CN105224830B - A kind of communication software authorizing secure management method - Google Patents
A kind of communication software authorizing secure management method Download PDFInfo
- Publication number
- CN105224830B CN105224830B CN201510602512.XA CN201510602512A CN105224830B CN 105224830 B CN105224830 B CN 105224830B CN 201510602512 A CN201510602512 A CN 201510602512A CN 105224830 B CN105224830 B CN 105224830B
- Authority
- CN
- China
- Prior art keywords
- module
- bluetooth
- authorization
- bluetooth module
- unauthorized
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000007726 management method Methods 0.000 title claims description 9
- 238000013475 authorization Methods 0.000 claims abstract description 43
- 238000000034 method Methods 0.000 claims abstract description 16
- 230000004044 response Effects 0.000 claims description 9
- 230000000052 comparative effect Effects 0.000 claims description 3
- 230000008569 process Effects 0.000 claims description 3
- 238000012795 verification Methods 0.000 claims description 3
- 241001062009 Indigofera Species 0.000 claims 2
- 238000004519 manufacturing process Methods 0.000 abstract description 7
- 238000005516 engineering process Methods 0.000 description 11
- 230000008859 change Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000011017 operating method Methods 0.000 description 3
- 235000015170 shellfish Nutrition 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 230000010354 integration Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003252 repetitive effect Effects 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 230000036772 blood pressure Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 239000003814 drug Substances 0.000 description 1
- 238000005265 energy consumption Methods 0.000 description 1
- 230000005855 radiation Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 230000033764 rhythmic process Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Remote Sensing (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Radar, Positioning & Navigation (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
Claims (1)
- A kind of 1. communication software authorizing secure management method, first to bluetooth module(1)Operation is locked, then is unlocked operation, Characterized in that, the bluetooth module(1)Locking step be:S11 judges current Bluetooth module(1)With the presence or absence of authorization data;S12 is if it is present, with regard to normal operation, otherwise into unauthorized pattern;S13 is under unauthorized pattern, and the bluetooth storehouse is every time from scheduler(gOS)In the gap of scheduling, go to judge current indigo plant Tooth module(1)Whether time-out is run under unauthorized pattern;S14 works as unauthorized bluetooth module(1)After operation time-out, bluetooth module(1)By no longer normal operation, and notify user Verification failure is authorized, namely is locked;The bluetooth module(1)Unlocked step be:S21 upper computer software modules(4)Control authorizes Bluetooth adapter module(2)With bluetooth module(1)Establish and connect, and to Authorize Bluetooth adapter module(2)Initiate inquiry and authorize Bluetooth adapter module(2)The how many message of middle authorization surplus;S22 authorizes Bluetooth adapter module(2)After receiving the how many message of authorization surplus, authorization surplus report is replied Text;S23 upper computer software modules(4)Unblock operation is judged whether to according to whether the surplus of mandate is more than 0;S24 is as authorized surplus to be more than 0, upper computer software module(4)Unblock operation, afterwards, host computer are initiated by authorization requests Software module(4)Wait the return of authorization response;S25 authorizes Bluetooth adapter module(2)Receive upper computer software module(4)Authorization response after give bluetooth transceiver hair ACL data messages are sent, the message, which loads, authorizes index, for indicating next bluetooth module needs to be unlocked operation;After S26 bluetooth transceivers receive the ACL data messages, data are given by LE channels the bluetooth module of unauthorized (1), the bluetooth module of unauthorized(1)Receive after data message, it is necessary to check the licensing status of oneself, if this module It has been authorized that, then return to authorization failure, if this module unauthorized, equipment has been addressed UID and issues mandate indigo plant as authorization requests Tooth adaptor module(2);S27 authorizes Bluetooth adapter module(2)After receiving the request, the equipment addressing UID in message is extracted, then Carry out AES-128 computings:D=e (key, UID), wherein key are keys, and UID is equipment addressing;S28 bluetooth modules(1)After receiving authorization response, D is extracted from message, and make to calculate D1 in the same way =e(key, UID), D and D1 is then subjected to matching comparison, if comparative result is equal, then authorized returning successfully, it is no Then return to authorization failure;S29 authorizes Bluetooth adapter module(2)Receiving after authorizing returning result, licensing process is considered as terminating, and according to mandate As a result upper computer software module is reported(4), the passage of report is HCI order completion events, meanwhile, authorize Bluetooth adapter mould Block(2)Reducing will be carried out to authorized quantity.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510602512.XA CN105224830B (en) | 2015-09-21 | 2015-09-21 | A kind of communication software authorizing secure management method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510602512.XA CN105224830B (en) | 2015-09-21 | 2015-09-21 | A kind of communication software authorizing secure management method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105224830A CN105224830A (en) | 2016-01-06 |
CN105224830B true CN105224830B (en) | 2018-03-30 |
Family
ID=54993795
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510602512.XA Active CN105224830B (en) | 2015-09-21 | 2015-09-21 | A kind of communication software authorizing secure management method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105224830B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101404056A (en) * | 2008-10-29 | 2009-04-08 | 金蝶软件(中国)有限公司 | Software protection method, apparatus and equipment |
CN102184352A (en) * | 2011-03-16 | 2011-09-14 | 东南大学 | Automatic protecting method for computer system based on Bluetooth device authentication |
CN102968580A (en) * | 2006-01-27 | 2013-03-13 | 飞天诚信科技股份有限公司 | Method for controlling software product production safety |
CN103530161A (en) * | 2013-10-22 | 2014-01-22 | 北京深思数盾科技有限公司 | Wireless information security equipment system and security protection method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102075217B (en) * | 2010-12-22 | 2014-04-30 | 华为终端有限公司 | Method for managing Bluetooth connection and equipment |
-
2015
- 2015-09-21 CN CN201510602512.XA patent/CN105224830B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102968580A (en) * | 2006-01-27 | 2013-03-13 | 飞天诚信科技股份有限公司 | Method for controlling software product production safety |
CN101404056A (en) * | 2008-10-29 | 2009-04-08 | 金蝶软件(中国)有限公司 | Software protection method, apparatus and equipment |
CN102184352A (en) * | 2011-03-16 | 2011-09-14 | 东南大学 | Automatic protecting method for computer system based on Bluetooth device authentication |
CN103530161A (en) * | 2013-10-22 | 2014-01-22 | 北京深思数盾科技有限公司 | Wireless information security equipment system and security protection method |
Non-Patent Citations (2)
Title |
---|
关于防拷贝软件保护技术的研究;杨胜等;《咸宁学院学报》;20100630;第30卷(第6期);全文 * |
软件保护技术的发展现状与展望;熊丽等;《软件导刊》;20051231(第19期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN105224830A (en) | 2016-01-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103229184B (en) | For the method and system of the access to secure resources | |
CN100487637C (en) | Touching external connection keyboard | |
CN102231693A (en) | Method and apparatus for managing access authority | |
CN102468971A (en) | Authority management method and device, and authority control method and device | |
CN203849784U (en) | NFC-based access control system | |
CN105701873B (en) | A kind of Non-contact attendance recording method and attendance record system | |
CN106156589A (en) | Wearable device, wearable device control method and the system thereof of terminal | |
WO2015167832A1 (en) | Access control system for medical and dental computer systems | |
CN110097674A (en) | A kind of access control method and system based on two dimensional code | |
CN108650119A (en) | A kind of method and system of Remote configuration terminal device | |
CN205281615U (en) | Portable electronic lock and electronic lock system | |
TW201028883A (en) | Secure platform management device | |
CN105429660B (en) | A kind of intelligence wearable device | |
CN105788035A (en) | With the passive intelligence lock that has NFC function card reader mode mobile communication | |
CN109448171A (en) | A kind of method and smart lock of unlocking | |
CN206292898U (en) | A kind of multiple-authentication safety-protection system | |
CN105224830B (en) | A kind of communication software authorizing secure management method | |
CN100488073C (en) | Method and system for completing blue-tooth on-line match program by wire interface | |
CN108270798A (en) | A kind of mobile terminal device safety management system | |
CN106156549A (en) | Application program authorization processing method and device | |
CN104579639A (en) | Realizing for multi-party cooperation authorization key and system adopting same for mobile wireless control | |
CN103198257B (en) | Security under mixed information treatment facility environment is reused | |
CN109979053A (en) | A kind of offline model Internet of Things lock device and cipher key transmission methods based on MULTIPLE DYNAMIC key | |
CN206224646U (en) | A kind of lease mansion intelligent door lock | |
Ting et al. | Wireless monitoring system based on bluetooth smart phones |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address |
Address after: 510663 Room 403-404, Area B2, Creative Building, No. 162, Science Avenue, Science City, Huangpu District, Guangzhou City, Guangdong Province (office only) Patentee after: Guangzhou bide Technology Co.,Ltd. Address before: 510663 C1-1105, Innovation Building, No. 182, Science Avenue, Science City, Development Zone, Guangzhou, Guangdong, China Patentee before: BDE TECHNOLOGY Co.,Ltd. |
|
CP03 | Change of name, title or address | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: A security management method of communication software authorization Effective date of registration: 20221121 Granted publication date: 20180330 Pledgee: Bank of Guangzhou branch of the Bank of Guangzhou Science City Branch Pledgor: Guangzhou bide Technology Co.,Ltd. Registration number: Y2022980022657 |
|
PE01 | Entry into force of the registration of the contract for pledge of patent right | ||
PC01 | Cancellation of the registration of the contract for pledge of patent right |
Granted publication date: 20180330 Pledgee: Bank of Guangzhou branch of the Bank of Guangzhou Science City Branch Pledgor: Guangzhou bide Technology Co.,Ltd. Registration number: Y2022980022657 |