CN104573493A - Software protection method and system - Google Patents

Software protection method and system Download PDF

Info

Publication number
CN104573493A
CN104573493A CN201410820246.3A CN201410820246A CN104573493A CN 104573493 A CN104573493 A CN 104573493A CN 201410820246 A CN201410820246 A CN 201410820246A CN 104573493 A CN104573493 A CN 104573493A
Authority
CN
China
Prior art keywords
algorithm
software
safety equipment
license
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410820246.3A
Other languages
Chinese (zh)
Other versions
CN104573493B (en
Inventor
孙吉平
韩勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Senseshield Technology Co Ltd
Original Assignee
Beijing Senseshield Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Senseshield Technology Co Ltd filed Critical Beijing Senseshield Technology Co Ltd
Priority to CN201410820246.3A priority Critical patent/CN104573493B/en
Publication of CN104573493A publication Critical patent/CN104573493A/en
Application granted granted Critical
Publication of CN104573493B publication Critical patent/CN104573493B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a software protection method and system. The method comprises the following steps that in safety equipment, a corresponding relation between license information and algorithmic information of a software, and algorithmic contents corresponding to the algorithmic information are stored; the safety equipment receives a license verification request sent when a software client end receives a run command, wherein the license verification request comprises user information and license information; the safety equipment verifies if a user is allowed to use the software according to the license verification request; when the user is allowed to use the software, the safety equipment receives an operation execution request sent when the software client end receives the run command; the safety equipment finds out the matched algorithmic contents, executes the found algorithmic contents and returns an execution result according to the operation execution request. With the application of the embodiment of the invention, the safety of the software can be improved.

Description

A kind of method for protecting software and system
Technical field
The application relates to field of information security technology, particularly a kind of method for protecting software and system.
Background technology
For software protection, its core concept prevents software pirate version; And the target of soft ware authorization is exactly allow software according to the authorization bought to use software, described authorization relates to the contents such as the installation quantity of software, service time, range of application and functional module.Wherein, described authorization generally represents with License, and a License generally includes the information such as license passport, license number, license file.
At present, this software protection mode is easy to suffer cracking of hacker, and simulation algorithm, cause piracy to be spread unchecked.Such as, for some typical office software, just can crack by taking KMS in local runtime private and forever use.
Visible, how improving the security of software, is the current technical issues that need to address
Summary of the invention
For solving the problems of the technologies described above, the invention provides a kind of method for protecting software and system, the security of software can be improved.
Technical scheme provided by the invention is such:
A kind of method for protecting software, the method comprises:
In safety equipment, the algorithm content that the License Info of storing software is corresponding with the corresponding relation of algorithm information and described algorithm information;
Described safety equipment receive the License Authentication request that described software client sends when receiving action command, and described License Authentication request comprises user profile and License Info;
Whether described safety equipment allow described user to use described software according to described License Authentication requests verification;
When allowing described user to use described software, described safety equipment receive the operation that described software client sends when receiving operational order and perform request;
Described safety equipment perform according to described operation the algorithm content that coupling is searched in request, perform the algorithm content found, return execution result.
A kind of security system for software, this system comprises software client and safety equipment,
Described safety equipment, for the License Info of storing software and the corresponding relation of algorithm information, and the algorithm content that described algorithm information is corresponding, receive the License Authentication request that described software client sends when receiving action command, described user whether is allowed to use described software according to described License Authentication requests verification, when allowing described user to use described software, receive the operation that described software client sends when receiving operational order and perform request, the algorithm content that coupling is searched in request is performed according to described operation, perform the algorithm content found, return execution result,
Described software client, for sending License Authentication request when receiving action command to described safety equipment, described License Authentication request comprises user profile and License Info, performing request when receiving operational order to described safety equipment transmit operation, receiving the execution result that described safety equipment return.
From such scheme, in the embodiment of the present invention, by the License Info of software and the corresponding relation of algorithm information, and the algorithm content that described algorithm information is corresponding, be stored in the safety equipment be separated with software client, described software client is when receiving action command, need to send License Authentication request to described safety equipment, after the license obtaining described safety equipment, described software client can be used, and, the required concrete algorithm content performed of described software client, also be stored in described safety equipment with binding with License Info, software client is when receiving operational order, need to perform request to described safety equipment transmit operation, corresponding algorithm content is searched by described safety equipment, and be responsible for the execution of specific algorithm content, after complete, execution result is returned to described software client.
Visible, because concrete algorithm content is stored in safety equipment with binding together with the License Info of software, these safety equipment and software client are separated from each other, therefore, can improve cracks at software client local runtime cracks the difficulty of described software client, thus improves the security of software.
Accompanying drawing explanation
Fig. 1 is the method for protecting software process flow diagram that the embodiment of the present invention provides.
Fig. 2 is the detail flowchart of the method for protecting software bound based on authorization and algorithm that the embodiment of the present invention provides.
Fig. 3 is the security system for software composition schematic diagram that the embodiment of the present invention provides.
Fig. 4 is the structural representation of software client in the security system for software that provides of the embodiment of the present invention.
Fig. 5 is the structural representation of safety equipment in the security system for software that provides of the embodiment of the present invention.
Embodiment
For making object of the present invention, technical scheme and advantage clearly understand, to develop simultaneously embodiment referring to accompanying drawing, the present invention is described in more detail.
Fig. 1 is the method for protecting software process flow diagram that the embodiment of the present invention provides.
As shown in Figure 1, this flow process comprises:
Step 101, in safety equipment, the algorithm content that the License Info of storing software is corresponding with the corresponding relation of algorithm information and described algorithm information.
Step 102, described safety equipment receive the License Authentication request that described software client sends when receiving action command, and described License Authentication request comprises user profile and License Info.
According to an embodiment of the invention, described user profile includes but not limited to user ID, and described License Info includes but not limited to the information such as license number or license ID.
Step 103, whether described safety equipment allow described user to use described software according to described License Authentication requests verification, if so, perform step 104, otherwise, perform step 106.
In this step, the License Info of the authorized user that specifically can store from described safety equipment according to user profile and License Info searches whether have occurrence, if had, is then verified, otherwise checking is not passed through.
Step 104, described safety equipment receive the operation that described software client sends when receiving operational order and perform request.
Wherein, described operation execution request can comprise: operate license (license) information of corresponding algorithm and the algorithm parameter information of execution and/or algorithm and identify.Described operation performs the Back ground Information that request can also comprise software client, such as, and the version number information etc. of software.Wherein, described algorithm mark can include but not limited to title and/or the algorithm ID of algorithm.
Step 105, described safety equipment perform according to described operation the algorithm content that coupling is searched in request, perform the algorithm content found, return execution result, if described software client receives shutdown command, process ends, otherwise, return step 104.
Step 106, returns the message prohibitting the use described software client, process ends.
Visible, by the method shown in Fig. 1, because concrete algorithm content is stored in safety equipment with binding together with the License Info of software, and, these safety equipment and software client are separated from each other, therefore, it is possible to improve described software client crack difficulty, thus improve the security of software.
In one embodiment, in described step 105, described safety equipment perform the algorithm content of asking to search coupling according to described operation and specifically can comprise:
Described safety equipment perform the algorithm mark of carrying in request according to described operation, directly search the algorithm content that this algorithm mark is corresponding.
When described safety equipment are directly according to the algorithm content that the algorithm identifier lookup carried in described operation execution request is corresponding, as long as can realize determining that active user is the user that Current software client is authorized to, this user is just allowed to use all functions of this software client.
Wherein, described algorithm mark comprises title and/or the algorithm ID of algorithm; Described operation performs the parameter information also comprising algorithm in request.
In another embodiment, in described step 105, described safety equipment perform the algorithm content of asking to search coupling according to described operation and specifically can comprise:
Described safety equipment perform the user profile and algorithm mark of carrying in request according to described operation, search the License Info that this user profile is corresponding, according to described License Info and described algorithm mark, determine whether to allow described user to use described algorithm to identify corresponding algorithm content, if, search the algorithm content that described algorithm mark is corresponding, otherwise, return the message having no right to use described algorithm content.
In this embodiment, by performing the user profile and algorithm mark of carrying in request further according to described operation, search the License Info that this user profile is corresponding, according to described License Info and described algorithm mark, determine whether to allow described user to use described algorithm to identify corresponding algorithm content, can realize carrying out further enhanced protection to some specific functional module in software client, after only having this functional module to be permitted further, just allow to use, therefore, the cascade protection to each functional module in software client can be realized, for important functional module, corresponding license can be configured separately, after only providing corresponding license, just allow to use described important functional module, and for other secondary functional modules, all users obtaining this software client mandate then can be allowed to use.
Wherein, described safety equipment can perform License Info in request and algorithm parameter and/or algorithm title according to described operation and search corresponding algorithm information from the corresponding relation of License Info and algorithm information.
In said method, the algorithm information stored in described safety equipment can include but not limited to parameter, algorithm mark, algorithm content information.
Described algorithm is the related algorithm performed by the concrete function operation of different software; the particular content of the embodiment of the present invention to described algorithm is not specifically limited; for the function needing in software to protect or calculating, all the algorithmic formula of function can be stored on described safety equipment.
In the embodiment of the present invention, the algorithm content that the License Info of described software is corresponding with the corresponding relation of algorithm information and described algorithm information, can be stored in database, or also can store hereof.
In order to improve security further, algorithm content is avoided to be cracked, when the algorithm content that the License Info of storing software is in a database corresponding with the corresponding relation of algorithm information and described algorithm information, preferably, described database is the intranet data storehouse isolated by fire wall and outer net.
Wherein, License Info comprises with the corresponding relation of algorithm information: a corresponding one or more License Info of authorized user, the corresponding one or more algorithm information of each License Info.
Wherein, the action command of software client is different according to the type difference of software client, can run if described software client is opened, such as conventional office software etc., then described action command can be open order, could run if described software client needs to log in, then described action command can be log on command.
Wherein, the safety equipment described in the embodiment of the present invention preferably, can be servers, or, also can be hardware encipher lock.
In the embodiment of the present invention, the corresponding relation file layout in a database of the license of authorized user, license and algorithm can comprise:
Table A, stores the corresponding relation of the license of user and authorized user in Table A, at least comprise user ID (User ID, UID), license ID (license ID, LID) two fields.
Table B, in table B, the corresponding relation of storing authorization information and algorithm identification information, at least comprises LID, algorithm ID (Algorithm ID, AID) two fields.
Table C, in table C, the specifying information of storage algorithm, at least comprises the particular content of AID and algorithm.
Below to store above-mentioned Table A in the database of the server be separated with software client, show B and show C, exemplary illustration is carried out to the method for protecting software that the embodiment of the present invention provides, specifically refers to Fig. 2.
Fig. 2 is the detail flowchart of the method for protecting software bound based on authorization and algorithm that the embodiment of the present invention provides.
As shown in Figure 2, this flow process comprises:
Step 201, stores the license of authorized user, license and the mapping table of algorithm in above-mentioned three tables in a database.
Step 202, during user's operating software, described software sends the License Authentication request comprising UID and LID to server.
Wherein, user's operating software can comprise user and opens software or user logs in software two kinds of forms.Wherein, some software need not log in, and whether some may need user to log in input user name password authentification user legal, and have again a kind of special circumstances, such as software may use unique ID of a software vendor to indicate user.
Step 203, server receives described License Authentication request, and verifies whether this license authorizes this user, if so, performs step 204, otherwise, prohibit the use software, process ends.
In this step, server receives License Authentication request and obtains UID and LID wherein, by checking in above-mentioned Table A whether this license authorizes this user.
Step 204, during software application, operation execution request is sent to server by described software.
Wherein, operation performs and asks at least to comprise License Info LID and algorithm mark AID and algorithm parameter information.
Step 205, server performs request according to described operation and search corresponding algorithm content in above-mentioned table B and table C.
Step 206, server performs calculating according to the algorithm content found, and result of calculation is returned software client.
In this step, in table C, search corresponding algorithm content, according to algorithm parameter and algorithm content, perform calculating.
Step 207, client software receives the result of calculation returned and carries out subsequent treatment.
According to said method embodiment, the embodiment of the present invention additionally provides a kind of security system for software, specifically refers to Fig. 3-Fig. 5.
Fig. 3 is the security system for software composition schematic diagram that the embodiment of the present invention provides.
As shown in Figure 3, this system comprises software client 301 and safety equipment 302.
Software client 301, for sending License Authentication request when receiving action command to described safety equipment, described License Authentication request comprises user profile and License Info, performing request when receiving operational order to described safety equipment transmit operation, receiving the execution result that described safety equipment return;
Safety equipment 302, for the License Info of storing software and the corresponding relation of algorithm information, and the algorithm content that described algorithm information is corresponding, receive the License Authentication request that described software client sends when receiving action command, described user whether is allowed to use described software according to described License Authentication requests verification, when allowing described user to use described software, receive the operation that described software client sends when receiving operational order and perform request, the algorithm content that coupling is searched in request is performed according to described operation, perform the algorithm content found, return execution result.
Fig. 4 is the structural representation of software client in the security system for software that provides of the embodiment of the present invention.
As shown in Figure 4, this software client comprises the first memory module 401, first communication module 402, approval processing module 403 and the first execution module 404.
First memory module 401, for storing the License Info of user, user profile, the identification information of software client and/or algorithm identification information.
First communication module 402, for sending License Authentication request to described safety equipment, described License Authentication request comprises user profile and License Info, perform request to described safety equipment transmit operation, receive the result of described License Authentication request, described operation performs the execution result of asking.
Approval processing module 403, for when receiving action command, License Authentication request is sent to described safety equipment by described first communication module, when described the result is for being verified, start described first execution module, at described the result for checking is obstructed out-of-date, export the message prohibitting the use described software client.
First execution module 404, for receiving operational order, when receiving operational order, performs request by described first communication module to described safety equipment transmit operation, receives by described first communication module the execution result that described safety equipment return.
Fig. 5 is the structural representation of safety equipment in the security system for software that provides of the embodiment of the present invention.
As shown in Figure 5, these safety equipment comprise the second memory module 501, second communication module 502, License Authentication module 503 and the second execution module 504.
Second memory module 501, for the algorithm content that the License Info of storing software is corresponding with the corresponding relation of algorithm information and described algorithm information.
Second communication module 502, for receiving the License Authentication request that described software client sends when receiving action command, when allowing described user to use described software client, receive the operation that described software client sends when receiving operational order and perform request, return the execution result that described second execution module 504 obtains.
Whether License Authentication module 503, for allowing described user to use described software client according to described License Authentication requests verification.
Second execution module 504, for performing according to described operation the algorithm content that coupling is searched in request, performing the algorithm content found, obtaining execution result.
Wherein, second execution module 504, can also be used for performing the algorithm mark of carrying in request according to described operation, directly search the algorithm content that this algorithm mark is corresponding, or, the user profile and algorithm mark of carrying in request is performed according to described operation, search the License Info that this user profile is corresponding, according to described License Info and described algorithm mark, determine whether to allow described user to use described algorithm to identify corresponding algorithm content, if, search the algorithm content that described algorithm mark is corresponding, otherwise, the message having no right to use described algorithm content is returned by described second communication module.
Described safety equipment can be server or hardware encipher lock.
In order to improve security further, the embodiment of the present invention can also carry out encryption and decryption process to the algorithm content of the information of transmission and storage.
Visible, the embodiment of the present invention by storing the corresponding relation of the license of authorized user, license and algorithm on the safety equipment that such as server, hardware encipher lock etc. and software client are separated, the particular content of the related algorithm performed by software is stored in safety equipment end, when using software function, in safety equipment, checking is permitted and is performed calculating, execution result is returned client software, and what therefore can increase software cracks difficulty, improves security.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment made, equivalent replacement, improvement etc., all should be included within the scope of protection of the invention.

Claims (12)

1. a method for protecting software, is characterized in that, the method comprises:
In safety equipment, the algorithm content that the License Info of storing software is corresponding with the corresponding relation of algorithm information and described algorithm information;
Described safety equipment receive the License Authentication request that described software client sends when receiving action command, and described License Authentication request comprises user profile and License Info;
Whether described safety equipment allow described user to use described software according to described License Authentication requests verification;
When allowing described user to use described software, described safety equipment receive the operation that described software client sends when receiving operational order and perform request;
Described safety equipment perform according to described operation the algorithm content that coupling is searched in request, perform the algorithm content found, return execution result.
2. method according to claim 1, is characterized in that, described safety equipment perform the algorithm content of asking to search coupling according to described operation and comprise:
Described safety equipment perform the algorithm mark of carrying in request according to described operation, directly search the algorithm content that this algorithm mark is corresponding.
3. method according to claim 1, is characterized in that, described safety equipment perform the algorithm content of asking to search coupling according to described operation and comprise:
Described safety equipment perform the user profile and algorithm mark of carrying in request according to described operation, search the License Info that this user profile is corresponding, according to described License Info and described algorithm mark, determine whether to allow described user to use described algorithm to identify corresponding algorithm content, if, search the algorithm content that described algorithm mark is corresponding, otherwise, return the message having no right to use described algorithm content.
4. according to the method in claim 2 or 3, it is characterized in that, described algorithm mark comprises title and/or the algorithm ID of algorithm;
Described operation performs the parameter information also comprising algorithm in request.
5. method according to claim 1, is characterized in that,
The algorithm content that the License Info of storing software is corresponding with the corresponding relation of algorithm information and described algorithm information comprises: the License Info of storing software and the corresponding relation of algorithm information and algorithm content corresponding to described algorithm information in database or file;
And/or described License Info comprises with the corresponding relation of algorithm information: a corresponding one or more License Info of authorized user, the corresponding one or more algorithm information of each License Info;
And/or described action command comprises opens order or log on command.
6. method according to claim 5, it is characterized in that, when the algorithm content that the License Info of storing software is in a database corresponding with the corresponding relation of algorithm information and described algorithm information, described database is the intranet data storehouse isolated by fire wall and outer net.
7. according to the method in claim 1,2,3,5,6 described in arbitrary claim, it is characterized in that, described safety equipment comprise:
Server or hardware encipher lock.
8. a security system for software, is characterized in that, this system comprises software client and safety equipment,
Described software client, for sending License Authentication request when receiving action command to described safety equipment, described License Authentication request comprises user profile and License Info, performing request when receiving operational order to described safety equipment transmit operation, receiving the execution result that described safety equipment return;
Described safety equipment, for the License Info of storing software and the corresponding relation of algorithm information, and the algorithm content that described algorithm information is corresponding, receive the License Authentication request that described software client sends when receiving action command, described user whether is allowed to use described software according to described License Authentication requests verification, when allowing described user to use described software, receive the operation that described software client sends when receiving operational order and perform request, the algorithm content that coupling is searched in request is performed according to described operation, perform the algorithm content found, return execution result.
9. system according to claim 8, is characterized in that, described software client comprises the first memory module, the first communication module, approval processing module and the first execution module;
Described first memory module, for storing the License Info of user, user profile, the identification information of software client and/or algorithm identification information;
Described first communication module, for sending License Authentication request to described safety equipment, described License Authentication request comprises user profile and License Info, perform request to described safety equipment transmit operation, receive the result of described License Authentication request, described operation performs the execution result of asking;
Described approval processing module, for when receiving action command, License Authentication request is sent to described safety equipment by described first communication module, when described the result is for being verified, start described first execution module, at described the result for checking is obstructed out-of-date, export the message prohibitting the use described software client;
Described first execution module, for receiving operational order, when receiving operational order, performs request by described first communication module to described safety equipment transmit operation, receives by described first communication module the execution result that described safety equipment return;
Described safety equipment comprise the second memory module, the second communication module, License Authentication module and the second execution module;
Described second memory module, for the algorithm content that the License Info of storing software is corresponding with the corresponding relation of algorithm information and described algorithm information;
Described second communication module, for receiving the License Authentication request that described software client sends when receiving action command, when allowing described user to use described software client, receive the operation that described software client sends when receiving operational order and perform request, return the execution result that described second execution module obtains;
Whether described License Authentication module, for allowing described user to use described software client according to described License Authentication requests verification;
Described second execution module, for performing according to described operation the algorithm content that coupling is searched in request, performing the algorithm content found, obtaining execution result.
10. system according to claim 9, is characterized in that,
Described second execution module, for performing the algorithm mark of carrying in request according to described operation, directly search the algorithm content that this algorithm mark is corresponding, or, the user profile and algorithm mark of carrying in request is performed according to described operation, search the License Info that this user profile is corresponding, according to described License Info and described algorithm mark, determine whether to allow described user to use described algorithm to identify corresponding algorithm content, if, search the algorithm content that described algorithm mark is corresponding, otherwise, the message having no right to use described algorithm content is returned by described second communication module.
11. systems according to claim 10, is characterized in that, described algorithm mark comprises title and/or the algorithm ID of algorithm;
Described operation performs the parameter information also comprising algorithm in request.
12. systems according to Claim 8 described in-10 arbitrary claims, it is characterized in that, described safety equipment comprise:
Server or hardware encipher lock.
CN201410820246.3A 2014-12-25 2014-12-25 A kind of method for protecting software and system Active CN104573493B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410820246.3A CN104573493B (en) 2014-12-25 2014-12-25 A kind of method for protecting software and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410820246.3A CN104573493B (en) 2014-12-25 2014-12-25 A kind of method for protecting software and system

Publications (2)

Publication Number Publication Date
CN104573493A true CN104573493A (en) 2015-04-29
CN104573493B CN104573493B (en) 2018-07-06

Family

ID=53089533

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410820246.3A Active CN104573493B (en) 2014-12-25 2014-12-25 A kind of method for protecting software and system

Country Status (1)

Country Link
CN (1) CN104573493B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107085675A (en) * 2016-02-16 2017-08-22 爱特梅尔公司 Controlled security code verification
CN107391966A (en) * 2017-07-21 2017-11-24 北京深思数盾科技股份有限公司 A kind of method for protecting software, device and software protective lock
CN107567626A (en) * 2015-05-15 2018-01-09 高准公司 Utilize the access of Dongle control docking port
CN109063423A (en) * 2018-07-16 2018-12-21 北京知道创宇信息技术有限公司 application software authorization method and system
CN113343224A (en) * 2021-06-04 2021-09-03 中交第一公路勘察设计研究院有限公司 Internet-based software protection method
CN113742660A (en) * 2021-08-11 2021-12-03 阿里巴巴新加坡控股有限公司 Application program permission management system and method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101272239A (en) * 2007-03-19 2008-09-24 许丰 Digital content safety control method, software and hardware device
CN101339595A (en) * 2008-05-20 2009-01-07 北京深思洛克数据保护中心 Device for operation by using permission control software
CN103258151A (en) * 2012-10-30 2013-08-21 中国科学院沈阳自动化研究所 Real-time authorization software License control method
CN103473489A (en) * 2013-06-09 2013-12-25 洛阳鸿卓电子信息技术有限公司 Permission validation system and permission validation method for safety production comprehensive supervision

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101272239A (en) * 2007-03-19 2008-09-24 许丰 Digital content safety control method, software and hardware device
CN101339595A (en) * 2008-05-20 2009-01-07 北京深思洛克数据保护中心 Device for operation by using permission control software
CN103258151A (en) * 2012-10-30 2013-08-21 中国科学院沈阳自动化研究所 Real-time authorization software License control method
CN103473489A (en) * 2013-06-09 2013-12-25 洛阳鸿卓电子信息技术有限公司 Permission validation system and permission validation method for safety production comprehensive supervision

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107567626A (en) * 2015-05-15 2018-01-09 高准公司 Utilize the access of Dongle control docking port
CN107085675A (en) * 2016-02-16 2017-08-22 爱特梅尔公司 Controlled security code verification
CN107085675B (en) * 2016-02-16 2022-05-17 爱特梅尔公司 Controlled security code authentication
CN107391966A (en) * 2017-07-21 2017-11-24 北京深思数盾科技股份有限公司 A kind of method for protecting software, device and software protective lock
CN107391966B (en) * 2017-07-21 2018-08-21 北京深思数盾科技股份有限公司 A kind of method for protecting software, device and software protective lock
CN109063423A (en) * 2018-07-16 2018-12-21 北京知道创宇信息技术有限公司 application software authorization method and system
CN109063423B (en) * 2018-07-16 2020-12-11 北京知道创宇信息技术股份有限公司 Application software authorization method and system
CN113343224A (en) * 2021-06-04 2021-09-03 中交第一公路勘察设计研究院有限公司 Internet-based software protection method
CN113742660A (en) * 2021-08-11 2021-12-03 阿里巴巴新加坡控股有限公司 Application program permission management system and method
CN113742660B (en) * 2021-08-11 2023-07-25 阿里巴巴新加坡控股有限公司 Application program license management system and method

Also Published As

Publication number Publication date
CN104573493B (en) 2018-07-06

Similar Documents

Publication Publication Date Title
KR102193644B1 (en) Facility verification method and device
CN104573493A (en) Software protection method and system
CN102497635B (en) Server, terminal and account password acquisition method
CN104092647B (en) Network access method, system and client
CN102546664A (en) User and authority management method and system for distributed file system
CN106911770A (en) A kind of data sharing method and system based on many cloud storages
CN105432056A (en) Secure hybrid file-sharing system
CN104361266A (en) Copyright protection method and system of digital contents
CN109600366A (en) The method and device of protection user data privacy based on block chain
CN109446259B (en) Data processing method and device, processor and storage medium
CN105100034A (en) Method and apparatus for an access function in network applications
US8863241B2 (en) System and method for managing usage rights of software applications
CN106992859B (en) Bastion machine private key management method and device
CN104063788A (en) Mobile platform credibility payment system and method
WO2016070611A1 (en) Method for processing data, server and terminal
CN115118419B (en) Data transmission method of security chip, security chip device, equipment and medium
CN106027475A (en) Secret key obtaining method and identity card information transmission method and system
CN106304264A (en) A kind of wireless network access method and device
CN104486364A (en) Access control method based on electronic certificate
CN100596058C (en) System and method for managing credible calculating platform key authorization data
WO2017112484A1 (en) Data breach detection system
CN114040411A (en) Equipment binding method and device, electronic equipment and storage medium
CN106059776A (en) Website login method and device
CN113112354A (en) Transaction processing method of block chain network, block chain network and storage medium
KR20150073567A (en) The Method for Transmitting and Receiving the Secure Message Using the Terminal Including Secure Storage

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100872 Zhongguancun street, Haidian District, a cultural building, No. 1706, No. 59, No.

Applicant after: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

Address before: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing

Applicant before: BEIJING SHENSI SHUDUN TECHNOLOGY Co.,Ltd.

COR Change of bibliographic data
CB02 Change of applicant information

Address after: 100193 Beijing, Haidian District, East West Road, No. 10, East Hospital, building No. 5, floor 5, layer 510

Applicant after: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

Address before: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing

Applicant before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

COR Change of bibliographic data
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee after: Beijing Shendun Technology Co.,Ltd.

Address before: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.