CN104680041A - Off-line software license validation method - Google Patents

Off-line software license validation method Download PDF

Info

Publication number
CN104680041A
CN104680041A CN201510062627.4A CN201510062627A CN104680041A CN 104680041 A CN104680041 A CN 104680041A CN 201510062627 A CN201510062627 A CN 201510062627A CN 104680041 A CN104680041 A CN 104680041A
Authority
CN
China
Prior art keywords
authority
data
program
information
validation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510062627.4A
Other languages
Chinese (zh)
Inventor
张家重
董毅
李光瑞
王玉奎
高强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Group Co Ltd
Original Assignee
Inspur Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Group Co Ltd filed Critical Inspur Group Co Ltd
Priority to CN201510062627.4A priority Critical patent/CN104680041A/en
Publication of CN104680041A publication Critical patent/CN104680041A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/107License processing; Key processing
    • G06F21/1077Recurrent authorisation

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to an off-line software license validation method, which includes license file generation and license file validation. Specifically, the off-line software license validation method includes the following steps: (S10) terminal system information is read by a license file generator; (S11) system time is obtained, and a license serial number is calculated; (S12) a license term is set, a three-dimensional data space is generated from a program two-dimensional data graph, and finally, a license file is outputted; (S13) license file validation specifically includes solidified information validation, real-time information validation, program integrity validation and license term validation. After binary data are spatialized, the method utilizes owned data space attributes in combination with system information to carry out combined validation, so that the license validation function of software is more reliable in an off-line environment.

Description

A kind of off-line soft ware authorization validation verification method
Technical field
The present invention relates to soft ware authorization validation verification technical field, be specifically related to a kind of off-line soft ware authorization validation verification method.
Background technology
So far; the soft ware authorization salvo of main flow mainly comprises: hardware identification (softdog), server authorizes certification; and sequence number certification etc.; these means or independent existence; be combined with each other, but they but often can only depend on the data check on server to the control of licensing term.This is mainly because often there is a lot of inevitably problem in the licensing term verification of client this locality, as: system time change, operating system replacement, registration table recovery etc., software is made to be difficult to preservation verification authority lasting on the client, and after these authority is lost, its verification means also will lose efficacy thereupon.
Therefore, for solving the defect that above-mentioned prior art exists, being necessary to develop research in fact, to provide a solution, making the authority checking function of software in offline environment more reliable.
Summary of the invention
For solving the problem, the object of the present invention is to provide a kind of off-line soft ware authorization validation verification method, to make the authority checking function of software in offline environment more reliable.
For achieving the above object, technical scheme of the present invention is:
A kind of off-line soft ware authorization validation verification method, includes generation and the authority checking of authority; Particularly, comprise the steps:
S10: authority maker reading terminals system information;
S11: obtain system time, calculates authorization sequence number;
S12: the term of validity is authorized in setting, generates three-dimensional data space, finally export authority by program 2-D data figure;
S13: authority is verified, specifically comprises solidification Information Authentication, real-time information checking, process integrity checking, and licensing term checking.
Further, the content in authority mainly comprises: authorization sequence number, licensing term, system multidate information record, and program 2-D data figure;
Wherein, authorization sequence number is based on system cures information, real-time information, and system time calculates and obtains, and is mainly used in the validity of verification system environment;
Licensing term by the typing of authority maker, for the term of validity of proving program;
System multidate information when system multidate information record essential record authority generates, for the validity of test authority;
Program 2-D data figure is calculated at random by the binary data of authority and obtains, for the integrality of checking routine file, the working time of calculation procedure.
Further, the data value of a Stochastic choice unit length, then find the position of this value in program binary code, if the place of this data bit is set to 1, other positions are 0, obtain the 2-D data figure of program, 2-D data figure is carried out according to a certain direction the three-dimensional data space just forming program after arranging.
Off-line soft ware authorization validation verification method of the present invention, by after binary data is carried out spatialization, utilizes the data space attribute coupling system information of self to carry out the method for combined authentication, makes the authority checking function of software in offline environment more reliable.
Term " first ", " second " etc. in instructions of the present invention and claims and above-mentioned accompanying drawing are for distinguishing similar object, and need not be used for describing specific order or precedence.Should be appreciated that the term used like this can exchange in the appropriate case, this is only describe in embodiments of the invention the differentiation mode that the object of same alike result adopts when describing.In addition, term " comprises " and " having " and their any distortion, intention is to cover not exclusive comprising, to comprise the process of a series of unit, method, system, product or equipment being not necessarily limited to those unit, but can comprise clearly do not list or for intrinsic other unit of these processes, method, product or equipment.
With reference to shown in Fig. 1, be described in detail respectively below.
A kind of off-line soft ware authorization of the present invention validation verification method, includes generation and the authority checking of authority; Particularly, comprise the steps:
S10: authority generates
Content in authority mainly comprises: authorization sequence number, licensing term, system multidate information record, and program 2-D data figure; Authorization sequence number is based on system cures information, real-time information, and system time etc. calculates and obtains, and is mainly used in the validity of verification system environment.Licensing term by the typing of authority maker, for the term of validity of proving program.System multidate information when system multidate information record essential record authority generates, for the validity of test authority.Program 2-D data figure is calculated at random by the binary data of authority and obtains, for the integrality of checking routine file, the working time of calculation procedure.
Particularly, authority maker reading terminals system information, described terminal system information includes solidification information and real-time information; Solidification information mainly includes hardware sequence number, operation system information and current user information; And real-time information includes hard disk use amount, service time and number of times, registration table random reference item and system directory list.Obtain system time, calculate authorization sequence number; The term of validity is authorized in setting, three-dimensional data space is generated by program 2-D data figure, wherein, by the data value of a Stochastic choice unit length, then find the position of this value in program binary code, if the place of this data bit is set to 1, other positions are 0, finally obtain the 2-D data figure of program, 2-D data figure is carried out according to a certain direction the three-dimensional data space just forming program after arranging, finally export authority.
Particularly, call function GetSystemFixedInfo () obtains the solidification information of system; Call function GetSystemDynamicInfo () obtains the multidate information of system; Call function GetSystemTime () obtains present system time; Call function GetCDKEY () authorization sequence number; The term of validity of call function SetValidity () setting software; Call function GetBinaryMap () obtains the 2-D data figure of program file; Call function CreateDataSpaceTime () creates based on above the data space-time obtaining information; Call function EncodingSpace () exports the authority after encryption.
S10: authority is verified
The authorization verification process of program mainly comprises solidification Information Authentication, real-time information checking, process integrity checking, and licensing term checking.
Wherein, solidification Information Authentication mainly verifies the solidification information of the systems such as hardware ID, ensures the uniqueness of authorizing environment; Real-time information checking, mainly by the change of contrast real-time information, judges the validity of authority, and the changing value as whether there is system time is less than the phenomenons such as the increase of hard disk service time; Process integrity checking mainly utilizes the 2-D data figure of program, the integrality of checking routine file; And licensing term checking mainly utilizes three-dimensional data space, program space structure, and the relevant setting of licensing term, whether the change of checking routine mandate degradation period meets the changing range of present system time, then represents that system time exists abnormal as do not met.
The present invention, by after binary data is carried out spatialization, utilizes the data space attribute coupling system information of self to carry out the method for combined authentication, makes the authority checking function of software in offline environment more reliable.
Through the above description of the embodiments, those skilled in the art can be well understood to the mode that the present invention can add required common hardware by software and realize, and can certainly comprise special IC, dedicated cpu, private memory, special components and parts etc. realize by specialized hardware.Generally, all functions completed by computer program can realize with corresponding hardware easily, and the particular hardware structure being used for realizing same function also can be diversified, such as mimic channel, digital circuit or special circuit etc.But under more susceptible for the purpose of the present invention condition, software program realizes is better embodiment.Based on such understanding, technical scheme of the present invention can embody with the form of software product the part that prior art contributes in essence in other words, this computer software product is stored in the storage medium that can read, as the floppy disk of computing machine, USB flash disk, portable hard drive, ROM (read-only memory) (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc., comprising some instructions in order to make a computer equipment (can be personal computer, server, or the network equipment etc.) perform method described in the present invention each embodiment.
In sum, above embodiment only in order to technical scheme of the present invention to be described, is not intended to limit; Although with reference to above-described embodiment to invention has been detailed description, those of ordinary skill in the art is to be understood that: it still can be modified to the technical scheme described in the various embodiments described above, or carries out equivalent replacement to wherein portion of techniques feature; And these amendments or replacement, do not make the essence of appropriate technical solution depart from the spirit and scope of various embodiments of the present invention technical scheme.
Accompanying drawing explanation
Fig. 1 is method flow of the present invention diagram.
Embodiment
Embodiments provide a kind of off-line soft ware authorization validation verification method, after binary data is carried out spatialization, utilize the data space attribute coupling system information of self to carry out the method for combined authentication, make the authority checking function of software in offline environment more reliable.
For making goal of the invention of the present invention, feature, advantage can be more obvious and understandable, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, the embodiments described below are only the present invention's part embodiments, and not all embodiments.Based on the embodiment in the present invention, the every other embodiment that those skilled in the art obtains, all belongs to the scope of protection of the invention.

Claims (3)

1. an off-line soft ware authorization validation verification method, is characterized in that, includes generation and the authority checking of authority; Particularly, comprise the steps:
S10: authority maker reading terminals system information;
S11: obtain system time, calculates authorization sequence number;
S12: the term of validity is authorized in setting, generates three-dimensional data space, finally export authority by program 2-D data figure;
S13: authority is verified, specifically comprises solidification Information Authentication, real-time information checking, process integrity checking, and licensing term checking.
2. off-line soft ware authorization validation verification method as claimed in claim 1, is characterized in that: the content in authority mainly comprises: authorization sequence number, licensing term, system multidate information record, and program 2-D data figure;
Wherein, authorization sequence number is based on system cures information, real-time information, and system time calculates and obtains, and is mainly used in the validity of verification system environment;
Licensing term by the typing of authority maker, for the term of validity of proving program;
System multidate information when system multidate information record essential record authority generates, for the validity of test authority;
Program 2-D data figure is calculated at random by the binary data of authority and obtains, for the integrality of checking routine file, the working time of calculation procedure.
3. off-line soft ware authorization validation verification method as claimed in claim 2, it is characterized in that: the data value of a Stochastic choice unit length, then find the position of this value in program binary code, if the place of this data bit is set to 1, other positions are 0, obtain the 2-D data figure of program, 2-D data figure is carried out according to a certain direction the three-dimensional data space just forming program after arranging.
CN201510062627.4A 2015-02-06 2015-02-06 Off-line software license validation method Pending CN104680041A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510062627.4A CN104680041A (en) 2015-02-06 2015-02-06 Off-line software license validation method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510062627.4A CN104680041A (en) 2015-02-06 2015-02-06 Off-line software license validation method

Publications (1)

Publication Number Publication Date
CN104680041A true CN104680041A (en) 2015-06-03

Family

ID=53315073

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510062627.4A Pending CN104680041A (en) 2015-02-06 2015-02-06 Off-line software license validation method

Country Status (1)

Country Link
CN (1) CN104680041A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109190332A (en) * 2018-08-15 2019-01-11 杭州安恒信息技术股份有限公司 A kind of License Authentication method, system and the relevant device of product
CN109241702A (en) * 2018-09-03 2019-01-18 福建联迪商用设备有限公司 A kind of software use authorization method and client
CN109241705A (en) * 2018-08-29 2019-01-18 中科鼎富(北京)科技发展有限公司 A kind of software authorization method and system
CN113806720A (en) * 2021-09-24 2021-12-17 福建星网视易信息系统有限公司 Software authentication method, system and storage medium supporting offline scene
CN114117364A (en) * 2022-01-24 2022-03-01 北京麟卓信息科技有限公司 Offline software license control method and system
CN114510685A (en) * 2022-01-28 2022-05-17 统信软件技术有限公司 Reset method of authorization state, and update method and system of authorization state

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080189549A1 (en) * 2007-02-01 2008-08-07 Microsoft Corporation Secure serial number
CN102479304A (en) * 2010-11-26 2012-05-30 深圳市硅格半导体有限公司 Method, client and system for software access control

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080189549A1 (en) * 2007-02-01 2008-08-07 Microsoft Corporation Secure serial number
CN102479304A (en) * 2010-11-26 2012-05-30 深圳市硅格半导体有限公司 Method, client and system for software access control

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109190332A (en) * 2018-08-15 2019-01-11 杭州安恒信息技术股份有限公司 A kind of License Authentication method, system and the relevant device of product
CN109241705A (en) * 2018-08-29 2019-01-18 中科鼎富(北京)科技发展有限公司 A kind of software authorization method and system
CN109241702A (en) * 2018-09-03 2019-01-18 福建联迪商用设备有限公司 A kind of software use authorization method and client
CN113806720A (en) * 2021-09-24 2021-12-17 福建星网视易信息系统有限公司 Software authentication method, system and storage medium supporting offline scene
CN113806720B (en) * 2021-09-24 2023-12-05 福建星网视易信息系统有限公司 Software authentication method, system and storage medium supporting offline scene
CN114117364A (en) * 2022-01-24 2022-03-01 北京麟卓信息科技有限公司 Offline software license control method and system
CN114117364B (en) * 2022-01-24 2022-03-29 北京麟卓信息科技有限公司 Offline software license control method and system
CN114510685A (en) * 2022-01-28 2022-05-17 统信软件技术有限公司 Reset method of authorization state, and update method and system of authorization state
CN114510685B (en) * 2022-01-28 2024-05-14 统信软件技术有限公司 Authorization state resetting method, authorization state updating method and system

Similar Documents

Publication Publication Date Title
CN104680041A (en) Off-line software license validation method
CN108734028B (en) Data management method based on block chain, block chain link point and storage medium
CN108183924A (en) A kind of login validation method and terminal device
CN110995737A (en) Gradient fusion method and device for federal learning and electronic equipment
CN105874464B (en) System and method for introducing variation in subsystem output signal to prevent device-fingerprint from analyzing
US9734091B2 (en) Remote load and update card emulation support
US11051162B2 (en) Method for anonymously identifying a security module
CN109286638B (en) Automobile diagnosis equipment authentication method and related device
CN101968834A (en) Encryption method and device for anti-copy plate of electronic product
CN104283853A (en) Method, terminal device and network device for improving information safety
CN112464212A (en) Data authority control reconstruction method based on mature complex service system
CN109165483A (en) A method of it prevents around cloud platform licensing term
CN103797490A (en) Change-tolerant method of generating an identifier for a collection of assets in a computing environment using a secret sharing scheme
CN102938045A (en) Encryption method and authorization method after encryption for electronic product
CN113329004B (en) Authentication method, system and device
CN108846671B (en) Online secure transaction method and system based on block chain
CN103139136B (en) The management process of a kind of password and equipment
CN112583594B (en) Data processing method, acquisition device, gateway, trusted platform and storage medium
CN108540335B (en) Management method and management device for equipment analysis report
CN104753864A (en) Permission validation system and permission validation method
CN113923001B (en) Identity verification method, system, device and equipment
CN103336918B (en) Electronic hard disk system authorization method and device
CN112468465A (en) Guarantee derivation-based terminal account identity authentication method and system in zero trust environment
CN106161467A (en) Water utilities data access method and device
CN105357185B (en) Shared account login verification method, device and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150603