CN106934257A - A kind of program encryption methods and procedures encryption device - Google Patents
A kind of program encryption methods and procedures encryption device Download PDFInfo
- Publication number
- CN106934257A CN106934257A CN201511020996.3A CN201511020996A CN106934257A CN 106934257 A CN106934257 A CN 106934257A CN 201511020996 A CN201511020996 A CN 201511020996A CN 106934257 A CN106934257 A CN 106934257A
- Authority
- CN
- China
- Prior art keywords
- program
- described program
- active coding
- activation
- hardware information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 230000004913 activation Effects 0.000 claims abstract description 54
- 238000013475 authorization Methods 0.000 claims description 11
- 230000007420 reactivation Effects 0.000 claims description 6
- 238000012423 maintenance Methods 0.000 abstract description 7
- 238000004519 manufacturing process Methods 0.000 abstract description 6
- 238000012795 verification Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 239000003607 modifier Substances 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 230000003466 anti-cipated effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- PWPJGUXAGUPAHP-UHFFFAOYSA-N lufenuron Chemical compound C1=C(Cl)C(OC(F)(F)C(C(F)(F)F)F)=CC(Cl)=C1NC(=O)NC(=O)C1=C(F)C=CC=C1F PWPJGUXAGUPAHP-UHFFFAOYSA-N 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 230000003362 replicative effect Effects 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
- 235000015170 shellfish Nutrition 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
Abstract
The present invention relates to program encryption field, a kind of program encryption methods and procedures encryption device is disclosed, described program encryption method includes:Obtain the hardware information of the operational outfit of operation program;Receive the active coding for program;And based on the hardware information and active coding activation described program.So avoid the fraudulent copying to program and reduce production and the maintenance cost of program.
Description
Technical field
The present invention relates to program encryption, in particular it relates to a kind of program encryption methods and procedures encryption device.
Background technology
When development and application program, it usually needs application program is encrypted to avoid replicating journey
Sequence is directly being used.By the way of many softwares are encrypted using hardware at present, by reading hardware in
Authorize, program just can be performed normally if it can pass through checking.But, this mode is soft selling
The cost of hardware will be increased while part, and if hardware is lost, then program will be unable to normal operation.
Also, such cipher mode can increase production cost, the operation such as distribution, upgrading to program is both needed to
Need provider to issue, upgraded or change the hardware of user, will so increase provider
To the maintenance cost of software.
The content of the invention
It is an object of the invention to provide a kind of program encryption methods and procedures encryption device, the program encryption side
Method avoids the fraudulent copying to program and reduces production and the maintenance cost of program.
To achieve these goals, the present invention provides a kind of program encryption method, described program encryption method
Including:Obtain the hardware information of the operational outfit of operation program;Receive the active coding for program;And
Based on the hardware information and active coding activation described program.
Being preferably based on the hardware information and active coding activation described program includes:Verification is described
Whether active coding is correct;Verify whether the active coding matches with described program;It is correct in the active coding
And in the case that the active coding matches with described program, activate described program.
Being preferably based on the hardware information and active coding activation described program also includes:Based on institute
State hardware information and active coding activation generation authority;And cover institute using the authority
State the temporary Authorization file of program.
Preferably, described program encryption method also includes:Receive upgrading or update request;Swash for described
Code generation living is corresponding to upgrading or the new authority of fresh information;Replaced it using the new authority
Preceding authority.
Preferably, described program encryption method also includes:After described program is activated, by the activation
Code is set to state of activation.
Preferably, described program encryption method also includes:Receive reactivation request;The active coding is set
It is set to unactivated state;Obtain the hardware information of the new operational outfit for installing described program;Based on described
The hardware information of new operational outfit and the active coding activate described program again.
Preferably, described program encryption method also includes:During described program is activated, visitor is received
Family essential information.
Preferably, activation described program includes activation line and local activation.
Correspondingly, the present invention also provides a kind of program encryption device, and described program encryption device includes:Obtain
Device is taken, the hardware information of the operational outfit is obtained;Reception device, receives the active coding for program;
And activation device, based on the hardware information and active coding activation described program.
Preferably, described program encryption device also includes:Whether just calibration equipment, verify the active coding
Really, and verify whether the hardware information matches with described program;The activation device is additionally operable to described
Active coding is correct and activates described program in the case that the hardware information matches with described program.
By above-mentioned technical proposal, the hardware information of the operational outfit of operation program is obtained, received for journey
The active coding of sequence, and based on the hardware information and active coding activation described program.So avoid
Fraudulent copying to program simultaneously reduces production and the maintenance cost of program.
Other features and advantages of the present invention will be described in detail in subsequent specific embodiment part.
Brief description of the drawings
Accompanying drawing is, for providing a further understanding of the present invention, and to constitute the part of specification, with
Following specific embodiment is used to explain the present invention together, but is not construed as limiting the invention.
In accompanying drawing:
Fig. 1 is a kind of flow chart of the program encryption method provided according to the present invention;And
Fig. 2 is according to the structural representation the invention provides program encryption device.
Description of reference numerals
The reception device of 21 acquisition device 22
23 activation devices
Specific embodiment
Specific embodiment of the invention is described in detail below in conjunction with accompanying drawing.It should be appreciated that
Specific embodiment described herein is merely to illustrate and explain the present invention, and is not limited to this hair
It is bright.
Fig. 1 is a kind of flow chart of the program encryption method provided according to the present invention, as shown in figure 1, this
Inventing the program encryption method for providing can include:At step 11, the operation for obtaining operation program sets
Standby hardware information;At step 12, the active coding for program is received;And at step 13,
Based on the hardware information and active coding activation described program.So avoid and the malice of program is answered
Make and reduce production and the maintenance cost of program.
Wherein, can be included based on the hardware information and active coding activation described program:Verification institute
Whether correct state active coding;Verify whether the hardware information matches with described program;In the active coding
In the case that correct and described hardware information matches with described program, described program is activated.
Also included based on the hardware information and active coding activation described program:Based on hardware letter
Breath and active coding activation generation authority;And cover described program using the authority
Temporary Authorization file.
For the application program for generating, it is necessary to generate an active coding, this active coding has been corresponded to applies journey
The essential information of sequence, wherein, shown essential information can include:Module mandate, number of concurrent, expiration date
Phase etc. control parameter information.
In order to more easily increase the active coding of program newly, maintenance, the product to product module are increased
Versioning scheme is safeguarded.Various modules can be included in program, these modules can also be combined to be formed most
Whole product version scheme.For each versioning scheme, expiration date, number of concurrent, product can be selected
The information such as the expiration date and number of concurrent of module information and each module.
When newly-increased program activation code, application program is first determined, may then pass through the version of setting
The corresponding control parameter information of Scheme Choice, and can in batches increase active coding.Active coding is preserved it
Afterwards, these active codings directly can be exported into Excel tables to be managed;Or can be by these
Active coding is distributed directly to the designated sale human user in system, and such sales force can directly log in
The system checks the program activation code distributed for it.
For convenience to the control of active coding, mark can be increased, if active coding be not used or also not
, then can be stored in the active coding in non-sales list by sale.If active coding activate or post sales,
During sales list can be marked as having sold and can save it in by the active coding, and can be
Increase client's essential information in remarks, tracking and solve problem after convenience.
Each active coding can correspond to a set of program, while selling software, can be by an active coding
It is put into product in the lump., it is necessary to the machine for being directed to installation software obtains its hardware letter when Product Activation
Breath, and hardware information is encrypted into a string of characters of generation by the cipher mode of program exploitation in advance, referred to as
It is hardware code.
Can be by two ways come active program:Activation line and manually download activation.
For activation line, user can install software in operational outfit, and after installation, the operation sets
It is standby to be simultaneously mounted with temporary Authorization file.It is then possible to the software is run in operational outfit,
User can be input into active coding by the active program page.Program is by active coding and the hardware of operational outfit
Information is sent to server.Server can decide whether to return by the logic judgment anticipated
Correct encryption information or miscue.Wherein, can also be by client's essential information (including customer name
Title, contact method etc.) send to server, so as to follow-up follow-up service.
After server receives the machine code and active coding that transmit, can verify and change the correct of active coding
Property, if use.Active coding is incorrect as described, then return to error message.If the active coding
Correctly, then verify whether the active coding matches with described program, terminate if mismatching and return to mistake
Information.If the active coding matches with described program, then according to the corresponding program of active coding, mould
Block authorization message, expiration date, number of concurrent etc. information generate encryption authorization file by programme-control,
And during encryption authorization file returned into client.The client is received after authority, can be with
It is copied into local program, replaces temporary Authorization file, can points out to restart if desired to apply journey
Sequence, to activate said procedure.Although above-mentioned give two kinds of sequencings of checking procedure, this is only
It is schematical, those skilled in the art can be exchanged the order of two kinds of checking procedures.
If client can not access internet for some reason, can be by the way of local activation
Carry out active program.The mode that client can manually activate is locally downloading by authority, then copies
Shellfish is in the operational outfit of client.
For local activation, before activation, server obtains the hardware information and phase of client's operational outfit
The active coding answered.Based on active coding and hardware information generation authority.Client can replicate mandate text
Part, and the authority is copied to cover the temporary Authorization file in client software manually.If needed
CLIENT PROGRAM can be restarted to complete activation.
After described program is activated, the active coding can be set to state of activation, so as to activation
Code is managed, it is possible to set up activation work order to preserve active information.
In addition, described program encryption method also includes:Receive upgrading or update request;For the activation
Code generation is corresponding to upgrading or the new authority of fresh information;Before being replaced it using the new authority
Authority.
After client have purchased software, as the development of business is, it is necessary to buy new module or ought be simultaneously
Hair number is insufficient for present case, then need current software will to be upgraded or updated.When connecing
Receive after the upgrading or renewal request of client, can in systems increase upgrading work order.Receive current visitor
The active coding that family is currently in use, then can automatically load the control parameter corresponding to the currently active code, can be with
Increase or removing module, the control parameter of modified module mandate, expiration date, number of concurrent etc. control ginseng
Number.After the control parameter upgraded or update corresponding to client and ask has been changed, it is possible to notify that client enters
Row renewal is authorized.
Update similar with the mode of software activation, online upgrading and local upgrade can be included.
For online upgrading, when client is upgraded, current active coding can be sent to server,
After the request that server is upgraded, upgrade requirement can be inquired about from upgrading work order, judged whether
Untapped upgrade requirement, if it does not exist, then return and point out version newest, without upgrading.If
There is upgrade requirement, then by all upgrade requirement inverted orders for this active coding, obtain newest one and rise
Level demand.According to the control parameter in newest upgrade requirement, authorization data is updated, and generate newest
Authority, and be upgrade status by the corresponding upgrading work order status modifier of all active codings.Finally
During new authority returned into the application program of client, the authority before covering, if needed
User can be pointed out to be restarted, to complete program upgrading or update.
For local upgrade, the method with local activation is similar.According in active coding essential information, will most
The authorization message of new upgrading work order is written in newest mandate, then generates new authority.With
Family can be by the new authority downloaded and before being copied into the operational outfit of client with covering
Authority, described program is restarted if needed, with complete program upgrading or update.
Additionally, described program encryption method also includes:Receive reactivation request;The active coding is set
It is unactivated state;Obtain the hardware information of the new operational outfit for installing described program;Based on described new
Operational outfit hardware information and the active coding activate described program again.
When the operational outfit of client needs to change or shift for some reason.In new operational outfit
On, due to the presence of authority, then cannot start the program.Client can send reactivation request,
After examination & verification, the active coding that server is provided before can increasing a reactivation work order, and input newly,
Active information before automatic loading.After preservation active information in reactivation work order, before deleting
Active information in activation work order, and by active coding status modifier into un-activation.Such active coding with it is new
Active coding possess the same function, then according to above-mentioned activation manipulation (activation line, local activation)
Program can be reactivated, i.e. obtain the hardware information of the new operational outfit for installing described program;
Hardware information and the active coding based on the new operational outfit activate described program again.
Correspondingly, the present invention also provides a kind of program encryption device, and Fig. 2 is according to the invention provides program
The structural representation of encryption device, as shown in Fig. 2 described program encryption device can include:Obtain dress
21 are put, the hardware information of the operational outfit is obtained;Reception device 22, receives the activation for program
Code;And activation device 23, based on the hardware information and active coding activation described program.So
Avoid the fraudulent copying to program and reduce production and the maintenance cost of program.
In addition, described program encryption device can also include:Whether calibration equipment, verify the active coding
Correctly, and verify whether the hardware information matches with described program;The activation device is additionally operable in institute
State active coding correct and activate described program in the case that the hardware information matches with described program.
Further feature and benefit on program encryption device are similar to said procedure encryption method, thus
This is repeated no more.
The preferred embodiment of the present invention is described in detail above in association with accompanying drawing, but, the present invention is not limited
Detail in above-mentioned implementation method, in range of the technology design of the invention, can be to the present invention
Technical scheme carry out various simple variants, these simple variants belong to protection scope of the present invention.
It is further to note that each particular technique described in above-mentioned specific embodiment is special
Levy, in the case of reconcilable, can be combined by any suitable means, in order to avoid need not
The repetition wanted, the present invention is no longer separately illustrated to various possible combinations.
Additionally, can also be combined between a variety of implementation methods of the invention, as long as its
Without prejudice to thought of the invention, it should equally be considered as content disclosed in this invention.
Claims (10)
1. a kind of program encryption method, it is characterised in that described program encryption method includes:
Obtain the hardware information of the operational outfit of operation program;
Receive the active coding for program;And
Based on the hardware information and active coding activation described program.
2. program encryption method according to claim 1, it is characterised in that based on the hardware
Information and active coding activation described program include:
Whether correct verify the active coding;
Verify whether the active coding matches with described program;
Correct and in the case that the active coding matches with described program in the active coding, activation is described
Program.
3. program encryption method according to claim 2, it is characterised in that based on the hardware
Information and active coding activation described program also include:
Based on the hardware information and active coding activation generation authority;And
The temporary Authorization file of described program is covered using the authority.
4. program encryption method according to claim 1, it is characterised in that described program is encrypted
Method also includes:
Receive upgrading or update request;
For active coding generation corresponding to upgrading or the new authority of fresh information;
Authority before being replaced it using the new authority.
5. program encryption method according to claim 1, it is characterised in that described program is encrypted
Method also includes:After described program is activated, the active coding is set to state of activation.
6. program encryption method according to claim 5, it is characterised in that described program is encrypted
Method also includes:
Receive reactivation request;
The active coding is set to unactivated state;
Obtain the hardware information of the new operational outfit for installing described program;
Hardware information and the active coding based on the new operational outfit activate described program again.
7. program encryption method according to claim 1, it is characterised in that described program is encrypted
Method also includes:During described program is activated, client's essential information is received.
8. the program encryption method according to any one of claim 1-7, it is characterised in that swash
Described program living includes activation line and local activation.
9. a kind of program encryption device, it is characterised in that described program encryption device includes:
Acquisition device, obtains the hardware information of the operational outfit;
Reception device, receives the active coding for program;And
Activation device, based on the hardware information and active coding activation described program.
10. program encryption device according to claim 9, it is characterised in that described program is encrypted
Device also includes:
Whether correctly calibration equipment, verify the active coding, and verify the hardware information and described program
Whether match;
The activation device is additionally operable to the active coding is correct and the hardware information and described program phase
Described program is activated in the case of matching.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511020996.3A CN106934257A (en) | 2015-12-30 | 2015-12-30 | A kind of program encryption methods and procedures encryption device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511020996.3A CN106934257A (en) | 2015-12-30 | 2015-12-30 | A kind of program encryption methods and procedures encryption device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106934257A true CN106934257A (en) | 2017-07-07 |
Family
ID=59441094
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201511020996.3A Pending CN106934257A (en) | 2015-12-30 | 2015-12-30 | A kind of program encryption methods and procedures encryption device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106934257A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109241701A (en) * | 2018-08-31 | 2019-01-18 | 郑州云海信息技术有限公司 | A kind of application program Activiation method, correlation technique and relevant apparatus |
CN110837643A (en) * | 2018-08-17 | 2020-02-25 | 阿里巴巴集团控股有限公司 | Activation method and device of trusted execution environment |
CN111651734A (en) * | 2020-05-27 | 2020-09-11 | 支付宝(杭州)信息技术有限公司 | Installation management method, device, equipment and system for applet |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1561025A (en) * | 2004-03-03 | 2005-01-05 | 北京北大方正电子有限公司 | Method of binding digital contents and hardware with hardward adaptive |
CN1762125A (en) * | 2004-01-15 | 2006-04-19 | 索尼株式会社 | Information communicating system, transmitting apparatus, transmitting method, and computer program |
CN101799851A (en) * | 2009-12-31 | 2010-08-11 | 黄定 | Method for canceling activation after networking activation of software |
CN102479305A (en) * | 2010-11-29 | 2012-05-30 | 金蝶软件(中国)有限公司 | Software licensing verification method and system |
CN102646022A (en) * | 2012-04-10 | 2012-08-22 | 北京搜狗科技发展有限公司 | Method and device for obtaining candidate |
CN103577744A (en) * | 2012-08-08 | 2014-02-12 | 上海赤炫信息科技有限公司 | Network on-line activating mode for Android mobile internet equipment |
-
2015
- 2015-12-30 CN CN201511020996.3A patent/CN106934257A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1762125A (en) * | 2004-01-15 | 2006-04-19 | 索尼株式会社 | Information communicating system, transmitting apparatus, transmitting method, and computer program |
CN1561025A (en) * | 2004-03-03 | 2005-01-05 | 北京北大方正电子有限公司 | Method of binding digital contents and hardware with hardward adaptive |
CN101799851A (en) * | 2009-12-31 | 2010-08-11 | 黄定 | Method for canceling activation after networking activation of software |
CN102479305A (en) * | 2010-11-29 | 2012-05-30 | 金蝶软件(中国)有限公司 | Software licensing verification method and system |
CN102646022A (en) * | 2012-04-10 | 2012-08-22 | 北京搜狗科技发展有限公司 | Method and device for obtaining candidate |
CN103577744A (en) * | 2012-08-08 | 2014-02-12 | 上海赤炫信息科技有限公司 | Network on-line activating mode for Android mobile internet equipment |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110837643A (en) * | 2018-08-17 | 2020-02-25 | 阿里巴巴集团控股有限公司 | Activation method and device of trusted execution environment |
CN110837643B (en) * | 2018-08-17 | 2022-09-23 | 阿里巴巴集团控股有限公司 | Activation method and device of trusted execution environment |
CN109241701A (en) * | 2018-08-31 | 2019-01-18 | 郑州云海信息技术有限公司 | A kind of application program Activiation method, correlation technique and relevant apparatus |
CN111651734A (en) * | 2020-05-27 | 2020-09-11 | 支付宝(杭州)信息技术有限公司 | Installation management method, device, equipment and system for applet |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2225634B1 (en) | Alternate parts signature list file | |
CN103685138B (en) | The authentication method of the Android platform application software that mobile interchange is online and system | |
CN101051278B (en) | Method and system for automated operating system installation | |
US8364968B2 (en) | Dynamic web services systems and method for use of personal trusted devices and identity tokens | |
CN108111331A (en) | Acquisition methods, device, storage medium, processor and the system of updated data package | |
US20080109542A1 (en) | Software Distribution Application Supporting Operating System Installations | |
CN104809009B (en) | A kind of program bootload method of automobile electronic control unit | |
CN103780396B (en) | Token acquisition methods and device | |
US9959125B2 (en) | Field update of boot loader using regular device firmware update procedure | |
CN106095522A (en) | A kind of method realizing distributed compilation and distributed compilation system | |
CN106097058A (en) | E-commerce platform heterogeneous data processing method and system | |
CN106899437A (en) | A kind of method and apparatus of POS module firmware of upgrading | |
CN1696910B (en) | Efficient software patching method and system | |
CN107465728B (en) | Information processing method, central server and storage medium for identification code | |
CN106934257A (en) | A kind of program encryption methods and procedures encryption device | |
CN103713918A (en) | Software appliance installation systems and methods | |
CN107193607A (en) | Method and apparatus, storage medium, processor and terminal for updating code file | |
CN105975298A (en) | Method and system for remotely controlling applications of Android terminal | |
CN105589699A (en) | Serial number information update method, device and terminal | |
US20200374276A1 (en) | Provisioning system, provisioning method, provisioning program, and, network device | |
CN108710497A (en) | A kind of method for updating system of vehicle-mounted middle control and vehicle-mounted middle control | |
US8103804B2 (en) | Method and system for embedded regenerative licensing | |
US9336361B2 (en) | Feature license-related repair/replacement processes and credit handling | |
CN103365684A (en) | Updating method and multi-domain embedded system | |
CN114138303A (en) | Vehicle application program updating method, device, medium and vehicle |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170707 |