Address of Platform Server, outer net IP address, IP address of internal network are sent to monitor supervision platform; Monitor supervision platform passes through the information of reception the timestamp in conjunction with monitoring server, generates a certain record and makes es; Application platform can all be docked with supervisory system by timer every day, and the Intranet IP of server, outer net IP and MAC Address are sent to monitor supervision platform, and monitor supervision platform, according to Intranet IP and MAC Address, can obtain making es record; Then pass through outer net IP, the registration interface of access platform, and log-on message is sent in platform; Platform passes through to resolve the information of monitor supervision platform, and according to local Intranet IP and MAC Address, judges that whether software is registered, and the login state of update software system.
Mainly comprise the steps:
The 1st step, deployment supervisory system, and configure extranet access IP, open authentication interface simultaneously;
The 2nd step, deployment software platform, and configure outer net IP, open registration interface simultaneously;
The 3rd step, software platform start, and by the authentication interface of outer net IP access monitoring system, and the MAC Address of the Intranet IP of software platform, outer net IP and server is encrypted to password MsgA is sent to monitor supervision platform;
The 4th step, supervisory system, by deciphering MsgA information, obtain server Intranet IP, MAC Address and the outer net IP address of platform;
The 5th step, monitor supervision platform judge whether this MAC Address and outer net IP address exist; If there is no, record this software platform unregistered, return to unregistered state to software platform, skip to the 10th step simultaneously;
The 6th step, monitor supervision platform judge that whether this MAC Address, Intranet IP and outer net IP address be registered, if unregistered, return to unregistered state to software platform, skip to the 10th step simultaneously;
The 7th step, that monitor supervision platform identifies this software platform is registered, follow Intranet IP, MAC Address and outer net IP according to platform simultaneously, and by public key information, generate private key information, public key information and private key information are accessed to its registration interface by the outer net IP of software platform A simultaneously;
The 8th step, software platform A are with public key information and private key information according to returning, and the MAC Address, Intranet IP and the outer net IP address that obtain server, verify that whether this private key information is effective, if invalid, skip to the 10th step;
The 9th step, software platform are proved to be successful, and remove platform registered user and measure and limit and cancel platform response speed restriction;
The 10th step, sign software platform unregistered, and start registered user measure restriction with request response limits.
This method is supported remote monitoring, as long as startup of server supervisory system can receive corresponding information.The method, by Intranet IP, MAC Address and the outer net IP address of server, is bound a log-on message.Stipulate that software platform must register outer net IP simultaneously, otherwise think that platform is invalid.Because outer net IP address is unique, and the login state of software to be monitor supervision platform send to the outer net IP by software platform to software platform, effectively solve software pirate problem.
Accompanying drawing explanation
Below in conjunction with accompanying drawing, the present invention is further described:
Accompanying drawing is the process flow diagram of software authentication.
Embodiment
As shown in the figure, the present invention disposes a set of supervisory system that can extranet access; When disposing a set of application platform, need to be the server configuration extranet access IP of this platform.When platform start time by the mode of interface, the MAC Address of Platform Server, outer net IP address, IP address of internal network are sent to monitor supervision platform; Monitor supervision platform passes through the information of reception the timestamp in conjunction with monitoring server, generates a certain record and makes es.Platform can all dock with supervisory system by timer every day, and the Intranet IP of server, outer net IP and MAC Address are sent to monitor supervision platform, monitor supervision platform will be according to Intranet IP and MAC Address, can obtain making es record, then by outer net IP, the registration interface of access platform, and log-on message is sent in platform.Platform passes through to resolve the information of monitor supervision platform, and according to local Intranet IP and MAC Address, can judge that whether software is registered, and the login state of update software system.Because the log-on message of platform, is the outer net IP that monitor supervision platform passes through software platform, be sent to software platform, this is a two-way process, and outer net IP cannot forge, therefore can solve user by the mode of spoofed IP and MAC Address, reach the effect to unregistered software registration.
The inventive method concrete steps are as follows:
The 1st step, deployment supervisory system, and configure extranet access IP, open authentication interface simultaneously;
The 2nd step, deployment software platform, and configure outer net IP, open registration interface simultaneously;
The 3rd step, software platform start, and by the authentication interface of outer net IP access monitoring system, and the MAC Address of the Intranet IP of software platform, outer net IP and server is encrypted to password MsgA is sent to monitor supervision platform;
The 4th step, supervisory system, by deciphering MsgA information, obtain server Intranet IP, MAC Address and the outer net IP address of platform;
The 5th step, monitor supervision platform judge whether this MAC Address and outer net IP address exist; If there is no, record this software platform unregistered, return to unregistered state to software platform, skip to the 10th step simultaneously;
The 6th step, monitor supervision platform judge that whether this MAC Address, Intranet IP and outer net IP address be registered, if unregistered, return to unregistered state to software platform, skip to the 10th step simultaneously;
The 7th step, that monitor supervision platform identifies this software platform is registered, follow Intranet IP, MAC Address and outer net IP according to platform simultaneously, and by public key information, generate private key information, public key information and private key information are accessed to its registration interface by the outer net IP of software platform A simultaneously;
The 8th step, software platform A are with public key information and private key information according to returning, and the MAC Address, Intranet IP and the outer net IP address that obtain server, verify that whether this private key information is effective, if invalid, skip to the 10th step;
The 9th step, software platform are proved to be successful, and releasing platform registered user measures and limits and get Xiao's platform response speed restriction;
The 10th step, sign software platform unregistered, and start registered user measure restriction with request response limits.
Claims (2)
1. a soft ware authorization control method, is characterized in that: first dispose a set of supervisory system that can extranet access; When disposing a set of application platform, need to be the server configuration extranet access IP of this platform; When starting, application platform by the mode of interface, the MAC Address of Platform Server, outer net IP address, IP address of internal network are sent to monitor supervision platform; Monitor supervision platform passes through the information of reception the timestamp in conjunction with monitoring server, generates a certain mes of record; Application platform can all be docked with supervisory system by timer every day, and the Intranet IP of server, outer net IP and MAC Address are sent to monitor supervision platform, and monitor supervision platform, according to Intranet IP and MAC Address, can obtain mes record; Then pass through outer net IP, the registration interface of access platform, and log-on message is sent in platform; Platform passes through to resolve the information of monitor supervision platform, and according to local Intranet IP and MAC Address, judges that whether software is registered, and the login state of update software system.
2. soft ware authorization control method according to claim 1, is characterized in that:
Mainly comprise the steps:
The 1st step, deployment supervisory system, and configure extranet access IP, open authentication interface simultaneously;
The 2nd step, deployment software platform, and configure outer net IP, open registration interface simultaneously;
The 3rd step, software platform start, and by the authentication interface of outer net IP access monitoring system, and the MAC Address of the Intranet IP of software platform, outer net IP and server is encrypted to password MsgA is sent to monitor supervision platform;
The 4th step, supervisory system, by deciphering MsgA information, obtain server Intranet IP, MAC Address and the outer net IP address of platform;
The 5th step, monitor supervision platform judge whether this MAC Address and outer net IP address exist; If there is no, record this software platform unregistered, return to unregistered state to software platform, skip to the 10th step simultaneously;
The 6th step, monitor supervision platform judge that whether this MAC Address, Intranet IP and outer net IP address be registered, if unregistered, return to unregistered state to software platform, skip to the 10th step simultaneously;
The 7th step, that monitor supervision platform identifies this software platform is registered, follow Intranet IP, MAC Address and outer net IP according to platform simultaneously, and by public key information, generate private key information, public key information and private key information are accessed to its registration interface by the outer net IP of software platform A simultaneously;
The 8th step, software platform A are with public key information and private key information according to returning, and the MAC Address, Intranet IP and the outer net IP address that obtain server, verify that whether this private key information is effective, if invalid, skip to the 10th step;
The 9th step, software platform are proved to be successful, and remove platform registered user and measure and limit and cancel platform response speed restriction;
The 10th step, sign software platform unregistered, and start registered user measure restriction with request response limits.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310746054.8A CN103745139B (en) | 2013-12-29 | 2013-12-29 | A kind of software authorization control method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310746054.8A CN103745139B (en) | 2013-12-29 | 2013-12-29 | A kind of software authorization control method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103745139A true CN103745139A (en) | 2014-04-23 |
CN103745139B CN103745139B (en) | 2016-04-20 |
Family
ID=50502156
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310746054.8A Active CN103745139B (en) | 2013-12-29 | 2013-12-29 | A kind of software authorization control method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103745139B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105262760A (en) * | 2015-10-30 | 2016-01-20 | 北京奇虎科技有限公司 | Method and device for preventing action of maliciously visiting login/register interface |
CN105471810A (en) * | 2014-05-28 | 2016-04-06 | 北京奇虎科技有限公司 | Verification method and verification system for software authorization information |
CN105471809A (en) * | 2014-05-28 | 2016-04-06 | 北京奇虎科技有限公司 | Verification method and verification system for software authorization information |
CN105577666A (en) * | 2015-12-25 | 2016-05-11 | 北京像素软件科技股份有限公司 | Method and system for verifying network server |
CN104331645B (en) * | 2014-11-24 | 2017-05-10 | 中国航空工业集团公司洛阳电光设备研究所 | Encryption method of test system |
CN107704731A (en) * | 2017-09-28 | 2018-02-16 | 成都安恒信息技术有限公司 | A kind of cloud platform mirror image method for preventing piracy based on HOTP |
CN108109625A (en) * | 2017-12-21 | 2018-06-01 | 北京华夏电通科技有限公司 | Mobile phone speech identifies intranet and extranet Transmission system and method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040128376A1 (en) * | 2002-12-25 | 2004-07-01 | Fujitsu Limited | Identification information creating method, information processing apparatus, computer program product, recording device monitoring method, terminal apparatus management method, and communication network system |
CN101067859A (en) * | 2007-02-02 | 2007-11-07 | 张文 | Antipirating method for network software |
CN102215273A (en) * | 2010-04-12 | 2011-10-12 | 杭州华三通信技术有限公司 | Method and device for providing external network access for internal network user |
CN102760214A (en) * | 2012-06-13 | 2012-10-31 | 上海方正数字出版技术有限公司 | Novel software copyright protecting method and device |
CN103237010A (en) * | 2010-10-25 | 2013-08-07 | 北京中科联众科技股份有限公司 | Server side for providing digital content in encryption mode |
-
2013
- 2013-12-29 CN CN201310746054.8A patent/CN103745139B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040128376A1 (en) * | 2002-12-25 | 2004-07-01 | Fujitsu Limited | Identification information creating method, information processing apparatus, computer program product, recording device monitoring method, terminal apparatus management method, and communication network system |
CN101067859A (en) * | 2007-02-02 | 2007-11-07 | 张文 | Antipirating method for network software |
CN102215273A (en) * | 2010-04-12 | 2011-10-12 | 杭州华三通信技术有限公司 | Method and device for providing external network access for internal network user |
CN103237010A (en) * | 2010-10-25 | 2013-08-07 | 北京中科联众科技股份有限公司 | Server side for providing digital content in encryption mode |
CN102760214A (en) * | 2012-06-13 | 2012-10-31 | 上海方正数字出版技术有限公司 | Novel software copyright protecting method and device |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105471810A (en) * | 2014-05-28 | 2016-04-06 | 北京奇虎科技有限公司 | Verification method and verification system for software authorization information |
CN105471809A (en) * | 2014-05-28 | 2016-04-06 | 北京奇虎科技有限公司 | Verification method and verification system for software authorization information |
CN105471810B (en) * | 2014-05-28 | 2018-07-31 | 北京奇安信科技有限公司 | The verification method and system of soft ware authorization information |
CN105471809B (en) * | 2014-05-28 | 2018-11-09 | 北京奇安信科技有限公司 | The verification method and system of soft ware authorization information |
CN104331645B (en) * | 2014-11-24 | 2017-05-10 | 中国航空工业集团公司洛阳电光设备研究所 | Encryption method of test system |
CN105262760A (en) * | 2015-10-30 | 2016-01-20 | 北京奇虎科技有限公司 | Method and device for preventing action of maliciously visiting login/register interface |
CN105577666A (en) * | 2015-12-25 | 2016-05-11 | 北京像素软件科技股份有限公司 | Method and system for verifying network server |
CN107704731A (en) * | 2017-09-28 | 2018-02-16 | 成都安恒信息技术有限公司 | A kind of cloud platform mirror image method for preventing piracy based on HOTP |
CN107704731B (en) * | 2017-09-28 | 2021-03-09 | 成都安恒信息技术有限公司 | Cloud platform mirror image anti-piracy method based on HOTP |
CN108109625A (en) * | 2017-12-21 | 2018-06-01 | 北京华夏电通科技有限公司 | Mobile phone speech identifies intranet and extranet Transmission system and method |
Also Published As
Publication number | Publication date |
---|---|
CN103745139B (en) | 2016-04-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103745139A (en) | Software authorization control method | |
CN103916490B (en) | DNS tamper-proof method and device | |
TWI436236B (en) | Method and system for securely updating field upgradeable units | |
CN103995991B (en) | Method for binding hardware information and secret keys in software copyright protection | |
CN103607712B (en) | The cut-in method and device of wireless network | |
CN101047504B (en) | Network log-in authorization method and authorization system | |
WO2014187393A1 (en) | Client and method for maintaining byod security | |
CN102438028B (en) | A kind of prevent Dynamic Host Configuration Protocol server from cheating method, Apparatus and system | |
US20160308864A1 (en) | Access terminal | |
CN102693375A (en) | Information processing apparatus, information processing method, and information processing system | |
CN101873298A (en) | Registration method, terminal, server and system | |
WO2010007289A3 (en) | Remote network access via a visited network | |
CN104660593A (en) | Method for filtering OPC security gateway data packets | |
WO2021042736A1 (en) | Encryption method for application data unit in water conservancy industrial control system | |
CN103428211A (en) | Network authentication system on basis of switchboards and authentication method for network authentication system | |
TW201712581A (en) | Method, apparatus and system for preventing cross-site request forgery | |
CN101197785A (en) | MAC authentication method and apparatus | |
CN108243413A (en) | A kind of method and system of wireless access railway information network | |
CN105278398A (en) | Secure power supply related to industrial control system | |
CN105450714A (en) | Method and device for remotely controlling terminal application installation | |
WO2016062113A1 (en) | Wireless network access security detection method and terminal | |
CN102045309A (en) | Method and device for preventing computer from being attacked by virus | |
CN102377731A (en) | Virtual private network system and network device thereof | |
CN104618360A (en) | Bypass authentication method and system based on 802.1X protocol | |
WO2015139442A1 (en) | Local network access control method and device, and computer storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CP02 | Change in the address of a patent holder | ||
CP02 | Change in the address of a patent holder |
Address after: 523808 19th Floor, Cloud Computing Center, Chinese Academy of Sciences, No. 1 Kehui Road, Songshan Lake Hi-tech Industrial Development Zone, Dongguan City, Guangdong Province Patentee after: G-Cloud Technology Co., Ltd. Address before: 523808 No. 14 Building, Songke Garden, Songshan Lake Science and Technology Industrial Park, Dongguan City, Guangdong Province Patentee before: G-Cloud Technology Co., Ltd. |