CN105160210A - Software authorization method and system, software terminal and software management party - Google Patents

Software authorization method and system, software terminal and software management party Download PDF

Info

Publication number
CN105160210A
CN105160210A CN201510394604.3A CN201510394604A CN105160210A CN 105160210 A CN105160210 A CN 105160210A CN 201510394604 A CN201510394604 A CN 201510394604A CN 105160210 A CN105160210 A CN 105160210A
Authority
CN
China
Prior art keywords
character
character string
prime number
software
business
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510394604.3A
Other languages
Chinese (zh)
Other versions
CN105160210B (en
Inventor
曹雪韬
刘振印
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur General Software Co Ltd
Original Assignee
Inspur General Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur General Software Co Ltd filed Critical Inspur General Software Co Ltd
Priority to CN201510394604.3A priority Critical patent/CN105160210B/en
Publication of CN105160210A publication Critical patent/CN105160210A/en
Application granted granted Critical
Publication of CN105160210B publication Critical patent/CN105160210B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software

Abstract

The invention provides a software authorization method and system, a software terminal and a software management party. The software authorization method is applied to the software terminal and comprises: storing a first public key and a second private key; collecting current user information; utilizing the first public key to encrypt the user information, and generating a software authorization application code; sending the software authorization application code to the software management party; receiving an activation code from the software management party and utilizing the second private key to decrypt the activation code; analyzing the decrypted activation code and obtaining a software authorization use policy corresponding to the current user from the activation code; and according to the obtained software authorization use policy, performing software initialization. According to the scheme, the flexibility of software authorization management can be improved.

Description

A kind of software authorization method and system, software terminal and software administration side
Technical field
The present invention relates to computer technology, particularly a kind of software authorization method and system, software terminal and software administration side.
Background technology
Along with the development of computer technology, the kind of computer software gets more and more, and function also from strength to strength.On one computer, when after software product installation, software can when login first or upgrading, and need the mandate obtaining software administration side, authorizing successfully, software could normally run on computers, thus completes corresponding software function.
Current soft ware authorization mode comprises: authorization requests is sent to software administration side by software installing terminal; Software administration side carries out certification to software installing terminal, after legal, authorization message is returned to software installing terminal.Visible, current soft ware authorization mode function singleness, cannot improve the dirigibility of soft ware authorization management.
Summary of the invention
The invention provides a kind of software authorization method and system, software terminal and software administration side, the dirigibility of soft ware authorization management can be improved.
A kind of software authorization method, is applied in software terminal, preserves the first PKI and the second private key; Also comprise:
Collect current user information;
Utilize the first PKI to be encrypted described user profile, generate soft ware authorization application code;
Soft ware authorization application code is sent to software administration side;
Receive the active coding from software administration side, utilize the second private key to be decrypted active coding;
Active coding after deciphering is resolved, from active coding, obtains the soft ware authorization corresponding to active user use strategy;
Use strategy according to the soft ware authorization obtained, carry out software initialization.
Described current user information comprises: any one or more in the hard disk of Current software terminal, network interface card, memory information; And/or, the identity information of current user;
And/or,
Described soft ware authorization uses strategy to comprise: any one or more in software function module authority, authorization type, the term of validity.
The soft ware authorization application code of described generation is the first character string forms; Then after described generation soft ware authorization application code, and described soft ware authorization application code sent to software administration side before, comprise further:
For the soft ware authorization application code of the first character string forms generated, each character in the first character string is converted to ASCII character corresponding to this character respectively, obtains the second character string;
Carrying out prime number respectively to each ASCII character in the second character string asks business to process;
Asked by prime number the result of business and the prime number of correspondence to replace ASCII character corresponding in the second character string, obtain three-character doctrine string;
Describedly software administration side is sent to comprise soft ware authorization application code: the soft ware authorization application code of three-character doctrine string form is sent to software administration side;
Wherein,
Describedly prime number carried out respectively to each ASCII character in the second character string ask business to process to comprise:
For each ASCII character described, perform one by one by this ASCII character divided by the prime number being greater than natural number 1 according to prime number order from small to large, until obtain first business of dividing exactly;
Prime number corresponding to described ASCII character asks the result of business to be: described first business of dividing exactly;
Described prime number asks prime number corresponding to the result of business to be: obtain described first divide exactly business time, as the prime number of current divisor.
The described active coding received is the 4th character string forms; Then after the active coding of described reception from software administration side, and utilize before the second private key is decrypted active coding described, comprise further:
For the active coding of the 4th character string forms from software administration side received, be that a unit splits described 4th character string with every 3 characters;
The first two character string in each unit split out is converted to numeral and ask product with the 3rd numeral that character string converts to, obtain the ASCII character that each unit is corresponding, replace this each unit by the ASCII character that each unit is corresponding, obtain the 5th character string;
Each ASCII character in 5th character string is converted to corresponding character, obtains the 6th character string;
By the character on default M position in the 6th character string respectively correspondence replace with last M position character in the 6th character string, and delete this last M position character, obtain the 7th character string;
Describedly utilize the second private key to be decrypted active coding to comprise: utilize the active coding of the second private key to the 7th character string forms to be decrypted.
A kind of software authorization method, is applied to software administration side, and the soft ware authorization arranging its correspondence for each user respectively uses strategy; Preserve and correspond to user institute and use the first private key of the first PKI, and corresponding to user use the second PKI of the second private key, also comprise:
Receive soft ware authorization application code;
Described first private key is utilized to be decrypted soft ware authorization application code;
According to the user profile in the soft ware authorization application code after deciphering, obtain soft ware authorization corresponding to active user and use strategy;
Utilize described second PKI to use strategy to be encrypted to the soft ware authorization obtained, generate active coding;
The active coding of generation is sent to software terminal.
The described application code received is three-character doctrine string form; Then after described reception soft ware authorization application code, and utilize before described first private key is decrypted soft ware authorization application code described, comprise further:
For the application code of the three-character doctrine string form received, be that a unit splits described three-character doctrine string with every 3 characters;
The first two character string in each unit split out is converted to numeral and ask product with the 3rd numeral that character string converts to, obtain the ASCII character that each unit is corresponding, replace this each unit by the ASCII character that each unit is corresponding, obtain the second character string;
ASCII character each in second character string is converted to corresponding character, obtains the first character string;
Describedly utilize described first private key to be decrypted soft ware authorization application code to comprise: utilize the active coding of the first private key to the first character string forms to be decrypted.
The active coding of described generation is the 7th character string forms; Then after described generation active coding, and before the described active coding by generation sends to software terminal, comprise further:
For the active coding of the 7th character string forms, the original character preset on M position in the 7th character string is replaced with a default M substitute character respectively, M described original character is added the 7th character string end, obtains the 6th character string;
Each character in 6th character string is converted to ASCII character corresponding to this character respectively, obtains the 5th character string;
Carrying out prime number respectively to each ASCII character in the 5th character string asks business to process;
Asked by prime number the result of business and the prime number of correspondence to replace ASCII character corresponding in the 5th character string, obtain the 4th character string;
The described active coding by generation sends to software terminal to comprise: the active coding of the 4th character string forms is sent to software terminal.
Wherein,
Describedly prime number carried out respectively to each ASCII character in the 5th character string ask business to process to comprise:
For each ASCII character described, perform one by one by this ASCII character divided by the prime number being greater than natural number 1 according to prime number order from small to large, until obtain first business of dividing exactly;
Prime number corresponding to described ASCII character asks the result of business to be: described first business of dividing exactly;
Described prime number asks prime number corresponding to the result of business to be: obtain described first divide exactly business time, as the prime number of current divisor.
A kind of software terminal, comprising:
First storage unit, for preserving the first PKI and the second private key;
Information collection unit, for collecting current user information;
Application processing unit, the first PKI preserved for utilizing described storage unit is encrypted the described user profile collected by information collection unit, generates soft ware authorization application code, soft ware authorization application code is sent to software administration side;
Activating processing unit, for receiving the active coding from software administration side, utilizing the second private key to be decrypted active coding; Active coding after deciphering is resolved, from active coding, obtains the soft ware authorization corresponding to active user use strategy;
Authorisation process unit, for using strategy according to the soft ware authorization obtained, carries out software initialization.
The soft ware authorization application code of described generation is the first character string forms; Then described application processing unit comprises: the first encryption subelement and first sends subelement, wherein,
First encryption subelement, for the soft ware authorization application code of the first character string forms generated, is converted to ASCII character corresponding to this character respectively by each character in the first character string, obtains the second character string; Carrying out prime number respectively to each ASCII character in the second character string asks business to process; Asked by prime number the result of business and the prime number of correspondence to replace ASCII character corresponding in the second character string, obtain three-character doctrine string;
First sends subelement, for the soft ware authorization application code of three-character doctrine string form is sent to software administration side;
Wherein,
First encryption subelement, when carrying out prime number to each ASCII character in the second character string respectively and asking business to process, specifically performs:
For each ASCII character described, perform one by one by this ASCII character divided by the prime number being greater than natural number 1 according to prime number order from small to large, until obtain first business of dividing exactly;
Prime number corresponding to described ASCII character asks the result of business to be: described first business of dividing exactly;
Described prime number asks prime number corresponding to the result of business to be: obtain described first divide exactly business time, as the prime number of current divisor.
The described active coding received is the 4th character string forms; Then described activation processing unit comprises: the first decryption processing subelement and the second decryption processing subelement;
First decryption processing subelement, for the active coding for the 4th character string forms from software administration side received, is that a unit splits described 4th character string with every 3 characters; The first two character string in each unit split out is converted to numeral and ask product with the 3rd numeral that character string converts to, obtain the ASCII character that each unit is corresponding, replace this each unit by the ASCII character that each unit is corresponding, obtain the 5th character string; Each ASCII character in 5th character string is converted to corresponding character, obtains the 6th character string; By the character on default M position in the 6th character string respectively correspondence replace with last M position character in the 6th character string, and delete this last M position character, obtain the 7th character string;
Described second decryption processing subelement, is decrypted for utilizing the active coding of the second private key to the 7th character string forms.
A kind of software administration side, comprising:
Delegated strategy setting unit, uses strategy for the soft ware authorization arranging its correspondence for each user respectively;
Second storage unit, for preserve corresponding to user use the first private key of the first PKI, and correspond to user use the second PKI of the second private key;
Receiving element, for receiving soft ware authorization application code;
Application code processing unit, utilizes described first private key to be decrypted the soft ware authorization application code that described receiving element receives;
Delegated strategy transmission processing unit, for according to the user profile in the soft ware authorization application code after deciphering, obtains soft ware authorization corresponding to active user and uses strategy; Utilize described second PKI to use strategy to be encrypted to the soft ware authorization obtained, generate active coding; The active coding of generation is sent to software terminal.
Software administration side may further include: application code decoding unit, and described application code decoding unit is connected between described receiving element and described application code processing unit; Wherein,
Described receiving element receives the application code of three-character doctrine string form;
Described application code decoding unit, for the application code of three-character doctrine string form received for receiving element, is that a unit splits described three-character doctrine string with every 3 characters; The first two character string in each unit split out is converted to numeral and ask product with the 3rd numeral that character string converts to, obtain the ASCII character that each unit is corresponding, replace this each unit by the ASCII character that each unit is corresponding, obtain the second character string; ASCII character each in second character string is converted to corresponding character, obtains the first character string;
Described application code processing unit utilizes the active coding of the first private key to the first character string forms to be decrypted.
In software administration side, described delegated strategy transmission processing unit comprises:
First generates subelement, for generating the active coding of the 7th character string forms;
Second encryption subelement, for generating the active coding of the 7th character string forms that subelement generates for first, the original character preset on M position in 7th character string is replaced with a default M substitute character respectively, M described original character is added the 7th character string end, obtains the 6th character string; Each character in 6th character string is converted to ASCII character corresponding to this character respectively, obtains the 5th character string; Carrying out prime number respectively to each ASCII character in the 5th character string asks business to process; Asked by prime number the result of business and the prime number of correspondence to replace ASCII character corresponding in the 5th character string, obtain the 4th character string;
Second sends subelement, for the active coding of the 4th character string forms is sent to software terminal.
Wherein,
Described second encryption subelement carries out prime number respectively to each ASCII character in the 5th character string and asks business to process, and specifically performs:
For each ASCII character described, perform one by one by this ASCII character divided by the prime number being greater than natural number 1 according to prime number order from small to large, until obtain first business of dividing exactly;
Prime number corresponding to described ASCII character asks the result of business to be: described first business of dividing exactly;
Described prime number asks prime number corresponding to the result of business to be: obtain described first divide exactly business time, as the prime number of current divisor.
A kind of software authorization system, comprises any one software terminal above-mentioned, and any one software administration side above-mentioned.
The software authorization method that the embodiment of the present invention provides and system, software terminal and software administration side, different soft ware authorizations can be set for different users and use strategy, the strategy of licensing of the software that each user obtains on software terminal is arranged targetedly for this user in advance, therefore, after carrying out software initialization according to this, then can realize the difference mandate carrying out same software according to different user.Further, can policy information be used to be carried in active coding soft ware authorization and send to software terminal, implementation be simple.
Accompanying drawing explanation
Fig. 1 is the process flow diagram realizing soft ware authorization in one embodiment of the invention in software terminal.
Fig. 2 is the process flow diagram realizing soft ware authorization in another embodiment of the present invention in software administration side.
Fig. 3 is that in one embodiment of the invention, software terminal coordinates with software administration side and uses multi-enciphering technology to carry out the process flow diagram of soft ware authorization process.
Fig. 4 is the process flow diagram that in one embodiment of the invention, software terminal is encrypted soft ware authorization application code based on ASCII character.
Fig. 5 is the process flow diagram that in one embodiment of the invention, software administration side is decrypted soft ware authorization application code based on ASCII character.
Fig. 6 is the process flow diagram that in one embodiment of the invention, software administration side is encrypted active coding based on ASCII character.
Fig. 7 is the process flow diagram that in one embodiment of the invention, software terminal is decrypted active coding based on ASCII character.
Fig. 8 is the structural representation of software terminal in one embodiment of the invention.
Fig. 9 is the structural representation of software administration side in one embodiment of the invention.
Figure 10 is the structural representation of software authorization system in one embodiment of the invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described.Obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
One embodiment of the invention proposes a kind of software authorization method, is applied in software terminal, and see Fig. 1, the method comprises:
Step 101: preserve the first PKI and the second private key in software terminal.
Step 102: software terminal collects current user information.
Step 103: software terminal utilizes the first PKI to be encrypted described user profile, generates soft ware authorization application code.
Step 104: soft ware authorization application code is sent to software administration side.
Step 105: receive the active coding from software administration side, utilizes the second private key to be decrypted active coding.
Step 106: resolve the active coding after deciphering, obtains the soft ware authorization corresponding to active user and uses strategy from active coding.
Step 107: use strategy according to the soft ware authorization obtained, carry out software initialization.
Visible, embodiment shown in Fig. 1 can arrange different soft ware authorizations and use strategy for different users, the strategy of licensing of the software that each user obtains on software terminal is arranged targetedly for this user in advance, therefore, after carrying out software initialization according to this, then can realize the difference mandate carrying out same software according to different user.Further, can policy information be used to be carried in active coding soft ware authorization and send to software terminal, implementation be simple.
In an embodiment of the invention, described current user information comprises: any one or more in the hard disk of Current software terminal, network interface card, memory information; And/or, the identity information of current user.That is, application code can be generated based on the hardware information of software terminal, mark user.Also can simultaneously or different time generate application code based on the identity information of user of service.Therefore, it is possible to ensure authenticity and the validity of application code.
In an embodiment of the invention, described soft ware authorization uses strategy to comprise: any one or more in software function module authority, authorization type, the term of validity.
In the embodiment of the present invention shown in Fig. 1, in order to ensure the security of application code, the first PKI is used to encrypt to application code.In one embodiment of the invention, in order to improve the mutual security of application code further, for the application code after encryption, can also carry out as follows based on the encryption of ASCII character further:
In step 103, the soft ware authorization application code of described generation is the first character string forms; After then generating soft ware authorization application code described in step 103, and before soft ware authorization application code being sent to software administration side described in step 104, comprise further:
For the soft ware authorization application code of the first character string forms generated, each character in the first character string is converted to ASCII character corresponding to this character respectively, obtains the second character string;
Carrying out prime number respectively to each ASCII character in the second character string asks business to process;
Asked by prime number the result of business and the prime number of correspondence to replace ASCII character corresponding in the second character string, obtain three-character doctrine string;
In step 104, be that the soft ware authorization application code of three-character doctrine string form is sent to software administration side;
Wherein,
Describedly prime number carried out respectively to each ASCII character in the second character string ask business to process to comprise:
For each ASCII character described, perform one by one by this ASCII character divided by the prime number being greater than natural number 1 according to prime number order from small to large, until obtain first business of dividing exactly;
Prime number corresponding to described ASCII character asks the result of business to be: described first business of dividing exactly;
Described prime number asks prime number corresponding to the result of business to be: obtain described first divide exactly business time, as the prime number of current divisor.
In the embodiment of the present invention shown in Fig. 1, in order to ensure the security of active coding, the encryption can having carried out based on ASCII character to active coding in side, software administration side, correspondingly, in software terminal, following decryption processing can also be carried out further:
The active coding received described in step 105 is the 4th character string forms; Then in step 105 after the active coding of described reception from software administration side, and utilize before the second private key is decrypted active coding described, comprise further:
For the active coding of the 4th character string forms from software administration side received, be that a unit splits described 4th character string with every 3 characters;
The first two character string in each unit split out is converted to numeral and ask product with the 3rd numeral that character string converts to, obtain the ASCII character that each unit is corresponding, replace this each unit by the ASCII character that each unit is corresponding, obtain the 5th character string;
Each ASCII character in 5th character string is converted to corresponding character, obtains the 6th character string;
By the character on default M position in the 6th character string respectively correspondence replace with last M position character in the 6th character string, and delete this last M position character, obtain the 7th character string;
In step 105, be utilize the active coding of the second private key to the 7th character string forms to be decrypted.
One embodiment of the invention also proposed a kind of software authorization method, is applied to software administration side, see Fig. 2, comprising:
Step 201: in advance for each user arranges the soft ware authorization use strategy of its correspondence respectively.
Step 202: preserve in advance and correspond to user institute and use the first private key of the first PKI, and corresponding to user use the second PKI of the second private key.
Step 203: receive the soft ware authorization application code that software terminal is sent.
Step 204: utilize described first private key to be decrypted soft ware authorization application code;
Step 205: according to the user profile in the soft ware authorization application code after deciphering, obtains soft ware authorization corresponding to active user and uses strategy;
Step 206: utilize described second PKI to use strategy to be encrypted to the soft ware authorization obtained, generate active coding;
Step 207: the active coding of generation is sent to software terminal.
In an embodiment of the invention, the application code that software administration side receives can be through double-encryption, namely through the encryption of the first PKI, and through the encryption based on ASCII character, now, software administration side needs to carry out corresponding decryption processing, can comprise:
The application code received in described step 203 is three-character doctrine string form; After then receiving soft ware authorization application code described in step 203, and utilize before described first private key is decrypted soft ware authorization application code described in step 204, comprise further:
For the application code of the three-character doctrine string form received, be that a unit splits described three-character doctrine string with every 3 characters;
The first two character string in each unit split out is converted to numeral and ask product with the 3rd numeral that character string converts to, obtain the ASCII character that each unit is corresponding, replace this each unit by the ASCII character that each unit is corresponding, obtain the second character string;
ASCII character each in second character string is converted to corresponding character, obtains the first character string;
In described step 204, the active coding of the first private key to the first character string forms is specifically utilized to be decrypted.
In the embodiment of the present invention shown in Fig. 2, in order to ensure the security of active coding, the second PKI is used to encrypt to active coding.In one embodiment of the invention, in order to improve the mutual security of active coding further, for the active coding after encryption, can also carry out as follows based on the encryption of ASCII character further:
The active coding generated described in step 206 is the 7th character string forms; After then generating active coding described in step 206, and before the active coding of generation is sent to software terminal by described step 207, comprise further:
For the active coding of the 7th character string forms, the original character preset on M position in the 7th character string is replaced with a default M substitute character respectively, M described original character is added the 7th character string end, obtains the 6th character string;
Each character in 6th character string is converted to ASCII character corresponding to this character respectively, obtains the 5th character string;
Carrying out prime number respectively to each ASCII character in the 5th character string asks business to process;
Asked by prime number the result of business and the prime number of correspondence to replace ASCII character corresponding in the 5th character string, obtain the 4th character string;
In step 207, specifically the active coding of the 4th character string forms is sent to software terminal;
Wherein,
Describedly prime number carried out respectively to each ASCII character in the 5th character string ask business to process to comprise:
For each ASCII character described, perform one by one by this ASCII character divided by the prime number being greater than natural number 1 according to prime number order from small to large, until obtain first business of dividing exactly;
Prime number corresponding to described ASCII character asks the result of business to be: described first business of dividing exactly;
Described prime number asks prime number corresponding to the result of business to be: obtain described first divide exactly business time, as the prime number of current divisor.
In order to the process realizing soft ware authorization is clearly described in the embodiment of the present invention, cooperation treatment scheme below in conjunction with software terminal and software administration side is described, and, software terminal and software administration side are all to needing the information sending to the other side to carry out double-encryption, see Fig. 3, specifically can comprise:
Step 301: in advance generate two pairs of public private key pairs, will wherein the first PKI and the second private key be kept in software terminal, and by correspond to the first PKI the first private key, be all kept in software administration side corresponding to the second PKI of the second private key.
Step 302: according to business demand, in advance for the soft ware authorization that each user of same software arranges its correspondence respectively uses strategy.
Here, can according to business demands such as different geographical, different user priority, the soft ware authorization arranging its correspondence for each user respectively uses strategy.Such as, user 1 is different with the region of user 2, and for software 1, the soft ware authorization use strategy that user 1 uses the authority of this software 1 namely corresponding is different from user's 2.
Step 303: user 1 is mounting software 1 on software terminal, when needing initializers 1, software terminal collects the identity information of user 1 and the hardware information (hard disk of such as software terminal, network interface card, memory information) of this software terminal.
Step 304: software terminal utilizes the first PKI to be encrypted the information of collecting, and obtains the soft ware authorization application code of the first character string forms.
Utilize the hardware information of the first PKI to user 1 identity information collected and software terminal to be encrypted, obtain application code, the security of application code can be ensured.
In order to increase the security of application code further, can also as follows 305 the encryption based on ASCII character, application code is encrypted further.
Step 305: carry out the encryption based on ASICC code to the first character string, obtains the soft ware authorization application code of three-character doctrine string form.
See Fig. 4, the implementation procedure of this step 305 can specifically comprise:
Step 401: each character in the first character string is converted to ASCII character corresponding to this character respectively, obtains the second character string.
Such as, the first character string comprises: AB ... U, be then converted to the ASCII character 65 of its correspondence by A wherein, B is wherein converted to the ASCII character 66 of its correspondence ... U is wherein converted to the ASCII character 85 of its correspondence, like this, the second character string obtained comprises: 6566 ... 85.
Step 402: for each ASCII character in the second character string, performs by this ASCII character divided by the prime number being greater than natural number 1 one by one according to prime number order from small to large, until obtain first business of dividing exactly.
Such as, the second character string comprises: 6566 ... 85.So, for first ASCII character 65, from the prime number 3 being greater than 1, use 65 ÷ 3 successively, indivisible, then 65 ÷ 5=13, can eliminate, then obtaining first business of dividing exactly is 13, and corresponding prime number is 5.In like manner, for next ASCII character 66, from the prime number 3 being greater than 1, use 66 ÷ 3=22 successively, can eliminate, then obtaining first business of dividing exactly is 22, and corresponding prime number is 3.By that analogy, until for last ASCII character 85 in the second character string, first business of dividing exactly obtaining its correspondence is 17, and corresponding prime number is 5.
Step 403: for each ASCII character in the second character string, prime number is asked the prime number of the result of business (i.e. first business of dividing exactly) and correspondence (namely obtain described first divide exactly business time, prime number as current divisor) replace ASCII character corresponding in the second character string, obtain three-character doctrine string.
Such as, can by the second character string: 6566 ... 85, generate three-character doctrine string after replacing: 135223 ... 175.
So far, then the soft ware authorization application code obtaining three-character doctrine string form is completed in step 305.
Step 306: the soft ware authorization application code of three-character doctrine string form is sent to software administration side by software terminal.
Step 307: the soft ware authorization application code of software administration side to three-character doctrine string form carries out the decryption processing based on ASCII character, obtains the soft ware authorization application code of the first character string forms.
See Fig. 5, based on the implementation procedure of above-mentioned steps 305, the implementation procedure of this step 307 can be the inverse process of process shown in Fig. 4, specifically comprises:
Step 501: software administration side, for the application code of the three-character doctrine string form received, is that a unit splits described three-character doctrine string with every 3 characters.
Such as, three-character doctrine string: 135223 ... 175.Split three-character doctrine string, split out 135,223 ... 175.
Step 502: the first two character string in each unit split out is converted to numeral and asks product with the 3rd numeral that character string converts to by software administration side, obtains the ASCII character that each unit is corresponding.
Here, for split out 135, use 13 × 5=65, obtain the ASCII character 65 that first unit is corresponding, for split out 223, use 22 × 3=66, obtain the ASCII character 66 that first unit is corresponding.By that analogy, until obtain ASCII character corresponding to last unit 85.
Step 503: software administration side's ASCII character that each unit is corresponding replaces this each unit, obtains the second character string.
Here, obtain the second character string to comprise: 6566 ... 85.
Step 504: ASCII character each in the second character string is converted to corresponding character by software administration side, obtains the first character string.
Here, because the second character string comprises: 6566 ... 85, will wherein 65,66 ... 85 replace with corresponding character respectively, obtain the first character string and comprise: AB ... U.
Step 308: software administration side utilizes the soft ware authorization application code of described first private key to the first character string forms to be decrypted, and obtains the identity information of user 1 and the hardware information of this software terminal.
Step 309: the identity information of software administration root according to user 1 and the hardware information of this software terminal, obtains soft ware authorization corresponding to active user and uses strategy.
Step 310: software administration side utilizes the second PKI to use strategy to be encrypted to the soft ware authorization obtained, and generates active coding, is designated as the active coding of the 7th character string forms.
Step 311: for the active coding of the 7th character string forms, software administration side carries out the encryption based on ASCII character.
See Fig. 6, the process of this step 311 can comprise:
Step 601: the original character preset on M position in the 7th character string is replaced with M substitute character by software administration side respectively.
Such as, the 7th character string comprises: #M ... ..K.
Step 602: M described original character is added the character string end after character replacement by software administration side, obtains the 6th character string.
In step 601 and step 602, M the position that M corresponding respectively for M substitute character ASCII character can be replaced as needs, that is, by in the 7th character string the 73rd, 78,83,80, original character (being such as ABCDEF) on 85,82 these 6 positions replaces with I, N respectively, S, P, U, R; Further, original character ABCDEF is added the end of the 7th character string.
Step 603: each character in the 6th character string is converted to ASCII character corresponding to this character by software administration side respectively, obtains the 5th character string.
Step 604: software administration side, to each ASCII character in the 5th character string, performs by this ASCII character divided by the prime number being greater than natural number 1 one by one according to prime number order from small to large, until obtain first business of dividing exactly.
Step 605: software administration policy is to each ASCII character in the 5th character string, prime number is asked the prime number of the result of business (i.e. first business of dividing exactly) and correspondence (namely obtain described first divide exactly business time, prime number as current divisor) replace ASCII character corresponding in the 5th character string, obtain the 4th character string.
Step 312: the active coding of the 4th character string forms is sent to software terminal by software administration side.
Step 313: the active coding of software terminal to the 4th character string forms received carries out the decryption processing based on ASCII character, obtains the active coding of the 7th character string forms.
See Fig. 7, based on the implementation procedure of above-mentioned steps 311, the implementation procedure of this step 313 can be the inverse process of process shown in Fig. 6, specifically comprises:
Step 701: software terminal, for the active coding of the 4th character string forms, is that a unit splits described 4th character string with every 3 characters.
Step 702: the first two character string in each unit split out is converted to numeral and asks product with the 3rd numeral that character string converts to by software terminal, obtains the ASCII character that each unit is corresponding.
Step 703: software terminal replaces each unit in the 4th character string by the ASCII character that each unit is corresponding, obtain the 5th character string.
Step 704: each ASCII character in the 5th character string is converted to corresponding character by software terminal, obtains the 6th character string.
Step 701 to process and above-mentioned steps 501 to the step 504 of step 704 process to realize principle identical.
Step 705: software terminal by the character on default M position in the 6th character string respectively correspondence replace with last M position character in the 6th character string, and delete this last M position character, obtain the 7th character string.
Corresponding to the process of step 601 and step 602, in this step 705, such as can comprise: by the 7th character string the 73rd, 78, I on 83,80,85,82 these 6 positions, N, S, P, U, R replace with last M position character A, B respectively, C, D, E, F, and, delete the ABCDEF of the 6th last M position of character string.
Step 314: software terminal utilizes the active coding of the second private key to the 7th character string forms to be decrypted.
Step 315: software terminal is resolved the active coding after deciphering, obtains the soft ware authorization corresponding to active user and uses strategy from active coding.
Step 316: software terminal uses strategy according to the soft ware authorization obtained, and carries out software initialization.
One embodiment of the invention also proposed a kind of software terminal, see Fig. 8, comprising:
First storage unit 801, for preserving the first PKI and the second private key;
Information collection unit 802, for collecting current user information;
Application processing unit 803, the first PKI preserved for utilizing described storage unit 801 is encrypted the described user profile collected by information collection unit 802, generates soft ware authorization application code, soft ware authorization application code is sent to software administration side;
Activate processing unit 804, for receiving the active coding from software administration side, the second private key utilizing the first storage unit 801 to preserve is decrypted active coding; Active coding after deciphering is resolved, from active coding, obtains the soft ware authorization corresponding to active user use strategy;
Authorisation process unit 805, for using strategy according to the soft ware authorization activating processing unit 804 acquisition, carries out software initialization.
In an embodiment of the invention, the soft ware authorization application code of described generation is the first character string forms; Then described application processing unit 803 comprises: the first encryption subelement and first sends subelement, wherein,
First encryption subelement, for the soft ware authorization application code of the first character string forms generated, is converted to ASCII character corresponding to this character respectively by each character in the first character string, obtains the second character string; Carrying out prime number respectively to each ASCII character in the second character string asks business to process; Use prime number to ask the result of business and the prime number of correspondence to replace ASCII character corresponding in the second character string, obtain three-character doctrine string;
First sends subelement, for the soft ware authorization application code of three-character doctrine string form is sent to software administration side;
Wherein,
First encryption subelement, when carrying out prime number to each ASCII character in the second character string respectively and asking business to process, specifically performs:
For each ASCII character described, perform one by one by this ASCII character divided by the prime number being greater than natural number 1 according to prime number order from small to large, until obtain first business of dividing exactly;
Prime number corresponding to described ASCII character asks the result of business to be: described first business of dividing exactly;
Described prime number asks prime number corresponding to the result of business to be: obtain described first divide exactly business time, as the prime number of current divisor.
In an embodiment of the invention, the active coding received described in is the 4th character string forms; Then described activation processing unit 804 comprises: the first decryption processing subelement and the second decryption processing subelement;
First decryption processing subelement, for the active coding for the 4th character string forms from software administration side received, is that a unit splits described 4th character string with every 3 characters; The first two character string in each unit split out is converted to numeral and ask product with the 3rd numeral that character string converts to, obtain the ASCII character that each unit is corresponding, replace this each unit by the ASCII character that each unit is corresponding, obtain the 5th character string; Each ASCII character in 5th character string is converted to corresponding character, obtains the 6th character string; By the character on default M position in the 6th character string respectively correspondence replace with last M position character in the 6th character string, and delete this last M position character, obtain the 7th character string;
Described second decryption processing subelement, is decrypted for utilizing the active coding of the second private key to the 7th character string forms.
One embodiment of the invention also proposed a kind of software administration side, see Fig. 9, comprising:
Delegated strategy setting unit 901, uses strategy for the soft ware authorization arranging its correspondence for each user respectively;
Second storage unit 902, for preserve corresponding to user use the first private key of the first PKI, and correspond to user use the second PKI of the second private key;
Receiving element 903, for receiving soft ware authorization application code;
Application code processing unit 904, described first private key utilizing the second storage unit 902 to preserve is decrypted the soft ware authorization application code that described receiving element 903 receives;
Delegated strategy transmission processing unit 905, for according to the user profile in the soft ware authorization application code after deciphering, obtains soft ware authorization corresponding to active user from described delegated strategy setting unit 901 and uses strategy; Described second PKI utilizing the second storage unit 902 to preserve uses strategy to be encrypted to the soft ware authorization obtained, and generates active coding; The active coding of generation is sent to software terminal.
In an embodiment of the invention, software administration side may further include: application code decoding unit, and described application code decoding unit is connected between described receiving element and described application code processing unit; Wherein,
Described receiving element receives the application code of three-character doctrine string form;
Described application code decoding unit, for the application code of three-character doctrine string form received for receiving element, is that a unit splits described three-character doctrine string with every 3 characters; The first two character string in each unit split out is converted to numeral and ask product with the 3rd numeral that character string converts to, obtain the ASCII character that each unit is corresponding, replace this each unit by the ASCII character that each unit is corresponding, obtain the second character string; ASCII character each in second character string is converted to corresponding character, obtains the first character string;
Described application code processing unit utilizes the active coding of the first private key to the first character string forms to be decrypted.
In an embodiment of the invention, in software administration side, described delegated strategy transmission processing unit 905 comprises:
First generates subelement, for generating the active coding of the 7th character string forms;
Second encryption subelement, for generating the active coding of the 7th character string forms that subelement generates for first, the original character preset on M position in 7th character string is replaced with a default M substitute character respectively, M described original character is added the 7th character string end, obtains the 6th character string; Each character in 6th character string is converted to ASCII character corresponding to this character respectively, obtains the 5th character string; Carrying out prime number respectively to each ASCII character in the 5th character string asks business to process; Asked by prime number the result of business and the prime number of correspondence to replace ASCII character corresponding in the 5th character string, obtain the 4th character string;
Second sends subelement, for the active coding of the 4th character string forms is sent to software terminal;
Wherein,
Described second encryption subelement carries out prime number respectively to each ASCII character in the 5th character string and asks business to process, and specifically performs:
For each ASCII character described, perform one by one by this ASCII character divided by the prime number being greater than natural number 1 according to prime number order from small to large, until obtain first business of dividing exactly;
Prime number corresponding to described ASCII character asks the result of business to be: described first business of dividing exactly;
Described prime number asks prime number corresponding to the result of business to be: obtain described first divide exactly business time, as the prime number of current divisor.
See Figure 10, one embodiment of the invention also proposed a kind of system of soft ware authorization, comprises any one software terminal of embodiment of the present invention proposition and any one software administration side of embodiment of the present invention proposition.
Each embodiment of the present invention at least has following beneficial effect:
1, the software authorization method that provides of the embodiment of the present invention and system, software terminal and software administration side, different soft ware authorizations can be set for different users and use strategy, the strategy of licensing of the software that each user obtains on software terminal is arranged targetedly for this user in advance, therefore, after carrying out software initialization according to this, then can realize the different authorizations of carrying out same software according to different user.
2, soft ware authorization can use policy information to be carried in active coding and send to software terminal by the embodiment of the present invention, and implementation is simple.
3, in the embodiment of the present invention, can based on the hardware information of user software terminal, any one or more in the hard disk of such as Current software terminal, network interface card, memory information generate application code, therefore improve the security of mutual application code.
4, in the embodiment of the present invention, the PKI that two covers can be used different and private key carry out encryption and decryption to mutual application code and active coding, this improves the security of reciprocal process.
5, in the embodiment of the present invention, can not only to use public-key and the mode of private key carries out encryption and decryption to mutual application code and active coding, the mode based on ASCII character can also be adopted further to carry out complicated encryption and decryption process to application code and active coding, further increase the security of reciprocal process.
6, in the embodiment of the present invention, in order to improve the security of information interaction further, the cipher mode carried out based on ASCII character for application code is not identical with the cipher mode carried out based on ASCII character for active coding, such as, carry out in the cipher mode based on ASCII character for active coding, M substitute character can be replaced with respectively to the original character of a default M position further, and M described original character is added character string end, thus further increase the security of encryption.
It should be noted that, in this article, the relational terms of such as first and second and so on is only used for an entity or operation to separate with another entity or operational zone, and not necessarily requires or imply the relation that there is any this reality between these entities or operation or sequentially.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, article or equipment and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, article or equipment.When not more restrictions, the key element " being comprised a 〃 〃 〃 〃 〃 〃 " limited by statement, and be not precluded within process, method, article or the equipment comprising described key element and also there is other same factor.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment made, equivalent replacement, improvement etc., all should be included within the scope of protection of the invention.

Claims (10)

1. a software authorization method, is characterized in that, is applied in software terminal, preserves the first PKI and the second private key; Also comprise:
Collect current user information;
Utilize the first PKI to be encrypted described user profile, generate soft ware authorization application code;
Soft ware authorization application code is sent to software administration side;
Receive the active coding from software administration side, utilize the second private key to be decrypted active coding;
Active coding after deciphering is resolved, from active coding, obtains the soft ware authorization corresponding to active user use strategy;
Use strategy according to the soft ware authorization obtained, carry out software initialization.
2. method according to claim 1, is characterized in that,
Described current user information comprises: any one or more in the hard disk of Current software terminal, network interface card, memory information; And/or, the identity information of current user;
And/or,
Described soft ware authorization uses strategy to comprise: any one or more in software function module authority, authorization type, the term of validity.
3. method according to claim 1 and 2, is characterized in that,
The soft ware authorization application code of described generation is the first character string forms; Then after described generation soft ware authorization application code, and described soft ware authorization application code sent to software administration side before, comprise further:
For the soft ware authorization application code of the first character string forms generated, each character in the first character string is converted to ASCII character corresponding to this character respectively, obtains the second character string;
Carrying out prime number respectively to each ASCII character in the second character string asks business to process;
Asked by prime number the result of business and the prime number of correspondence to replace ASCII character corresponding in the second character string, obtain three-character doctrine string;
Describedly software administration side is sent to comprise soft ware authorization application code: the soft ware authorization application code of three-character doctrine string form is sent to software administration side.
Wherein,
Describedly prime number carried out respectively to each ASCII character in the second character string ask business to process to comprise:
For each ASCII character described, perform one by one by this ASCII character divided by the prime number being greater than natural number 1 according to prime number order from small to large, until obtain first business of dividing exactly;
Prime number corresponding to described ASCII character asks the result of business to be: described first business of dividing exactly;
Described prime number asks prime number corresponding to the result of business to be: obtain described first divide exactly business time, as the prime number of current divisor;
And/or,
The described active coding received is the 4th character string forms; Then after the active coding of described reception from software administration side, and utilize before the second private key is decrypted active coding described, comprise further:
For the active coding of the 4th character string forms from software administration side received, be that a unit splits described 4th character string with every 3 characters;
The first two character string in each unit split out is converted to numeral and ask product with the 3rd numeral that character string converts to, obtain the ASCII character that each unit is corresponding, replace this each unit by the ASCII character that each unit is corresponding, obtain the 5th character string;
Each ASCII character in 5th character string is converted to corresponding character, obtains the 6th character string;
By the character on default M position in the 6th character string respectively correspondence replace with last M position character in the 6th character string, and delete this last M position character, obtain the 7th character string;
Describedly utilize the second private key to be decrypted active coding to comprise: utilize the active coding of the second private key to the 7th character string forms to be decrypted.
4. a software authorization method, is characterized in that, is applied to software administration side, and the soft ware authorization arranging its correspondence for each user respectively uses strategy; Preserve and correspond to user institute and use the first private key of the first PKI, and corresponding to user use the second PKI of the second private key, also comprise:
Receive soft ware authorization application code;
Described first private key is utilized to be decrypted soft ware authorization application code;
According to the user profile in the soft ware authorization application code after deciphering, obtain soft ware authorization corresponding to active user and use strategy;
Utilize described second PKI to use strategy to be encrypted to the soft ware authorization obtained, generate active coding;
The active coding of generation is sent to software terminal.
5. method according to claim 4, is characterized in that,
The described application code received is three-character doctrine string form; Then after described reception soft ware authorization application code, and utilize before described first private key is decrypted soft ware authorization application code described, comprise further:
For the application code of the three-character doctrine string form received, be that a unit splits described three-character doctrine string with every 3 characters;
The first two character string in each unit split out is converted to numeral and ask product with the 3rd numeral that character string converts to, obtain the ASCII character that each unit is corresponding, replace this each unit by the ASCII character that each unit is corresponding, obtain the second character string;
ASCII character each in second character string is converted to corresponding character, obtains the first character string;
Describedly utilize described first private key to be decrypted soft ware authorization application code to comprise: utilize the active coding of the first private key to the first character string forms to be decrypted;
And/or,
The active coding of described generation is the 7th character string forms; Then after described generation active coding, and before the described active coding by generation sends to software terminal, comprise further:
For the active coding of the 7th character string forms, the original character preset on M position in the 7th character string is replaced with a default M substitute character respectively, M described original character is added the end of the character string after character replacement, obtain the 6th character string;
Each character in 6th character string is converted to ASCII character corresponding to this character respectively, obtains the 5th character string;
Carrying out prime number respectively to each ASCII character in the 5th character string asks business to process;
Asked by prime number the result of business and the prime number of correspondence to replace ASCII character corresponding in the 5th character string, obtain the 4th character string;
The described active coding by generation sends to software terminal to comprise: the active coding of the 4th character string forms is sent to software terminal.
Wherein,
Describedly prime number carried out respectively to each ASCII character in the 5th character string ask business to process to comprise:
For each ASCII character described, perform one by one by this ASCII character divided by the prime number being greater than natural number 1 according to prime number order from small to large, until obtain first business of dividing exactly;
Prime number corresponding to described ASCII character asks the result of business to be: described first business of dividing exactly;
Described prime number asks prime number corresponding to the result of business to be: obtain described first divide exactly business time, as the prime number of current divisor.
6. a software terminal, is characterized in that, comprising:
First storage unit, for preserving the first PKI and the second private key;
Information collection unit, for collecting current user information;
Application processing unit, the first PKI preserved for utilizing described storage unit is encrypted the described user profile collected by information collection unit, generates soft ware authorization application code, soft ware authorization application code is sent to software administration side;
Activating processing unit, for receiving the active coding from software administration side, utilizing the second private key to be decrypted active coding; Active coding after deciphering is resolved, from active coding, obtains the soft ware authorization corresponding to active user use strategy;
Authorisation process unit, for using strategy according to the soft ware authorization obtained, carries out software initialization.
7. software terminal according to claim 6, is characterized in that,
The soft ware authorization application code of described generation is the first character string forms; Then described application processing unit comprises: the first encryption subelement and first sends subelement, wherein,
First encryption subelement, for the soft ware authorization application code of the first character string forms generated, is converted to ASCII character corresponding to this character respectively by each character in the first character string, obtains the second character string; Carrying out prime number respectively to each ASCII character in the second character string asks business to process; Asked by prime number the result of business and the prime number of correspondence to replace ASCII character corresponding in the second character string, obtain three-character doctrine string;
First sends subelement, for the soft ware authorization application code of three-character doctrine string form is sent to software administration side;
Wherein,
First encryption subelement, when carrying out prime number to each ASCII character in the second character string respectively and asking business to process, specifically performs:
For each ASCII character described, perform one by one by this ASCII character divided by the prime number being greater than natural number 1 according to prime number order from small to large, until obtain first business of dividing exactly;
Prime number corresponding to described ASCII character asks the result of business to be: described first business of dividing exactly;
Described prime number asks prime number corresponding to the result of business to be: obtain described first divide exactly business time, as the prime number of current divisor.
And/or,
The described active coding received is the 4th character string forms; Then described activation processing unit comprises: the first decryption processing subelement and the second decryption processing subelement;
First decryption processing subelement, for the active coding for the 4th character string forms from software administration side received, is that a unit splits described 4th character string with every 3 characters; The first two character string in each unit split out is converted to numeral and ask product with the 3rd numeral that character string converts to, obtain the ASCII character that each unit is corresponding, replace this each unit by the ASCII character that each unit is corresponding, obtain the 5th character string; Each ASCII character in 5th character string is converted to corresponding character, obtains the 6th character string; By the character on default M position in the 6th character string respectively correspondence replace with last M position character in the 6th character string, and delete this last M position character, obtain the 7th character string;
Described second decryption processing subelement, is decrypted for utilizing the active coding of the second private key to the 7th character string forms.
8. a software administration side, is characterized in that, comprising:
Delegated strategy setting unit, uses strategy for the soft ware authorization arranging its correspondence for each user respectively;
Second storage unit, for preserve corresponding to user use the first private key of the first PKI, and correspond to user use the second PKI of the second private key;
Receiving element, for receiving soft ware authorization application code;
Application code processing unit, utilizes described first private key to be decrypted the soft ware authorization application code that described receiving element receives;
Delegated strategy transmission processing unit, for according to the user profile in the soft ware authorization application code after deciphering, obtains soft ware authorization corresponding to active user and uses strategy; Utilize described second PKI to use strategy to be encrypted to the soft ware authorization obtained, generate active coding; The active coding of generation is sent to software terminal.
9. software administration side according to claim 8, is characterized in that, comprises further: application code decoding unit, and described application code decoding unit is connected between described receiving element and described application code processing unit; Wherein,
Described receiving element receives the application code of three-character doctrine string form;
Described application code decoding unit, for the application code of three-character doctrine string form received for receiving element, is that a unit splits described three-character doctrine string with every 3 characters; The first two character string in each unit split out is converted to numeral and ask product with the 3rd numeral that character string converts to, obtain the ASCII character that each unit is corresponding, replace this each unit by the ASCII character that each unit is corresponding, obtain the second character string; ASCII character each in second character string is converted to corresponding character, obtains the first character string;
Described application code processing unit utilizes the active coding of the first private key to the first character string forms to be decrypted;
And/or,
Described delegated strategy transmission processing unit comprises:
First generates subelement, for generating the active coding of the 7th character string forms;
Second encryption subelement, for generating the active coding of the 7th character string forms that subelement generates for first, the original character preset on M position in 7th character string is replaced with a default M substitute character respectively, M described original character is added the end of the character string after character replacement, obtain the 6th character string; Each character in 6th character string is converted to ASCII character corresponding to this character respectively, obtains the 5th character string; Carrying out prime number respectively to each ASCII character in the 5th character string asks business to process; Asked by prime number the result of business and the prime number of correspondence to replace ASCII character corresponding in the 5th character string, obtain the 4th character string;
Second sends subelement, for the active coding of the 4th character string forms is sent to software terminal.
Wherein,
Described second encryption subelement carries out prime number respectively to each ASCII character in the 5th character string and asks business to process, and specifically performs:
For each ASCII character described, perform one by one by this ASCII character divided by the prime number being greater than natural number 1 according to prime number order from small to large, until obtain first business of dividing exactly;
Prime number corresponding to described ASCII character asks the result of business to be: described first business of dividing exactly;
Described prime number asks prime number corresponding to the result of business to be: obtain described first divide exactly business time, as the prime number of current divisor.
10. a software authorization system, is characterized in that,
Comprise software terminal as claimed in claims 6 or 7, and software administration side as claimed in claim 8 or 9.
CN201510394604.3A 2015-09-08 2015-09-08 A kind of software authorization method and system, software terminal and software manager Active CN105160210B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510394604.3A CN105160210B (en) 2015-09-08 2015-09-08 A kind of software authorization method and system, software terminal and software manager

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510394604.3A CN105160210B (en) 2015-09-08 2015-09-08 A kind of software authorization method and system, software terminal and software manager

Publications (2)

Publication Number Publication Date
CN105160210A true CN105160210A (en) 2015-12-16
CN105160210B CN105160210B (en) 2017-11-03

Family

ID=54801066

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510394604.3A Active CN105160210B (en) 2015-09-08 2015-09-08 A kind of software authorization method and system, software terminal and software manager

Country Status (1)

Country Link
CN (1) CN105160210B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106778084A (en) * 2016-11-18 2017-05-31 畅捷通信息技术股份有限公司 Software activation method and device and software activation system
CN107341370A (en) * 2016-04-28 2017-11-10 北京北方华创微电子装备有限公司 The authorization method and system of a kind of hardware device
CN107392005A (en) * 2017-05-31 2017-11-24 广东网金控股股份有限公司 A kind of Activiation method and system of business finance terminal device
CN107491955A (en) * 2016-06-13 2017-12-19 邓斌涛 Encryption method, authentication and the electronic fare payment system and method for mobile terminal
CN108124480A (en) * 2016-12-27 2018-06-05 深圳配天智能技术研究院有限公司 A kind of software authorization method, system and equipment
CN108183887A (en) * 2017-12-12 2018-06-19 杭州安恒信息技术有限公司 It is a kind of based on the high in the clouds vulnerability scanning tactics configuring method independently authorized and device
CN108548271A (en) * 2018-04-17 2018-09-18 奥克斯空调股份有限公司 Air conditioning monitoring and the method and system of debugging software mandate
CN110348181A (en) * 2019-07-15 2019-10-18 广东名阳信息科技有限公司 A kind of method of verification software right to use legitimacy
CN111274553A (en) * 2020-01-20 2020-06-12 深圳市米勒沙容达汽车科技有限公司 Automatic software authorization method and system, server and terminal equipment
CN113536238A (en) * 2021-06-29 2021-10-22 上海浩霖汇信息科技有限公司 Software use authorization authentication method and system based on cryptographic technology and related products

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070238450A1 (en) * 2006-04-07 2007-10-11 Lena Hogberg Software activation in a mobile terminal
CN101877702A (en) * 2010-05-20 2010-11-03 中兴通讯股份有限公司 Method and system for activating and authenticating an internet protocol television client
CN103065071A (en) * 2012-12-14 2013-04-24 北京思特奇信息技术股份有限公司 Software copyright control method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070238450A1 (en) * 2006-04-07 2007-10-11 Lena Hogberg Software activation in a mobile terminal
CN101877702A (en) * 2010-05-20 2010-11-03 中兴通讯股份有限公司 Method and system for activating and authenticating an internet protocol television client
CN103065071A (en) * 2012-12-14 2013-04-24 北京思特奇信息技术股份有限公司 Software copyright control method and system

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107341370A (en) * 2016-04-28 2017-11-10 北京北方华创微电子装备有限公司 The authorization method and system of a kind of hardware device
CN107341370B (en) * 2016-04-28 2019-10-29 北京北方华创微电子装备有限公司 A kind of authorization method and system of hardware device
CN107491955A (en) * 2016-06-13 2017-12-19 邓斌涛 Encryption method, authentication and the electronic fare payment system and method for mobile terminal
CN106778084A (en) * 2016-11-18 2017-05-31 畅捷通信息技术股份有限公司 Software activation method and device and software activation system
CN108124480A (en) * 2016-12-27 2018-06-05 深圳配天智能技术研究院有限公司 A kind of software authorization method, system and equipment
CN108124480B (en) * 2016-12-27 2022-01-11 深圳配天智能技术研究院有限公司 Software authorization method, system and equipment
CN107392005A (en) * 2017-05-31 2017-11-24 广东网金控股股份有限公司 A kind of Activiation method and system of business finance terminal device
CN108183887B (en) * 2017-12-12 2020-12-29 杭州安恒信息技术股份有限公司 Cloud vulnerability scanning strategy configuration method and device based on autonomous authorization
CN108183887A (en) * 2017-12-12 2018-06-19 杭州安恒信息技术有限公司 It is a kind of based on the high in the clouds vulnerability scanning tactics configuring method independently authorized and device
CN108548271A (en) * 2018-04-17 2018-09-18 奥克斯空调股份有限公司 Air conditioning monitoring and the method and system of debugging software mandate
CN108548271B (en) * 2018-04-17 2020-04-21 奥克斯空调股份有限公司 Method and system for air conditioner monitoring and debugging software authorization
CN110348181A (en) * 2019-07-15 2019-10-18 广东名阳信息科技有限公司 A kind of method of verification software right to use legitimacy
CN111274553A (en) * 2020-01-20 2020-06-12 深圳市米勒沙容达汽车科技有限公司 Automatic software authorization method and system, server and terminal equipment
CN113536238A (en) * 2021-06-29 2021-10-22 上海浩霖汇信息科技有限公司 Software use authorization authentication method and system based on cryptographic technology and related products

Also Published As

Publication number Publication date
CN105160210B (en) 2017-11-03

Similar Documents

Publication Publication Date Title
CN105160210A (en) Software authorization method and system, software terminal and software management party
CN106548345B (en) Method and system for realizing block chain private key protection based on key partitioning
CN107465689B (en) Key management system and method of virtual trusted platform module in cloud environment
CN101789865B (en) Dedicated server used for encryption and encryption method
CN102377564B (en) Method and device for encrypting private key
CN110650010B (en) Method, device and equipment for generating and using private key in asymmetric key
CN106603246B (en) A kind of SM2 digital signature segmentation generation method and system
CN103138938B (en) Based on SM2 certificate request and the application process of CSP
US20130028419A1 (en) System and a method for use in a symmetric key cryptographic communications
CN102571329B (en) Password key management
CN105260668A (en) File encryption method and electronic device
CN105162772A (en) IoT equipment authentication and key agreement method and device
KR20060014356A (en) Apparatus and method for encryption and decryption
CN101166088A (en) Encryption and decryption method based on user identity identifier
Memon et al. Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC)
CN105553654A (en) Key information query processing method and device and key information management system
CN106603231A (en) Distributed SM2 digital signature generation method and system based on de-secrecy
CN109194474A (en) A kind of data transmission method and device
CN111526007B (en) Random number generation method and system
CN110635912B (en) Data processing method and device
CN105100085A (en) Information encryption and decryption methods and devices
CN110912682A (en) Data processing method, device and system
CN111400728A (en) Data encryption and decryption method and device applied to block chain
JP2010011109A (en) Authentication unit, authentication terminal, authentication system, authentication method, and program
CN104980269A (en) Secret key sharing method, device and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant