CN106934257A - A kind of program encryption methods and procedures encryption device - Google Patents

A kind of program encryption methods and procedures encryption device Download PDF

Info

Publication number
CN106934257A
CN106934257A CN201511020996.3A CN201511020996A CN106934257A CN 106934257 A CN106934257 A CN 106934257A CN 201511020996 A CN201511020996 A CN 201511020996A CN 106934257 A CN106934257 A CN 106934257A
Authority
CN
China
Prior art keywords
program
described program
active coding
activation
hardware information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201511020996.3A
Other languages
Chinese (zh)
Inventor
曹召换
周正
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN201511020996.3A priority Critical patent/CN106934257A/en
Publication of CN106934257A publication Critical patent/CN106934257A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs

Abstract

The present invention relates to program encryption field, a kind of program encryption methods and procedures encryption device is disclosed, described program encryption method includes:Obtain the hardware information of the operational outfit of operation program;Receive the active coding for program;And based on the hardware information and active coding activation described program.So avoid the fraudulent copying to program and reduce production and the maintenance cost of program.

Description

A kind of program encryption methods and procedures encryption device
Technical field
The present invention relates to program encryption, in particular it relates to a kind of program encryption methods and procedures encryption device.
Background technology
When development and application program, it usually needs application program is encrypted to avoid replicating journey Sequence is directly being used.By the way of many softwares are encrypted using hardware at present, by reading hardware in Authorize, program just can be performed normally if it can pass through checking.But, this mode is soft selling The cost of hardware will be increased while part, and if hardware is lost, then program will be unable to normal operation. Also, such cipher mode can increase production cost, the operation such as distribution, upgrading to program is both needed to Need provider to issue, upgraded or change the hardware of user, will so increase provider To the maintenance cost of software.
The content of the invention
It is an object of the invention to provide a kind of program encryption methods and procedures encryption device, the program encryption side Method avoids the fraudulent copying to program and reduces production and the maintenance cost of program.
To achieve these goals, the present invention provides a kind of program encryption method, described program encryption method Including:Obtain the hardware information of the operational outfit of operation program;Receive the active coding for program;And Based on the hardware information and active coding activation described program.
Being preferably based on the hardware information and active coding activation described program includes:Verification is described Whether active coding is correct;Verify whether the active coding matches with described program;It is correct in the active coding And in the case that the active coding matches with described program, activate described program.
Being preferably based on the hardware information and active coding activation described program also includes:Based on institute State hardware information and active coding activation generation authority;And cover institute using the authority State the temporary Authorization file of program.
Preferably, described program encryption method also includes:Receive upgrading or update request;Swash for described Code generation living is corresponding to upgrading or the new authority of fresh information;Replaced it using the new authority Preceding authority.
Preferably, described program encryption method also includes:After described program is activated, by the activation Code is set to state of activation.
Preferably, described program encryption method also includes:Receive reactivation request;The active coding is set It is set to unactivated state;Obtain the hardware information of the new operational outfit for installing described program;Based on described The hardware information of new operational outfit and the active coding activate described program again.
Preferably, described program encryption method also includes:During described program is activated, visitor is received Family essential information.
Preferably, activation described program includes activation line and local activation.
Correspondingly, the present invention also provides a kind of program encryption device, and described program encryption device includes:Obtain Device is taken, the hardware information of the operational outfit is obtained;Reception device, receives the active coding for program; And activation device, based on the hardware information and active coding activation described program.
Preferably, described program encryption device also includes:Whether just calibration equipment, verify the active coding Really, and verify whether the hardware information matches with described program;The activation device is additionally operable to described Active coding is correct and activates described program in the case that the hardware information matches with described program.
By above-mentioned technical proposal, the hardware information of the operational outfit of operation program is obtained, received for journey The active coding of sequence, and based on the hardware information and active coding activation described program.So avoid Fraudulent copying to program simultaneously reduces production and the maintenance cost of program.
Other features and advantages of the present invention will be described in detail in subsequent specific embodiment part.
Brief description of the drawings
Accompanying drawing is, for providing a further understanding of the present invention, and to constitute the part of specification, with Following specific embodiment is used to explain the present invention together, but is not construed as limiting the invention. In accompanying drawing:
Fig. 1 is a kind of flow chart of the program encryption method provided according to the present invention;And
Fig. 2 is according to the structural representation the invention provides program encryption device.
Description of reference numerals
The reception device of 21 acquisition device 22
23 activation devices
Specific embodiment
Specific embodiment of the invention is described in detail below in conjunction with accompanying drawing.It should be appreciated that Specific embodiment described herein is merely to illustrate and explain the present invention, and is not limited to this hair It is bright.
Fig. 1 is a kind of flow chart of the program encryption method provided according to the present invention, as shown in figure 1, this Inventing the program encryption method for providing can include:At step 11, the operation for obtaining operation program sets Standby hardware information;At step 12, the active coding for program is received;And at step 13, Based on the hardware information and active coding activation described program.So avoid and the malice of program is answered Make and reduce production and the maintenance cost of program.
Wherein, can be included based on the hardware information and active coding activation described program:Verification institute Whether correct state active coding;Verify whether the hardware information matches with described program;In the active coding In the case that correct and described hardware information matches with described program, described program is activated.
Also included based on the hardware information and active coding activation described program:Based on hardware letter Breath and active coding activation generation authority;And cover described program using the authority Temporary Authorization file.
For the application program for generating, it is necessary to generate an active coding, this active coding has been corresponded to applies journey The essential information of sequence, wherein, shown essential information can include:Module mandate, number of concurrent, expiration date Phase etc. control parameter information.
In order to more easily increase the active coding of program newly, maintenance, the product to product module are increased Versioning scheme is safeguarded.Various modules can be included in program, these modules can also be combined to be formed most Whole product version scheme.For each versioning scheme, expiration date, number of concurrent, product can be selected The information such as the expiration date and number of concurrent of module information and each module.
When newly-increased program activation code, application program is first determined, may then pass through the version of setting The corresponding control parameter information of Scheme Choice, and can in batches increase active coding.Active coding is preserved it Afterwards, these active codings directly can be exported into Excel tables to be managed;Or can be by these Active coding is distributed directly to the designated sale human user in system, and such sales force can directly log in The system checks the program activation code distributed for it.
For convenience to the control of active coding, mark can be increased, if active coding be not used or also not , then can be stored in the active coding in non-sales list by sale.If active coding activate or post sales, During sales list can be marked as having sold and can save it in by the active coding, and can be Increase client's essential information in remarks, tracking and solve problem after convenience.
Each active coding can correspond to a set of program, while selling software, can be by an active coding It is put into product in the lump., it is necessary to the machine for being directed to installation software obtains its hardware letter when Product Activation Breath, and hardware information is encrypted into a string of characters of generation by the cipher mode of program exploitation in advance, referred to as It is hardware code.
Can be by two ways come active program:Activation line and manually download activation.
For activation line, user can install software in operational outfit, and after installation, the operation sets It is standby to be simultaneously mounted with temporary Authorization file.It is then possible to the software is run in operational outfit, User can be input into active coding by the active program page.Program is by active coding and the hardware of operational outfit Information is sent to server.Server can decide whether to return by the logic judgment anticipated Correct encryption information or miscue.Wherein, can also be by client's essential information (including customer name Title, contact method etc.) send to server, so as to follow-up follow-up service.
After server receives the machine code and active coding that transmit, can verify and change the correct of active coding Property, if use.Active coding is incorrect as described, then return to error message.If the active coding Correctly, then verify whether the active coding matches with described program, terminate if mismatching and return to mistake Information.If the active coding matches with described program, then according to the corresponding program of active coding, mould Block authorization message, expiration date, number of concurrent etc. information generate encryption authorization file by programme-control, And during encryption authorization file returned into client.The client is received after authority, can be with It is copied into local program, replaces temporary Authorization file, can points out to restart if desired to apply journey Sequence, to activate said procedure.Although above-mentioned give two kinds of sequencings of checking procedure, this is only It is schematical, those skilled in the art can be exchanged the order of two kinds of checking procedures.
If client can not access internet for some reason, can be by the way of local activation Carry out active program.The mode that client can manually activate is locally downloading by authority, then copies Shellfish is in the operational outfit of client.
For local activation, before activation, server obtains the hardware information and phase of client's operational outfit The active coding answered.Based on active coding and hardware information generation authority.Client can replicate mandate text Part, and the authority is copied to cover the temporary Authorization file in client software manually.If needed CLIENT PROGRAM can be restarted to complete activation.
After described program is activated, the active coding can be set to state of activation, so as to activation Code is managed, it is possible to set up activation work order to preserve active information.
In addition, described program encryption method also includes:Receive upgrading or update request;For the activation Code generation is corresponding to upgrading or the new authority of fresh information;Before being replaced it using the new authority Authority.
After client have purchased software, as the development of business is, it is necessary to buy new module or ought be simultaneously Hair number is insufficient for present case, then need current software will to be upgraded or updated.When connecing Receive after the upgrading or renewal request of client, can in systems increase upgrading work order.Receive current visitor The active coding that family is currently in use, then can automatically load the control parameter corresponding to the currently active code, can be with Increase or removing module, the control parameter of modified module mandate, expiration date, number of concurrent etc. control ginseng Number.After the control parameter upgraded or update corresponding to client and ask has been changed, it is possible to notify that client enters Row renewal is authorized.
Update similar with the mode of software activation, online upgrading and local upgrade can be included.
For online upgrading, when client is upgraded, current active coding can be sent to server, After the request that server is upgraded, upgrade requirement can be inquired about from upgrading work order, judged whether Untapped upgrade requirement, if it does not exist, then return and point out version newest, without upgrading.If There is upgrade requirement, then by all upgrade requirement inverted orders for this active coding, obtain newest one and rise Level demand.According to the control parameter in newest upgrade requirement, authorization data is updated, and generate newest Authority, and be upgrade status by the corresponding upgrading work order status modifier of all active codings.Finally During new authority returned into the application program of client, the authority before covering, if needed User can be pointed out to be restarted, to complete program upgrading or update.
For local upgrade, the method with local activation is similar.According in active coding essential information, will most The authorization message of new upgrading work order is written in newest mandate, then generates new authority.With Family can be by the new authority downloaded and before being copied into the operational outfit of client with covering Authority, described program is restarted if needed, with complete program upgrading or update.
Additionally, described program encryption method also includes:Receive reactivation request;The active coding is set It is unactivated state;Obtain the hardware information of the new operational outfit for installing described program;Based on described new Operational outfit hardware information and the active coding activate described program again.
When the operational outfit of client needs to change or shift for some reason.In new operational outfit On, due to the presence of authority, then cannot start the program.Client can send reactivation request, After examination & verification, the active coding that server is provided before can increasing a reactivation work order, and input newly, Active information before automatic loading.After preservation active information in reactivation work order, before deleting Active information in activation work order, and by active coding status modifier into un-activation.Such active coding with it is new Active coding possess the same function, then according to above-mentioned activation manipulation (activation line, local activation) Program can be reactivated, i.e. obtain the hardware information of the new operational outfit for installing described program; Hardware information and the active coding based on the new operational outfit activate described program again.
Correspondingly, the present invention also provides a kind of program encryption device, and Fig. 2 is according to the invention provides program The structural representation of encryption device, as shown in Fig. 2 described program encryption device can include:Obtain dress 21 are put, the hardware information of the operational outfit is obtained;Reception device 22, receives the activation for program Code;And activation device 23, based on the hardware information and active coding activation described program.So Avoid the fraudulent copying to program and reduce production and the maintenance cost of program.
In addition, described program encryption device can also include:Whether calibration equipment, verify the active coding Correctly, and verify whether the hardware information matches with described program;The activation device is additionally operable in institute State active coding correct and activate described program in the case that the hardware information matches with described program.
Further feature and benefit on program encryption device are similar to said procedure encryption method, thus This is repeated no more.
The preferred embodiment of the present invention is described in detail above in association with accompanying drawing, but, the present invention is not limited Detail in above-mentioned implementation method, in range of the technology design of the invention, can be to the present invention Technical scheme carry out various simple variants, these simple variants belong to protection scope of the present invention.
It is further to note that each particular technique described in above-mentioned specific embodiment is special Levy, in the case of reconcilable, can be combined by any suitable means, in order to avoid need not The repetition wanted, the present invention is no longer separately illustrated to various possible combinations.
Additionally, can also be combined between a variety of implementation methods of the invention, as long as its Without prejudice to thought of the invention, it should equally be considered as content disclosed in this invention.

Claims (10)

1. a kind of program encryption method, it is characterised in that described program encryption method includes:
Obtain the hardware information of the operational outfit of operation program;
Receive the active coding for program;And
Based on the hardware information and active coding activation described program.
2. program encryption method according to claim 1, it is characterised in that based on the hardware Information and active coding activation described program include:
Whether correct verify the active coding;
Verify whether the active coding matches with described program;
Correct and in the case that the active coding matches with described program in the active coding, activation is described Program.
3. program encryption method according to claim 2, it is characterised in that based on the hardware Information and active coding activation described program also include:
Based on the hardware information and active coding activation generation authority;And
The temporary Authorization file of described program is covered using the authority.
4. program encryption method according to claim 1, it is characterised in that described program is encrypted Method also includes:
Receive upgrading or update request;
For active coding generation corresponding to upgrading or the new authority of fresh information;
Authority before being replaced it using the new authority.
5. program encryption method according to claim 1, it is characterised in that described program is encrypted Method also includes:After described program is activated, the active coding is set to state of activation.
6. program encryption method according to claim 5, it is characterised in that described program is encrypted Method also includes:
Receive reactivation request;
The active coding is set to unactivated state;
Obtain the hardware information of the new operational outfit for installing described program;
Hardware information and the active coding based on the new operational outfit activate described program again.
7. program encryption method according to claim 1, it is characterised in that described program is encrypted Method also includes:During described program is activated, client's essential information is received.
8. the program encryption method according to any one of claim 1-7, it is characterised in that swash Described program living includes activation line and local activation.
9. a kind of program encryption device, it is characterised in that described program encryption device includes:
Acquisition device, obtains the hardware information of the operational outfit;
Reception device, receives the active coding for program;And
Activation device, based on the hardware information and active coding activation described program.
10. program encryption device according to claim 9, it is characterised in that described program is encrypted Device also includes:
Whether correctly calibration equipment, verify the active coding, and verify the hardware information and described program Whether match;
The activation device is additionally operable to the active coding is correct and the hardware information and described program phase Described program is activated in the case of matching.
CN201511020996.3A 2015-12-30 2015-12-30 A kind of program encryption methods and procedures encryption device Pending CN106934257A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201511020996.3A CN106934257A (en) 2015-12-30 2015-12-30 A kind of program encryption methods and procedures encryption device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201511020996.3A CN106934257A (en) 2015-12-30 2015-12-30 A kind of program encryption methods and procedures encryption device

Publications (1)

Publication Number Publication Date
CN106934257A true CN106934257A (en) 2017-07-07

Family

ID=59441094

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201511020996.3A Pending CN106934257A (en) 2015-12-30 2015-12-30 A kind of program encryption methods and procedures encryption device

Country Status (1)

Country Link
CN (1) CN106934257A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109241701A (en) * 2018-08-31 2019-01-18 郑州云海信息技术有限公司 A kind of application program Activiation method, correlation technique and relevant apparatus
CN110837643A (en) * 2018-08-17 2020-02-25 阿里巴巴集团控股有限公司 Activation method and device of trusted execution environment
CN111651734A (en) * 2020-05-27 2020-09-11 支付宝(杭州)信息技术有限公司 Installation management method, device, equipment and system for applet

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1561025A (en) * 2004-03-03 2005-01-05 北京北大方正电子有限公司 Method of binding digital contents and hardware with hardward adaptive
CN1762125A (en) * 2004-01-15 2006-04-19 索尼株式会社 Information communicating system, transmitting apparatus, transmitting method, and computer program
CN101799851A (en) * 2009-12-31 2010-08-11 黄定 Method for canceling activation after networking activation of software
CN102479305A (en) * 2010-11-29 2012-05-30 金蝶软件(中国)有限公司 Software licensing verification method and system
CN102646022A (en) * 2012-04-10 2012-08-22 北京搜狗科技发展有限公司 Method and device for obtaining candidate
CN103577744A (en) * 2012-08-08 2014-02-12 上海赤炫信息科技有限公司 Network on-line activating mode for Android mobile internet equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1762125A (en) * 2004-01-15 2006-04-19 索尼株式会社 Information communicating system, transmitting apparatus, transmitting method, and computer program
CN1561025A (en) * 2004-03-03 2005-01-05 北京北大方正电子有限公司 Method of binding digital contents and hardware with hardward adaptive
CN101799851A (en) * 2009-12-31 2010-08-11 黄定 Method for canceling activation after networking activation of software
CN102479305A (en) * 2010-11-29 2012-05-30 金蝶软件(中国)有限公司 Software licensing verification method and system
CN102646022A (en) * 2012-04-10 2012-08-22 北京搜狗科技发展有限公司 Method and device for obtaining candidate
CN103577744A (en) * 2012-08-08 2014-02-12 上海赤炫信息科技有限公司 Network on-line activating mode for Android mobile internet equipment

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110837643A (en) * 2018-08-17 2020-02-25 阿里巴巴集团控股有限公司 Activation method and device of trusted execution environment
CN110837643B (en) * 2018-08-17 2022-09-23 阿里巴巴集团控股有限公司 Activation method and device of trusted execution environment
CN109241701A (en) * 2018-08-31 2019-01-18 郑州云海信息技术有限公司 A kind of application program Activiation method, correlation technique and relevant apparatus
CN111651734A (en) * 2020-05-27 2020-09-11 支付宝(杭州)信息技术有限公司 Installation management method, device, equipment and system for applet

Similar Documents

Publication Publication Date Title
EP2225634B1 (en) Alternate parts signature list file
CN103685138B (en) The authentication method of the Android platform application software that mobile interchange is online and system
CN101051278B (en) Method and system for automated operating system installation
US8364968B2 (en) Dynamic web services systems and method for use of personal trusted devices and identity tokens
CN108111331A (en) Acquisition methods, device, storage medium, processor and the system of updated data package
US20080109542A1 (en) Software Distribution Application Supporting Operating System Installations
CN104809009B (en) A kind of program bootload method of automobile electronic control unit
CN103780396B (en) Token acquisition methods and device
US9959125B2 (en) Field update of boot loader using regular device firmware update procedure
CN106095522A (en) A kind of method realizing distributed compilation and distributed compilation system
CN106097058A (en) E-commerce platform heterogeneous data processing method and system
CN106899437A (en) A kind of method and apparatus of POS module firmware of upgrading
CN1696910B (en) Efficient software patching method and system
CN107465728B (en) Information processing method, central server and storage medium for identification code
CN106934257A (en) A kind of program encryption methods and procedures encryption device
CN103713918A (en) Software appliance installation systems and methods
CN107193607A (en) Method and apparatus, storage medium, processor and terminal for updating code file
CN105975298A (en) Method and system for remotely controlling applications of Android terminal
CN105589699A (en) Serial number information update method, device and terminal
US20200374276A1 (en) Provisioning system, provisioning method, provisioning program, and, network device
CN108710497A (en) A kind of method for updating system of vehicle-mounted middle control and vehicle-mounted middle control
US8103804B2 (en) Method and system for embedded regenerative licensing
US9336361B2 (en) Feature license-related repair/replacement processes and credit handling
CN103365684A (en) Updating method and multi-domain embedded system
CN114138303A (en) Vehicle application program updating method, device, medium and vehicle

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170707