CN105160210B - A kind of software authorization method and system, software terminal and software manager - Google Patents

A kind of software authorization method and system, software terminal and software manager Download PDF

Info

Publication number
CN105160210B
CN105160210B CN201510394604.3A CN201510394604A CN105160210B CN 105160210 B CN105160210 B CN 105160210B CN 201510394604 A CN201510394604 A CN 201510394604A CN 105160210 B CN105160210 B CN 105160210B
Authority
CN
China
Prior art keywords
character
character string
prime number
unit
software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510394604.3A
Other languages
Chinese (zh)
Other versions
CN105160210A (en
Inventor
曹雪韬
刘振印
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur General Software Co Ltd
Original Assignee
Inspur General Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur General Software Co Ltd filed Critical Inspur General Software Co Ltd
Priority to CN201510394604.3A priority Critical patent/CN105160210B/en
Publication of CN105160210A publication Critical patent/CN105160210A/en
Application granted granted Critical
Publication of CN105160210B publication Critical patent/CN105160210B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software

Abstract

The present invention provides a kind of software authorization method and system, software terminal and software manager.One of which software authorization method is applied in software terminal, including:Preserve the first public key and the second private key;Collect current user information;The user profile is encrypted using the first public key, soft ware authorization application code is generated;Soft ware authorization application code is sent to software manager;The active coding from software manager is received, active coding is decrypted using the second private key;Active coding after decryption is parsed, the soft ware authorization obtained from active coding corresponding to active user uses strategy;According to the soft ware authorization of acquisition using strategy, software initialization is carried out.This programme can improve the flexibility of soft ware authorization management.

Description

A kind of software authorization method and system, software terminal and software manager
Technical field
The present invention relates to computer technology, more particularly to a kind of software authorization method and system, software terminal and software pipe Reason side.
Background technology
With the development of computer technology, the species of computer software is more and more, and function is also stronger and stronger.At one On computer, after software product installation, software can be when first logging into or upgrading, it is necessary to obtain software manager Authorize, after authorizing successfully, software could normally be run on computers, so as to complete corresponding software function.
Current soft ware authorization mode includes:Authorization requests are sent to software manager by software installation terminal;Software pipe Reason side is authenticated to software installation terminal, it is legal after, authorization message is returned into software installation terminal.It can be seen that, current is soft Part authorization function is single, it is impossible to improve the flexibility of soft ware authorization management.
The content of the invention
The present invention provides a kind of software authorization method and system, software terminal and software manager, it is possible to increase software is awarded Weigh the flexibility of management.
A kind of software authorization method, applied in software terminal, preserves the first public key and the second private key;Also include:
Collect current user information;
The user profile is encrypted using the first public key, soft ware authorization application code is generated;
Soft ware authorization application code is sent to software manager;
The active coding from software manager is received, active coding is decrypted using the second private key;
Active coding after decryption is parsed, the soft ware authorization obtained from active coding corresponding to active user uses plan Slightly;
According to the soft ware authorization of acquisition using strategy, software initialization is carried out.
The current user information includes:In the hard disk of Current software terminal, network interface card, memory information any one or it is many It is individual;And/or, the identity information of currently used person;
And/or,
The soft ware authorization is included using strategy:Any one in software function module authority, authorization type, the term of validity Or it is multiple.
The soft ware authorization application code of the generation is the first character string forms;Then the generation soft ware authorization application code it Afterwards, and it is described soft ware authorization application code is sent to software manager before, further comprise:
For the soft ware authorization application code of the first character string forms of generation, each character in the first character string is distinguished The corresponding ASCII character of the character is converted to, the second character string is obtained;
Carrying out prime number respectively to each ASCII character in the second character string asks business to handle;
Result and corresponding prime number that prime number asks business are replaced into corresponding ASCII character in the second character string, the 3rd word is obtained Symbol string;
It is described soft ware authorization application code is sent to software manager to include:By the soft ware authorization Shen of the 3rd character string forms Please code be sent to software manager;
Wherein,
Described each ASCII character in the second character string carries out prime number and asks business's processing to include respectively:
For each described ASCII character, performed the ASCII character divided by big one by one according to the order of prime number from small to large In the prime number of natural number 1, until obtaining first business divided exactly;
The corresponding prime number of the ASCII character asks the result of business to be:Described first business divided exactly;
The prime number asks the corresponding prime number of the result of business to be:When obtaining described first business divided exactly, current divisor is used as Prime number.
The active coding received is the 4th character string forms;Then in the active coding of the reception from software manager Afterwards, and before active coding is decrypted the second private key of the utilization, further comprise:
For the active coding of the 4th character string forms from software manager received, using every 3 characters as one Unit splits the 4th character string;
The first two character string in each unit split out is converted into the numeral that numeral is converted into the 3rd character string Product is sought, the corresponding ASCII character of each unit is obtained, each unit is replaced with the corresponding ASCII character of each unit, is obtained Five character strings;
Each ASCII character in 5th character string is converted into corresponding character, the 6th character string is obtained;
Character on default M position in 6th character string is corresponded to respectively and replaces with the 6th character string finally M Character, and the last M character is deleted, obtain the 7th character string;
It is described using the second private key active coding is decrypted including:The 7th character string forms are swashed using the second private key Code living is decrypted.
A kind of software authorization method, is that each user sets its corresponding soft ware authorization respectively applied to software manager Use strategy;Preservation uses the first private key of the first public key corresponding to user, and uses the second private key corresponding to user The second public key, in addition to:
Receive soft ware authorization application code;
Soft ware authorization application code is decrypted using first private key;
According to the user profile in the soft ware authorization application code after decryption, obtain the corresponding soft ware authorization of active user and use Strategy;
The soft ware authorization of acquisition is encrypted using strategy using second public key, active coding is generated;
The active coding of generation is sent to software terminal.
The application code received is the 3rd character string forms;Then after the reception soft ware authorization application code, and Before soft ware authorization application code is decrypted the utilization first private key, further comprise:
For the application code of the 3rd character string forms received, the described 3rd is split by a unit of every 3 characters Character string;
The first two character string in each unit split out is converted into the numeral that numeral is converted into the 3rd character string Product is sought, the corresponding ASCII character of each unit is obtained, each unit is replaced with the corresponding ASCII character of each unit, is obtained Two character strings;
Each ASCII character in second character string is converted into corresponding character, the first character string is obtained;
It is described using first private key soft ware authorization application code is decrypted including:Using the first private key to the first word The active coding of symbol string form is decrypted.
The active coding of the generation is the 7th character string forms;Then after the generation active coding, and described by life Into active coding be sent to before software terminal, further comprise:
For the active coding of the 7th character string forms, the original character preset in the 7th character string on M position is distinguished Default M substitute character is replaced with, the M original characters are added into the 7th character string end, the 6th character string is obtained;
Each character in 6th character string is respectively converted into the corresponding ASCII character of the character, the 5th character string is obtained;
Carrying out prime number respectively to each ASCII character in the 5th character string asks business to handle;
Result and corresponding prime number that prime number asks business are replaced into corresponding ASCII character in the 5th character string, the 4th word is obtained Symbol string;
It is described the active coding of generation is sent to software terminal to include:The active coding of 4th character string forms is sent To software terminal.
Wherein,
Described each ASCII character in the 5th character string carries out prime number and asks business's processing to include respectively:
For each described ASCII character, performed the ASCII character divided by big one by one according to the order of prime number from small to large In the prime number of natural number 1, until obtaining first business divided exactly;
The corresponding prime number of the ASCII character asks the result of business to be:Described first business divided exactly;
The prime number asks the corresponding prime number of the result of business to be:When obtaining described first business divided exactly, current divisor is used as Prime number.
A kind of software terminal, including:
First storage unit, for preserving the first public key and the second private key;
Information collection unit, for collecting current user information;
Apply for processing unit, for the first public key using storage unit preservation to collected by information collection unit The user profile is encrypted, and generates soft ware authorization application code, soft ware authorization application code is sent into software manager;
Processing unit is activated, for receiving the active coding from software manager, active coding is carried out using the second private key Decryption;Active coding after decryption is parsed, the soft ware authorization obtained from active coding corresponding to active user uses strategy;
Authorisation process unit, for, using strategy, carrying out software initialization according to the soft ware authorization of acquisition.
The soft ware authorization application code of the generation is the first character string forms;Then the application processing unit includes:The One encryption subelement and the first transmission sub-unit, wherein,
First encryption subelement, for the soft ware authorization application code of the first character string forms of generation, by the first word Each character is respectively converted into the corresponding ASCII character of the character in symbol string, obtains the second character string;To in the second character string Each ASCII character carries out prime number and asks business to handle respectively;Result and corresponding prime number that prime number asks business are replaced into the second character string In corresponding ASCII character, obtain the 3rd character string;
First transmission sub-unit, for the soft ware authorization application code of the 3rd character string forms to be sent into software manager;
Wherein,
Each ASCII character of first encryption subelement in the second character string carries out prime number and asks business to handle respectively When, it is specific to perform:
For each described ASCII character, performed the ASCII character divided by big one by one according to the order of prime number from small to large In the prime number of natural number 1, until obtaining first business divided exactly;
The corresponding prime number of the ASCII character asks the result of business to be:Described first business divided exactly;
The prime number asks the corresponding prime number of the result of business to be:When obtaining described first business divided exactly, current divisor is used as Prime number.
The active coding received is the 4th character string forms;Then the activation processing unit includes:First decryption Handle subelement and the second decryption processing subelement;
First decryption processing subelement, for swashing for the 4th character string forms from software manager for receiving Code living, the 4th character string is split by a unit of every 3 characters;By the first two character string in each unit split out It is converted into the digital numeral being converted into the 3rd character string and seeks product, obtains the corresponding ASCII character of each unit, use each list The corresponding ASCII character in position replaces each unit, obtains the 5th character string;Each ASCII character in 5th character string is converted to Corresponding character, obtains the 6th character string;Character on default M position in 6th character string is corresponded to respectively and replaces with the Last M characters in six character strings, and the last M character is deleted, obtain the 7th character string;
The second decryption processing subelement, for being solved using the second private key to the active coding of the 7th character string forms It is close.
A kind of software manager, including:
Delegated strategy setting unit, for setting its corresponding soft ware authorization to use strategy respectively for each user;
Second storage unit, corresponds to the first private key that user uses the first public key for preserving, and corresponding to use Family uses the second public key of the second private key;
Receiving unit, for receiving soft ware authorization application code;
Application code processing unit, is entered using first private key to the soft ware authorization application code that the receiving unit is received Row decryption;
Delegated strategy sends processing unit, for the user profile in the soft ware authorization application code after decryption, obtains The corresponding soft ware authorization of active user uses strategy;The soft ware authorization of acquisition is added using strategy using second public key It is close, generate active coding;The active coding of generation is sent to software terminal.
Software manager may further include:Application code decoding unit, the application code decoding unit is connected to described Between receiving unit and the application code processing unit;Wherein,
The receiving unit receives the application code of the 3rd character string forms;
The application code decoding unit, for the application code of the 3rd character string forms received for receiving unit, with Every 3 characters are that a unit splits the 3rd character string;The first two character string in each unit split out is converted into The numeral that numeral is converted into the 3rd character string seeks product, obtains the corresponding ASCII character of each unit, with each unit correspondence ASCII character replace each unit, obtain the second character string;Each ASCII character in second character string is converted to corresponding Character, obtains the first character string;
The active coding of the first character string forms is decrypted using the first private key for the application code processing unit.
In software manager, the delegated strategy, which sends processing unit, to be included:
First generation subelement, the active coding for generating the 7th character string forms;
Second encryption subelement, for the activation of the 7th character string forms generated for the first generation subelement Code, default M substitute character is replaced with by the original character on M position is preset in the 7th character string respectively, described by M Original character adds the 7th character string end, obtains the 6th character string;Each character in 6th character string is respectively converted into The corresponding ASCII character of the character, obtains the 5th character string;Prime number is carried out respectively to each ASCII character in the 5th character string Business is asked to handle;Result and corresponding prime number that prime number asks business are replaced into corresponding ASCII character in the 5th character string, the 4th word is obtained Symbol string;
Second transmission sub-unit, for the active coding of the 4th character string forms to be sent into software terminal.
Wherein,
The second encryption subelement carries out prime number to each ASCII character in the 5th character string and asked at business respectively Reason is specific to perform:
For each described ASCII character, performed the ASCII character divided by big one by one according to the order of prime number from small to large In the prime number of natural number 1, until obtaining first business divided exactly;
The corresponding prime number of the ASCII character asks the result of business to be:Described first business divided exactly;
The prime number asks the corresponding prime number of the result of business to be:When obtaining described first business divided exactly, current divisor is used as Prime number.
A kind of software authorization system, including any one above-mentioned software terminal, and above-mentioned any one software manager.
Software authorization method provided in an embodiment of the present invention and system, software terminal and software manager, can be for not With user different soft ware authorizations are set using strategy, the software that each user obtains on software terminal is licensed Strategy is all targetedly set for the user in advance, therefore, is carried out according to this after software initialization, then can be realized basis Different user carries out the different mandates of same software.And it is possible to which soft ware authorization is carried in active coding using policy information Software terminal is sent to, implementation is simple.
Brief description of the drawings
Fig. 1 is the flow chart for realizing soft ware authorization in one embodiment of the invention in software terminal.
Fig. 2 is the flow chart for realizing soft ware authorization in another embodiment of the present invention in software manager.
Fig. 3 is that software terminal and software manager are carried out using multi-enciphering technology with merging in one embodiment of the invention The flow chart of soft ware authorization process.
Fig. 4 is that soft ware authorization application code is encrypted based on ASCII character for software terminal in one embodiment of the invention Flow chart.
Fig. 5 is that soft ware authorization application code is decrypted based on ASCII character by software manager in one embodiment of the invention Flow chart.
Fig. 6 is the flow chart that active coding is encrypted based on ASCII character by software manager in one embodiment of the invention.
Fig. 7 is the flow chart that active coding is decrypted based on ASCII character for software terminal in one embodiment of the invention.
Fig. 8 is the structural representation of software terminal in one embodiment of the invention.
Fig. 9 is the structural representation of software manager in one embodiment of the invention.
Figure 10 is the structural representation of software authorization system in one embodiment of the invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described.Obviously, described embodiment is only a part of embodiment of the invention, rather than whole embodiments.Based on this Embodiment in invention, the every other reality that those of ordinary skill in the art are obtained under the premise of creative work is not made Example is applied, the scope of protection of the invention is belonged to.
One embodiment of the invention proposes a kind of software authorization method, applied in software terminal, referring to Fig. 1, the party Method includes:
Step 101:The first public key and the second private key are preserved in software terminal.
Step 102:Software terminal collects current user information.
Step 103:The user profile is encrypted using the first public key for software terminal, generates soft ware authorization application Code.
Step 104:Soft ware authorization application code is sent to software manager.
Step 105:The active coding from software manager is received, active coding is decrypted using the second private key.
Step 106:Active coding after decryption is parsed, the software obtained from active coding corresponding to active user is awarded Power uses strategy.
Step 107:According to the soft ware authorization of acquisition using strategy, software initialization is carried out.
It can be seen that, the embodiment shown in Fig. 1 can set different soft ware authorizations using strategy for different users, each The strategy of licensing for the software that individual user obtains on software terminal is all targetedly set for the user in advance, because This, is carried out after software initialization according to this, then can realize that carrying out the different of same software according to different user authorizes.Also, can Software terminal is sent in active coding so that soft ware authorization to be carried using policy information, implementation is simple.
In an embodiment of the invention, the current user information includes:It is the hard disk of Current software terminal, network interface card, interior Deposit any one or more in information;And/or, the identity information of currently used person.That is, software terminal can be based on Hardware information generate application code, identify user.Can also simultaneously or it is different when the identity information based on user of service come Generate application code.Thereby it is ensured that the authenticity and validity of application code.
In an embodiment of the invention, the soft ware authorization is included using strategy:Software function module authority, Authorization class It is any one or more in type, the term of validity.
In the embodiment of the present invention shown in Fig. 1, in order to ensure the security of application code, the first public key is used to application code Encrypted.In one embodiment of the invention, in order to further improve the security that application code is interacted, after encryption Application code, can also further carry out the following encryption based on ASCII character:
In step 103, the soft ware authorization application code of the generation is the first character string forms;Then raw described in step 103 Into after soft ware authorization application code, and before soft ware authorization application code is sent into software manager described in step 104, enter one Step includes:
For the soft ware authorization application code of the first character string forms of generation, each character in the first character string is distinguished The corresponding ASCII character of the character is converted to, the second character string is obtained;
Carrying out prime number respectively to each ASCII character in the second character string asks business to handle;
Result and corresponding prime number that prime number asks business are replaced into corresponding ASCII character in the second character string, the 3rd word is obtained Symbol string;
It is that the soft ware authorization application code of the 3rd character string forms is sent to software manager in step 104;
Wherein,
Described each ASCII character in the second character string carries out prime number and asks business's processing to include respectively:
For each described ASCII character, performed the ASCII character divided by big one by one according to the order of prime number from small to large In the prime number of natural number 1, until obtaining first business divided exactly;
The corresponding prime number of the ASCII character asks the result of business to be:Described first business divided exactly;
The prime number asks the corresponding prime number of the result of business to be:When obtaining described first business divided exactly, current divisor is used as Prime number.
, can be right in software manager side in order to ensure the security of active coding in the embodiment of the present invention shown in Fig. 1 Active coding has carried out the encryption based on ASCII character, correspondingly, in software terminal, further can also carry out at following decryption Reason:
The active coding received described in step 105 is the 4th character string forms;Then the reception comes from step 105 After the active coding of software manager, and before active coding is decrypted the second private key of the utilization, further comprise:
For the active coding of the 4th character string forms from software manager received, using every 3 characters as one Unit splits the 4th character string;
The first two character string in each unit split out is converted into the numeral that numeral is converted into the 3rd character string Product is sought, the corresponding ASCII character of each unit is obtained, each unit is replaced with the corresponding ASCII character of each unit, is obtained Five character strings;
Each ASCII character in 5th character string is converted into corresponding character, the 6th character string is obtained;
Character on default M position in 6th character string is corresponded to respectively and replaces with the 6th character string finally M Character, and the last M character is deleted, obtain the 7th character string;
It is that the active coding of the 7th character string forms is decrypted using the second private key in step 105.
One embodiment of the invention also proposed a kind of software authorization method, applied to software manager, referring to Fig. 2, bag Include:
Step 201:Its corresponding soft ware authorization is set to use strategy respectively for each user in advance.
Step 202:Pre-save and use the first private key of the first public key corresponding to user, and made corresponding to user With the second public key of the second private key.
Step 203:Receive the soft ware authorization application code that software terminal is sent.
Step 204:Soft ware authorization application code is decrypted using first private key;
Step 205:According to the user profile in the soft ware authorization application code after decryption, the corresponding software of active user is obtained License strategy;
Step 206:The soft ware authorization of acquisition is encrypted using strategy using second public key, active coding is generated;
Step 207:The active coding of generation is sent to software terminal.
In an embodiment of the invention, by double-encryption, i.e., the application code that software manager receives can be By the encryption of the first public key, and pass through the encryption based on ASCII character, now, software manager needs to be corresponded to Decryption processing, can include:
The application code received in the step 203 is the 3rd character string forms;Then awarded in reception software described in step 203 After power application code, and before soft ware authorization application code is decrypted using first private key described in step 204, enter one Step includes:
For the application code of the 3rd character string forms received, the described 3rd is split by a unit of every 3 characters Character string;
The first two character string in each unit split out is converted into the numeral that numeral is converted into the 3rd character string Product is sought, the corresponding ASCII character of each unit is obtained, each unit is replaced with the corresponding ASCII character of each unit, is obtained Two character strings;
Each ASCII character in second character string is converted into corresponding character, the first character string is obtained;
It is specific that the active coding of the first character string forms is decrypted using the first private key in the step 204.
In the embodiment of the present invention shown in Fig. 2, in order to ensure the security of active coding, the second public key is used to active coding Encrypted.In one embodiment of the invention, in order to further improve the security that active coding is interacted, after encryption Active coding, can also further carry out the following encryption based on ASCII character:
The active coding generated described in step 206 is the 7th character string forms;Then described in step 206 generate active coding it Afterwards, and before the active coding of generation is sent to software terminal by the step 207, further comprise:
For the active coding of the 7th character string forms, the original character preset in the 7th character string on M position is distinguished Default M substitute character is replaced with, the M original characters are added into the 7th character string end, the 6th character string is obtained;
Each character in 6th character string is respectively converted into the corresponding ASCII character of the character, the 5th character string is obtained;
Carrying out prime number respectively to each ASCII character in the 5th character string asks business to handle;
Result and corresponding prime number that prime number asks business are replaced into corresponding ASCII character in the 5th character string, the 4th word is obtained Symbol string;
In step 207, the active coding of the 4th character string forms is specifically sent to software terminal;
Wherein,
Described each ASCII character in the 5th character string carries out prime number and asks business's processing to include respectively:
For each described ASCII character, performed the ASCII character divided by big one by one according to the order of prime number from small to large In the prime number of natural number 1, until obtaining first business divided exactly;
The corresponding prime number of the ASCII character asks the result of business to be:Described first business divided exactly;
The prime number asks the corresponding prime number of the result of business to be:When obtaining described first business divided exactly, current divisor is used as Prime number.
In order to clearly illustrate the process that soft ware authorization is realized in the embodiment of the present invention, with reference to software terminal and The cooperation handling process of software manager is illustrated, also, software terminal and software manager are to needing to be sent to other side Information carry out double-encryption, referring to Fig. 3, can specifically include:
Step 301:Two pairs of public private key pairs are previously generated, wherein the first public key and the second private key are stored in software terminal In, and the first private key corresponding to the first public key, the second public key corresponding to the second private key be maintained in software manager In.
Step 302:According to business demand, each user for same software sets its corresponding soft ware authorization respectively in advance Use strategy.
Here it is possible to be that each user sets its right respectively according to business demands such as different geographical, different user priority The soft ware authorization answered uses strategy.Such as, user 1 is different with the region of user 2, and for software 1, user 1 uses the software 1 Authority is that corresponding soft ware authorization uses strategy and the difference of user 2.
Step 303:User 1 installs software 1 on software terminal, it is necessary to which during initializers 1, software terminal collects user The hardware information (hard disk, network interface card, the memory information of such as software terminal) of 1 identity information and the software terminal.
Step 304:The information of collection is encrypted using the first public key for software terminal, obtains the first character string forms Soft ware authorization application code.
The identity information of user 1 of collection and the hardware information of software terminal are encrypted using the first public key, Shen is obtained Please code, it is ensured that the security of application code.
In order to further increase the security of application code, can also as follows 305 the encryption based on ASCII character Processing, is further encrypted to application code.
Step 305:Encryption based on ASICC codes is carried out to the first character string, the soft of the 3rd character string forms is obtained Part authorized application code.
Referring to Fig. 4, the implementation process of this step 305 can be specifically included:
Step 401:Each character in first character string is respectively converted into the corresponding ASCII character of the character, is obtained Two character strings.
Such as, the first character string includes:AB ... U, then be converted to its corresponding ASCII character 65 by A therein, will be therein B is converted to its corresponding ASCII character 66 ..., and U therein is converted into its corresponding ASCII character 85, so, second obtained Character string includes:6566……85.
Step 402:For each ASCII character in the second character string, held one by one according to the order of prime number from small to large It is about to the ASCII character divided by the prime number more than natural number 1, until obtaining first business divided exactly.
Such as, the second character string includes:6566……85.So, for first ASCII character 65, from the prime number more than 1 3 start, and indivisible successively using 65 ÷ 3, then 65 ÷ 5=13, can be eliminated, then it is 13 to obtain first business divided exactly, correspondence Prime number be 5.Similarly,, can be with successively using 66 ÷ 3=22 since the prime number 3 more than 1 for next ASCII character 66 Eliminate, then it is 22 to obtain first business divided exactly, corresponding prime number is 3.By that analogy, until for last in the second character string One ASCII character 85, it is 17 to obtain its corresponding first business divided exactly, and corresponding prime number is 5.
Step 403:For each ASCII character in the second character string, prime number is asked into the result of business, and (i.e. first divides exactly Business) and corresponding prime number (when obtaining described first business divided exactly, being used as the prime number of current divisor) replace the second character Corresponding ASCII character in string, obtains the 3rd character string.
Such as, can be by the second character string:6566 ... 85, the 3rd character string is generated after replacement:135223……175.
So far, then the soft ware authorization application code that the 3rd character string forms are obtained in step 305 is completed.
Step 306:The soft ware authorization application code of 3rd character string forms is sent to software manager by software terminal.
Step 307:Software manager carries out the solution based on ASCII character to the soft ware authorization application code of the 3rd character string forms Close processing, obtains the soft ware authorization application code of the first character string forms.
Referring to Fig. 5, based on the implementation process of above-mentioned steps 305, the implementation process of this step 307 can be mistake shown in Fig. 4 The inverse process of journey, is specifically included:
Step 501:Software manager is for the application code of the 3rd character string forms received, using every 3 characters as one Individual unit splits the 3rd character string.
Such as, the 3rd character string:135223……175.The 3rd character string is split, 135,223 ... 175 are split out.
Step 502:The first two character string in each unit split out is converted into numeral and the 3rd by software manager The numeral that character string is converted into seeks product, obtains the corresponding ASCII character of each unit.
Here, for split out 135, using 13 × 5=65, obtain the corresponding ASCII character 65 of first unit, for 223 split out, using 22 × 3=66, obtain the corresponding ASCII character 66 of first unit.By that analogy, until obtaining last The corresponding ASCII character 85 of one unit.
Step 503:Software manager replaces each unit with the corresponding ASCII character of each unit, obtains the second character String.
Here, obtaining the second character string includes:6566……85.
Step 504:Each ASCII character in second character string is converted to corresponding character by software manager, obtains first Character string.
Here, because the second character string includes:6566 ... 85, will wherein 65,66 ... 85 replace with respectively it is corresponding Character, obtaining the first character string includes:AB…U.
Step 308:Software manager is entered using first private key to the soft ware authorization application code of the first character string forms Row decryption, obtains the identity information of user 1 and the hardware information of the software terminal.
Step 309:Software manager obtains and worked as according to the identity information of user 1 and the hardware information of the software terminal The corresponding soft ware authorization of preceding user uses strategy.
Step 310:The soft ware authorization of acquisition is encrypted using strategy using the second public key by software manager, and generation swashs Code living, is designated as the active coding of the 7th character string forms.
Step 311:For the active coding of the 7th character string forms, software manager is carried out at the encryption based on ASCII character Reason.
Referring to Fig. 6, the process of this step 311 can include:
Step 601:The original character preset in 7th character string on M position is replaced with M by software manager respectively Substitute character.
Such as, the 7th character string includes:#M…..K.
Step 602:The described original characters of M are added the character string end after characters are replaced by software manager, obtain the Six character strings.
In step 601 and step 602, M substitute character can be distinguished corresponding M ASCII character as needs by for The M position changed, that is to say, that by the original character in the 7th character string on the 73rd, 78,83,80,85,82 this 6 positions (being such as ABCDEF) replaces with I, N, S, P, U, R respectively;Also, original character ABCDEF is added to the end of the 7th character string Tail.
Step 603:Each character in 6th character string is respectively converted into the corresponding ASCII of the character by software manager Code, obtains the 5th character string.
Step 604:Software manager is to each ASCII character in the 5th character string, according to prime number from small to large suitable Sequence is performed the ASCII character divided by the prime number more than natural number 1 one by one, until obtaining first business divided exactly.
Step 605:Prime number is sought the result of business (i.e. by software management principle to each ASCII character in the 5th character string First business for dividing exactly) and corresponding prime number (when obtaining described first business divided exactly, being used as the prime number of current divisor) replace Corresponding ASCII character in the 5th character string is changed, the 4th character string is obtained.
Step 312:The active coding of 4th character string forms is sent to software terminal by software manager.
Step 313:The active coding of fourth character string forms of the software terminal to receiving carries out the decryption based on ASCII character Processing, obtains the active coding of the 7th character string forms.
Referring to Fig. 7, based on the implementation process of above-mentioned steps 311, the implementation process of this step 313 can be mistake shown in Fig. 6 The inverse process of journey, is specifically included:
Step 701:Software terminal is split for the active coding of the 4th character string forms by a unit of every 3 characters 4th character string.
Step 702:The first two character string in each unit split out is converted into numeral and the 3rd word by software terminal The numeral that symbol string is converted into seeks product, obtains the corresponding ASCII character of each unit.
Step 703:Software terminal replaces each unit in the 4th character string with the corresponding ASCII character of each unit, obtains To the 5th character string.
Step 704:Each ASCII character in 5th character string is converted to corresponding character by software terminal, obtains the 6th word Symbol string.
The process of step 701 to step 704 is identical with the realization principle of the process of above-mentioned steps 501 to step 504.
Step 705:Character on default M position in 6th character string is corresponded to and replaces with the 6th by software terminal respectively Last M characters in character string, and the last M character is deleted, obtain the 7th character string.
Corresponding to the processing of step 601 and step 602, in this step 705, such as it can include:By in the 7th character string I on 73rd, 78,83,80,85,82 this 6 positions, N, S, P, U, R replace with last M character A, B, C, D, E, F respectively, Also, delete the last M ABCDEF of the 6th character string.
Step 314:The active coding of the 7th character string forms is decrypted using the second private key for software terminal.
Step 315:Software terminal is parsed to the active coding after decryption, is obtained from active coding and is corresponded to active user Soft ware authorization using strategy.
Step 316:Software terminal, using strategy, carries out software initialization according to the soft ware authorization of acquisition.
One embodiment of the invention also proposed a kind of software terminal, referring to Fig. 8, including:
First storage unit 801, for preserving the first public key and the second private key;
Information collection unit 802, for collecting current user information;
Apply for processing unit 803, for the first public key using the storage unit 801 preservation to information collection unit The user profile collected by 802 is encrypted, and generates soft ware authorization application code, soft ware authorization application code is sent into software Manager;
Processing unit 804 is activated, for receiving the active coding from software manager, is protected using the first storage unit 801 Active coding is decrypted the second private key deposited;Active coding after decryption is parsed, obtains to correspond to from active coding and works as The soft ware authorization of preceding user uses strategy;
Authorisation process unit 805, the soft ware authorization for being obtained according to activation processing unit 804 is carried out soft using strategy Part is initialized.
In an embodiment of the invention, the soft ware authorization application code of the generation is the first character string forms;It is then described Application processing unit 803 includes:First encryption subelement and the first transmission sub-unit, wherein,
First encryption subelement, for the soft ware authorization application code of the first character string forms of generation, by the first word Each character is respectively converted into the corresponding ASCII character of the character in symbol string, obtains the second character string;To in the second character string Each ASCII character carries out prime number and asks business to handle respectively;The result and corresponding prime number for asking business using prime number replace the second character Corresponding ASCII character in string, obtains the 3rd character string;
First transmission sub-unit, for the soft ware authorization application code of the 3rd character string forms to be sent into software manager;
Wherein,
Each ASCII character of first encryption subelement in the second character string carries out prime number and asks business to handle respectively When, it is specific to perform:
For each described ASCII character, performed the ASCII character divided by big one by one according to the order of prime number from small to large In the prime number of natural number 1, until obtaining first business divided exactly;
The corresponding prime number of the ASCII character asks the result of business to be:Described first business divided exactly;
The prime number asks the corresponding prime number of the result of business to be:When obtaining described first business divided exactly, current divisor is used as Prime number.
In an embodiment of the invention, the active coding received is the 4th character string forms;Then at the activation Reason unit 804 includes:First decryption processing subelement and the second decryption processing subelement;
First decryption processing subelement, for swashing for the 4th character string forms from software manager for receiving Code living, the 4th character string is split by a unit of every 3 characters;By the first two character string in each unit split out It is converted into the digital numeral being converted into the 3rd character string and seeks product, obtains the corresponding ASCII character of each unit, use each list The corresponding ASCII character in position replaces each unit, obtains the 5th character string;Each ASCII character in 5th character string is converted to Corresponding character, obtains the 6th character string;Character on default M position in 6th character string is corresponded to respectively and replaces with the Last M characters in six character strings, and the last M character is deleted, obtain the 7th character string;
The second decryption processing subelement, for being solved using the second private key to the active coding of the 7th character string forms It is close.
One embodiment of the invention also proposed a kind of software manager, referring to Fig. 9, including:
Delegated strategy setting unit 901, for setting its corresponding soft ware authorization to use strategy respectively for each user;
Second storage unit 902, uses the first private key of the first public key, and correspond to for preserving corresponding to user User uses the second public key of the second private key;
Receiving unit 903, for receiving soft ware authorization application code;
Application code processing unit 904, first private key preserved using the second storage unit 902 is to the receiving unit The 903 soft ware authorization application codes received are decrypted;
Delegated strategy sends processing unit 905, for the user profile in the soft ware authorization application code after decryption, from The delegated strategy setting unit 901 obtains the corresponding soft ware authorization of active user and uses strategy;Utilize the second storage unit 902 The soft ware authorization of acquisition is encrypted second public key preserved using strategy, generates active coding;By the active coding of generation It is sent to software terminal.
In an embodiment of the invention, software manager may further include:Application code decoding unit, the application Code decoding unit is connected between the receiving unit and the application code processing unit;Wherein,
The receiving unit receives the application code of the 3rd character string forms;
The application code decoding unit, for the application code of the 3rd character string forms received for receiving unit, with Every 3 characters are that a unit splits the 3rd character string;The first two character string in each unit split out is converted into The numeral that numeral is converted into the 3rd character string seeks product, obtains the corresponding ASCII character of each unit, with each unit correspondence ASCII character replace each unit, obtain the second character string;Each ASCII character in second character string is converted to corresponding Character, obtains the first character string;
The active coding of the first character string forms is decrypted using the first private key for the application code processing unit.
In an embodiment of the invention, in software manager, the delegated strategy, which sends processing unit 905, to be included:
First generation subelement, the active coding for generating the 7th character string forms;
Second encryption subelement, for the activation of the 7th character string forms generated for the first generation subelement Code, default M substitute character is replaced with by the original character on M position is preset in the 7th character string respectively, described by M Original character adds the 7th character string end, obtains the 6th character string;Each character in 6th character string is respectively converted into The corresponding ASCII character of the character, obtains the 5th character string;Prime number is carried out respectively to each ASCII character in the 5th character string Business is asked to handle;Result and corresponding prime number that prime number asks business are replaced into corresponding ASCII character in the 5th character string, the 4th word is obtained Symbol string;
Second transmission sub-unit, for the active coding of the 4th character string forms to be sent into software terminal;
Wherein,
The second encryption subelement carries out prime number to each ASCII character in the 5th character string and asked at business respectively Reason is specific to perform:
For each described ASCII character, performed the ASCII character divided by big one by one according to the order of prime number from small to large In the prime number of natural number 1, until obtaining first business divided exactly;
The corresponding prime number of the ASCII character asks the result of business to be:Described first business divided exactly;
The prime number asks the corresponding prime number of the result of business to be:When obtaining described first business divided exactly, current divisor is used as Prime number.
Referring to Figure 10, one embodiment of the invention also proposed a kind of system of soft ware authorization, including the embodiment of the present invention Any one software manager that any one software terminal and the embodiment of the present invention proposed is proposed.
Each embodiment of the invention at least has following beneficial effect:
1st, software authorization method provided in an embodiment of the present invention and system, software terminal and software manager, can be directed to Different users sets different soft ware authorizations using strategy, and the mandate for the software that each user obtains on software terminal makes All targetedly set for the user in advance with strategy, therefore, carry out according to this after software initialization, then can realize root The different authorizations of same software are carried out according to different user.
2nd, soft ware authorization can be carried and software terminal is sent in active coding by the embodiment of the present invention using policy information, Implementation is simple.
3rd, in the embodiment of the present invention, can the hardware information based on user software terminal, such as Current software terminal is hard Any one or more in disk, network interface card, memory information generate application code, therefore improve the security of interactive application code.
4th, in the embodiment of the present invention, two sets of different public keys and private key can be used to enter interactive application code and active coding Row encryption and decryption, this improves the security of interaction.
5th, in the embodiment of the present invention, public key can not be used only and the mode of private key is entered to interactive application code and active coding Row encryption and decryption, can be carried out at complicated encryption and decryption with further by the way of based on ASCII character to application code and active coding Reason, further increases the security of interaction.
6th, in the embodiment of the present invention, in order to further improve the security of information exchange, it is based on for application code The cipher mode of ASCII character is differed with carrying out the cipher mode based on ASCII character for active coding, such as, for active coding Carry out in the cipher mode based on ASCII character, further M can be replaced with to the original character for presetting M position respectively and replaced Character is changed, and the M original characters are added into character string end, so as to further increase the security of encryption.
It should be noted that herein, such as first and second etc relational terms are used merely to an entity Or operation makes a distinction with another entity or operation, and not necessarily require or imply exist between these entities or operation Any this actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant be intended to it is non- It is exclusive to include, so that process, method, article or equipment including a series of key elements not only include those key elements, But also other key elements including being not expressly set out, or also include solid by this process, method, article or equipment Some key elements.In the absence of more restrictions, by sentence " including the key element that a 〃 〃 〃 〃 〃 〃 " is limited, it is not excluded that in bag Include and also there is other identical factor in process, method, article or the equipment of the key element.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention God is with principle, and any modification, equivalent substitution and improvements done etc. should be included within the scope of protection of the invention.

Claims (4)

1. a kind of software authorization method, it is characterised in that applied in software terminal, preserve the first public key and the second private key;Also Including:
Collect current user information;
The user profile is encrypted using the first public key, soft ware authorization application code is generated;
Soft ware authorization application code is sent to software manager;
The active coding from software manager is received, active coding is decrypted using the second private key;
Active coding after decryption is parsed, the soft ware authorization obtained from active coding corresponding to active user uses strategy;
According to the soft ware authorization of acquisition using strategy, software initialization is carried out;
The current user information includes:It is any one or more in the hard disk of Current software terminal, network interface card, memory information; And/or, the identity information of currently used person;
And/or,
The soft ware authorization is included using strategy:In software function module authority, authorization type, the term of validity any one or it is many It is individual;
The soft ware authorization application code of the generation is the first character string forms;Then after the generation soft ware authorization application code, And it is described soft ware authorization application code is sent to software manager before, further comprise:
For the soft ware authorization application code of the first character string forms of generation, each character in the first character string is changed respectively For the corresponding ASCII character of the character, the second character string is obtained;
Carrying out prime number respectively to each ASCII character in the second character string asks business to handle;
Result and corresponding prime number that prime number asks business are replaced into corresponding ASCII character in the second character string, the 3rd character string is obtained;
It is described soft ware authorization application code is sent to software manager to include:By the soft ware authorization application code of the 3rd character string forms It is sent to software manager;
Wherein,
Described each ASCII character in the second character string carries out prime number and asks business's processing to include respectively:
For each described ASCII character, performed one by one by the ASCII character divided by more than certainly according to the order of prime number from small to large The prime number of right number 1, until obtaining first business divided exactly;
The corresponding prime number of the ASCII character asks the result of business to be:Described first business divided exactly;
The prime number asks the corresponding prime number of the result of business to be:When obtaining described first business divided exactly, the matter of current divisor is used as Number;
And/or,
The active coding received is the 4th character string forms;Then it is described reception the active coding from software manager it Afterwards, and before active coding is decrypted the second private key of the utilization, further comprise:
For the active coding of the 4th character string forms from software manager received, using every 3 characters as a unit Split the 4th character string;
The first two character string in each unit split out be converted into the numeral that is converted into the 3rd character string of numeral asked to multiply Product, obtains the corresponding ASCII character of each unit, replaces each unit with the corresponding ASCII character of each unit, obtain the 5th word Symbol string;
Each ASCII character in 5th character string is converted into corresponding character, the 6th character string is obtained;
Character on default M position in 6th character string is corresponded to respectively and replaces with last M characters in the 6th character string, And the last M character is deleted, obtain the 7th character string;
It is described using the second private key active coding is decrypted including:Utilize active coding of second private key to the 7th character string forms It is decrypted.
2. a kind of software authorization method, it is characterised in that applied to software manager, is that each user sets its corresponding respectively Soft ware authorization uses strategy;Preservation uses the first private key of the first public key corresponding to user, and is used corresponding to user Second public key of the second private key, in addition to:
Receive soft ware authorization application code;
Soft ware authorization application code is decrypted using first private key;
According to the user profile in the soft ware authorization application code after decryption, obtain the corresponding soft ware authorization of active user and use plan Slightly;
The soft ware authorization of acquisition is encrypted using strategy using second public key, active coding is generated;
The active coding of generation is sent to software terminal;
The application code received is the 3rd character string forms;Then after the reception soft ware authorization application code, and in institute State before soft ware authorization application code is decrypted using first private key, further comprise:
For the application code of the 3rd character string forms received, the 3rd character is split by a unit of every 3 characters String;
The first two character string in each unit split out be converted into the numeral that is converted into the 3rd character string of numeral asked to multiply Product, obtains the corresponding ASCII character of each unit, replaces each unit with the corresponding ASCII character of each unit, obtain the second word Symbol string;
Each ASCII character in second character string is converted into corresponding character, the first character string is obtained;
It is described using first private key soft ware authorization application code is decrypted including:Using the first private key to the first character string The active coding of form is decrypted;
And/or,
The active coding of the generation is the 7th character string forms;Then after the generation active coding, and described by generation Active coding is sent to before software terminal, is further comprised:
For the active coding of the 7th character string forms, replaced the original character on M position is preset in the 7th character string respectively For default M substitute character, the M original characters are added to the end of the character string after character is replaced, the 6th word is obtained Symbol string;
Each character in 6th character string is respectively converted into the corresponding ASCII character of the character, the 5th character string is obtained;
Carrying out prime number respectively to each ASCII character in the 5th character string asks business to handle;
Result and corresponding prime number that prime number asks business are replaced into corresponding ASCII character in the 5th character string, the 4th character string is obtained;
It is described the active coding of generation is sent to software terminal to include:The active coding of 4th character string forms is sent to soft Part terminal;
Wherein,
Described each ASCII character in the 5th character string carries out prime number and asks business's processing to include respectively:
For each described ASCII character, performed one by one by the ASCII character divided by more than certainly according to the order of prime number from small to large The prime number of right number 1, until obtaining first business divided exactly;
The corresponding prime number of the ASCII character asks the result of business to be:Described first business divided exactly;
The prime number asks the corresponding prime number of the result of business to be:When obtaining described first business divided exactly, the matter of current divisor is used as Number.
3. a kind of software terminal, it is characterised in that including:
First storage unit, for preserving the first public key and the second private key;
Information collection unit, for collecting current user information;
Apply for processing unit, for the first public key for being preserved using the storage unit to described in collected by information collection unit User profile is encrypted, and generates soft ware authorization application code, soft ware authorization application code is sent into software manager;
Processing unit is activated, for receiving the active coding from software manager, active coding is decrypted using the second private key; Active coding after decryption is parsed, the soft ware authorization obtained from active coding corresponding to active user uses strategy;
Authorisation process unit, for, using strategy, carrying out software initialization according to the soft ware authorization of acquisition;
The soft ware authorization application code of the generation is the first character string forms;Then the application processing unit includes:First adds Close processing subelement and the first transmission sub-unit, wherein,
First encryption subelement, for the soft ware authorization application code of the first character string forms of generation, by the first character string In each character be respectively converted into the corresponding ASCII character of the character, obtain the second character string;To each in the second character string Individual ASCII character carries out prime number and asks business to handle respectively;The result and corresponding prime number of business is asked to replace right in the second character string prime number The ASCII character answered, obtains the 3rd character string;
First transmission sub-unit, for the soft ware authorization application code of the 3rd character string forms to be sent into software manager;
Wherein,
First encryption subelement when each ASCII character in the second character string carries out prime number respectively and asks business to handle, It is specific to perform:
For each described ASCII character, performed one by one by the ASCII character divided by more than certainly according to the order of prime number from small to large The prime number of right number 1, until obtaining first business divided exactly;
The corresponding prime number of the ASCII character asks the result of business to be:Described first business divided exactly;
The prime number asks the corresponding prime number of the result of business to be:When obtaining described first business divided exactly, the matter of current divisor is used as Number;
And/or,
The active coding received is the 4th character string forms;Then the activation processing unit includes:First decryption processing Subelement and the second decryption processing subelement;
First decryption processing subelement, the activation for the 4th character string forms from software manager for receiving Code, the 4th character string is split by a unit of every 3 characters;The first two character string in each unit split out is turned Change the digital numeral being converted into the 3rd character string into and seek product, obtain the corresponding ASCII character of each unit, use each unit Corresponding ASCII character replaces each unit, obtains the 5th character string;Each ASCII character in 5th character string is converted to pair The character answered, obtains the 6th character string;Character on default M position in 6th character string is corresponded to respectively and replaces with the 6th Last M characters in character string, and the last M character is deleted, obtain the 7th character string;
The second decryption processing subelement, for the active coding of the 7th character string forms to be decrypted using the second private key.
4. a kind of software manager, it is characterised in that including:
Delegated strategy setting unit, for setting its corresponding soft ware authorization to use strategy respectively for each user;
Second storage unit, corresponds to the first private key that user uses the first public key for preserving, and corresponding to user institute Use the second public key of the second private key;
Receiving unit, for receiving soft ware authorization application code;
Application code processing unit, is solved using first private key to the soft ware authorization application code that the receiving unit is received It is close;
Delegated strategy sends processing unit, for the user profile in the soft ware authorization application code after decryption, obtains current The corresponding soft ware authorization of user uses strategy;The soft ware authorization of acquisition is encrypted using strategy using second public key, Generate active coding;The active coding of generation is sent to software terminal;
Characterized in that, further comprising:Application code decoding unit, the application code decoding unit is connected to the receiving unit Between the application code processing unit;Wherein,
The receiving unit receives the application code of the 3rd character string forms;
The application code decoding unit, for the application code of the 3rd character string forms received for receiving unit, with every 3 Character is that a unit splits the 3rd character string;By the first two character string in each unit split out be converted into numeral with The numeral that 3rd character string is converted into seeks product, obtains the corresponding ASCII character of each unit, corresponding with each unit ASCII character replaces each unit, obtains the second character string;Each ASCII character in second character string is converted into corresponding word Symbol, obtains the first character string;
The active coding of the first character string forms is decrypted using the first private key for the application code processing unit;
And/or,
The delegated strategy, which sends processing unit, to be included:
First generation subelement, the active coding for generating the 7th character string forms;
Second encryption subelement, for the active coding of the 7th character string forms generated for the first generation subelement, Default M substitute character is replaced with respectively by the original character on M position is preset in the 7th character string, by the M originals Beginning character adds the end of the character string after character is replaced, and obtains the 6th character string;By each character in the 6th character string point The corresponding ASCII character of the character is not converted to, obtains the 5th character string;To each ASCII character difference in the 5th character string Carrying out prime number asks business to handle;Result and corresponding prime number that prime number asks business are replaced into corresponding ASCII character in the 5th character string, obtained To the 4th character string;
Second transmission sub-unit, for the active coding of the 4th character string forms to be sent into software terminal;
Wherein,
The second encryption subelement carries out prime number to each ASCII character in the 5th character string and asks business to handle respectively, It is specific to perform:
For each described ASCII character, performed one by one by the ASCII character divided by more than certainly according to the order of prime number from small to large The prime number of right number 1, until obtaining first business divided exactly;
The corresponding prime number of the ASCII character asks the result of business to be:Described first business divided exactly;
The prime number asks the corresponding prime number of the result of business to be:When obtaining described first business divided exactly, the matter of current divisor is used as Number.
CN201510394604.3A 2015-09-08 2015-09-08 A kind of software authorization method and system, software terminal and software manager Active CN105160210B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510394604.3A CN105160210B (en) 2015-09-08 2015-09-08 A kind of software authorization method and system, software terminal and software manager

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510394604.3A CN105160210B (en) 2015-09-08 2015-09-08 A kind of software authorization method and system, software terminal and software manager

Publications (2)

Publication Number Publication Date
CN105160210A CN105160210A (en) 2015-12-16
CN105160210B true CN105160210B (en) 2017-11-03

Family

ID=54801066

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510394604.3A Active CN105160210B (en) 2015-09-08 2015-09-08 A kind of software authorization method and system, software terminal and software manager

Country Status (1)

Country Link
CN (1) CN105160210B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107341370B (en) * 2016-04-28 2019-10-29 北京北方华创微电子装备有限公司 A kind of authorization method and system of hardware device
CN107491954A (en) * 2016-06-13 2017-12-19 邓斌涛 Information interacting method, authentication and electronic fare payment system and method
CN106778084A (en) * 2016-11-18 2017-05-31 畅捷通信息技术股份有限公司 Software activation method and device and software activation system
WO2018119644A1 (en) * 2016-12-27 2018-07-05 深圳配天智能技术研究院有限公司 Software authorization method, system and device
CN107392005A (en) * 2017-05-31 2017-11-24 广东网金控股股份有限公司 A kind of Activiation method and system of business finance terminal device
CN108183887B (en) * 2017-12-12 2020-12-29 杭州安恒信息技术股份有限公司 Cloud vulnerability scanning strategy configuration method and device based on autonomous authorization
CN108548271B (en) * 2018-04-17 2020-04-21 奥克斯空调股份有限公司 Method and system for air conditioner monitoring and debugging software authorization
CN110348181A (en) * 2019-07-15 2019-10-18 广东名阳信息科技有限公司 A kind of method of verification software right to use legitimacy
CN111274553A (en) * 2020-01-20 2020-06-12 深圳市米勒沙容达汽车科技有限公司 Automatic software authorization method and system, server and terminal equipment
CN113536238A (en) * 2021-06-29 2021-10-22 上海浩霖汇信息科技有限公司 Software use authorization authentication method and system based on cryptographic technology and related products

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101877702A (en) * 2010-05-20 2010-11-03 中兴通讯股份有限公司 Method and system for activating and authenticating an internet protocol television client
CN103065071A (en) * 2012-12-14 2013-04-24 北京思特奇信息技术股份有限公司 Software copyright control method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070238450A1 (en) * 2006-04-07 2007-10-11 Lena Hogberg Software activation in a mobile terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101877702A (en) * 2010-05-20 2010-11-03 中兴通讯股份有限公司 Method and system for activating and authenticating an internet protocol television client
CN103065071A (en) * 2012-12-14 2013-04-24 北京思特奇信息技术股份有限公司 Software copyright control method and system

Also Published As

Publication number Publication date
CN105160210A (en) 2015-12-16

Similar Documents

Publication Publication Date Title
CN105160210B (en) A kind of software authorization method and system, software terminal and software manager
US10419416B2 (en) Encryption and decryption techniques using shuffle function
US20230237132A1 (en) System and Method for Memetic Authentication and Identification
EP2301185B1 (en) Format-preserving cryptographic systems
CN102804200B (en) Two-factor user authentication system, and method therefor
CN100432889C (en) System and method providing disconnected authentication
US20110307707A1 (en) Method and system for securing a file
US9698974B2 (en) Method for creating asymmetrical cryptographic key pairs
CN104270338A (en) A method and system of electronic identity registration and authentication login
CN101128831A (en) Authentication system and authentication method
CN106789080A (en) digital signature generation method and system
Kumar et al. Enhancing multi‐tenancy security in the cloud computing using hybrid ECC‐based data encryption approach
CN105100085B (en) A kind of method and apparatus that information is encrypted and decrypted
CN110910978A (en) Information processing method applied to block chain network and related device
CN110084599A (en) Cipher key processing method, device, equipment and storage medium
CN1806217A (en) Method and apparatus for authenticating a password
CN104598801B (en) A kind of Dynamic Two-dimensional code generating method based on algorithm reconstruct
CN100459495C (en) Password dynamic enciphering inputmethod of public emipering mode
CN107104792B (en) Portable mobile password management system and management method thereof
CN108471403A (en) A kind of method, apparatus, terminal device and the storage medium of account migration
CN105072136B (en) A kind of equipment room safety certifying method and system based on virtual drive
CN103559430A (en) Application account management method and device based on android system
CN110365468A (en) Anonymization processing method, device, equipment and storage medium
CN108933655A (en) A kind of computer network authentication system
CN108712657B (en) Barrage verification method, computer equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant