CN108073792A - A kind of version authorization control system and method under (SuSE) Linux OS - Google Patents
A kind of version authorization control system and method under (SuSE) Linux OS Download PDFInfo
- Publication number
- CN108073792A CN108073792A CN201611041120.1A CN201611041120A CN108073792A CN 108073792 A CN108073792 A CN 108073792A CN 201611041120 A CN201611041120 A CN 201611041120A CN 108073792 A CN108073792 A CN 108073792A
- Authority
- CN
- China
- Prior art keywords
- module
- operating system
- version
- linux
- suse
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 86
- 238000013475 authorization Methods 0.000 title claims abstract description 64
- 238000012544 monitoring process Methods 0.000 claims abstract description 48
- 238000001514 detection method Methods 0.000 claims abstract description 22
- 230000008676 import Effects 0.000 claims abstract description 19
- 230000002159 abnormal effect Effects 0.000 claims abstract description 14
- 238000012986 modification Methods 0.000 claims description 7
- 230000004048 modification Effects 0.000 claims description 7
- 238000009434 installation Methods 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 8
- 230000018109 developmental process Effects 0.000 description 3
- 238000011217 control strategy Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000009545 invasion Effects 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 238000009825 accumulation Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000011017 operating method Methods 0.000 description 1
- 239000004575 stone Substances 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 230000033772 system development Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
- G06F21/1011—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to devices
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
A kind of version authorization control system and method under (SuSE) Linux OS, it is described including user space module and operating system module, whether the operating system module starts for the kernel program of real-time monitor operating system, and whether the time for monitoring user expires and whether operating system kernel module is complete;For the user space module to obtain the hardware information of hardware layer, generation feedback code, generation imports authority information, and the information for monitoring and monitoring according to operating system module, decides whether to prompt abnormal mandate.Version authorization control system and method under (SuSE) Linux OS provided by the invention, with system installation is complete start after add in detection kernel program whether starting module and system core module completeness check instrument, operating system kernel module is prevented to be illegally modified replacement and to occur " disk fill " more, overdue illegal a variety of violations such as use.
Description
Technical field
The present invention relates to computer security technique fields, and in particular to the version mandate control under a kind of (SuSE) Linux OS
System and method processed.
Background technology
In recent years, with the development of global IT application, computer-based network information system has become national
The important substance of economic development and informatization on nation defence construction basis and technology pillar.Computer is the weight of network information system development
One of point, wherein operating system is the important component of computer, and operating system is domestic base application software development and state
Family, collective, the foundation stone of personal information security, and it is to ensure that computer is stable, safe operation most basic using legal operating system
Factor.And pirate operating system is often changed in installation file, is even implanted virus, wooden horse, is seriously affected behaviour
Make the stability and reliability of system.
Fig. 1 is existing software copyright control method flow diagram, as shown in Figure 1, in the prior art, software copyright control
Method processed mainly includes the following steps:
S101:Client 201 periodically is initiated to ask for the copyright authentication of software to server-side 204, and client 201 can be with
It is actively communicated by agreement with server-side 204.
S102:Server-side 204 receive client 201 send copyright authentication request, by the copyright information in database with
Copyright authentication information in the copyright authentication request is compared, and is given birth to according to comparison result and default copyright control strategy
Into copyright control information.
S103:The copyright control information of generation is returned to client 201 by server-side 204.
S104:Client 201 carries out copyright control operation according to the copyright control information that server-side 204 returns to software.
Fig. 2 is existing software copyright control system structure diagram, as shown in Fig. 2, existing software copyright control system
Including client 201 and server-side 204.Wherein, client 201 includes request module 202 and control module 203.Server-side
204 include receiving module 205, authentication module 206 and sending module 207, wherein:
The client 201 and server-side 204 are communicated by network signal;
The request module 202 is asked for periodically initiating to be directed to the copyright authentication of software to server-side 204;
The control module 203 carries out copyright for reception and according to the copyright control information that server-side 204 returns to software
Control operation;
The receiving module 205 is used to receive the copyright authentication request of the transmission of client 201;
The authentication module 206 is used for the copyright authentication for being received the copyright information in database and receiving module 205 please
The copyright authentication information asked is compared, according to comparison result and default copyright control strategy generating copyright control information;
The sending module 207 is used to the copyright control information that authentication module 206 generates being sent to client 201.
Existing software copyright control method and system, there are it is following the shortcomings that:
1st, authorization message is treated in existing system and method(Feedback code)Only some most basic letters such as MAC Address of Network Card information
Breath.
2nd, time restriction on probation can easily be evaded by changing system time in existing system and method.
Copyright protection is world today's question of common concern, and Windows operating system is come usually using sequence number at present
Realization system copyright differentiates and safeguards that main function is that the system of oneself is usurped by others in order to prevent, protects intellectual property.
And (SuSE) Linux OS has since it plays the special role of other application software in bearing system and stablizes, imitates
Rate is high, loophole is few and Rapid-Repair, multi-task and multi-user, safer user and file permission strategy, suitable small kernel journey
The embedded system of sequence, relatively not cost source, are deeply liked by users, so its copyright protection seems even more important.
The content of the invention
There are very important status and influence power and present copyright in computer circle in view of (SuSE) Linux OS
The importance of protection to solve the deficiencies in the prior art, limits the pirate operating system of unauthorized and uses, prevent privately
Operating system is changed, destroy legal operating system integrality and occurs " disk fills " more, overdue a variety of fault feelings such as use
Condition provides a kind of safer more easily version authorization control system and method, and the present invention provides a kind of (SuSE) Linux OS
Under version authorization control system, including user space module and operating system module, wherein,
Whether the operating system module starts for the kernel program of real-time monitor operating system, and the time for monitoring user is
It is no to expire and whether operating system kernel module is complete;
The user space module is connected by operating system module with hardware layer, to obtain the hardware information of hardware layer, life
Into feedback code, generation imports authority information, meanwhile, it is according to operating system module monitoring and the information monitored, decision
No prompting is abnormal to be authorized.
Wherein, the operating system module includes process detection module, and the process detection module is awarded for monitoring version
Power control process whether there is, and start version authorization control process in the absence of;The process detection module includes monitoring
Scheduler module and gui monitoring scheduler module, wherein,
The monitoring process module tries out whether the time expires for monitoring user;
Whether the gui monitoring scheduler module is complete for monitor operating system nucleus module, and is finding operating system kernel
Operating system of user non-master operating system is prompted when module is replaced by modification.
Wherein, the monitoring process module is started by (SuSE) Linux OS kernel, the gui monitoring scheduler module by
Linux desktop environments start.
Wherein, the user space module includes feedback code generation module, authority information generating module, authority
Information import modul, version authorization control module, operating system kernel module and abnormal mandate reminding module, wherein,
The feedback code generation module is used to obtain the hardware information of hardware layer by operating system module and generates feedback code;
The authority information generating module is connected with feedback code generation module, for generating authority information;
The authority information import modul is connected with authority information generating module, for importing authority information;
The version authorization control module is connected with authority information import modul and operating system kernel module, for judging
Whether the authority information of importing is legal authorization file, while judges normal OS or start to try according to judging result
With phase overdue checking procedure;
The operating system kernel module is connected with version authorization control module, for the time on probation according to system and completely
The result of property checking procedure decides whether to prompt abnormal mandate;
The exception authorization module is connected with operating system kernel module, for being authorized extremely in operating system kernel module prompts
When start-up operation pollution course.
Wherein, acquired hardware information includes MAC Address, CPU sequence numbers, hard disk serial number and mainboard sequence number.
Invention additionally provides the version authentication control methods under a kind of (SuSE) Linux OS, include the following steps:
S1:User enters operating system;
S2:Version authorization control module and process detection module are called while os starting, to start version mandate control
Process processed and monitoring process process;
S3:Process detection module triggers monitoring process process when operating system meets condition, detects version authorization control process
It whether there is, and start version authorization control process in the absence of;
S4:Operating system imports the authority information of user, and version authorization control module judges whether it is legal authorization text
Part;
S5:Operating system starts gui monitoring scheduler module and the integrality of operating system kernel module is verified simultaneously.
Wherein, in the step S4, if authorized, normal use operating system;If unauthorized, start monitoring
Scheduler module carries out trial period overdue checking procedure.
Wherein, in the step S4, during unauthorized, if trial period overdue checking procedure result is trial period mistake,
Start abnormal mandate reminding module and perform pollution operation;If trial period non-mistake, normal use operating system, and would prompt user
Registration uses legal operating system.
Wherein, in the step S5, normal use operating system is continued if if completeness check, if it find that behaviour
Make system core module to be replaced by modification, then prompt operating system of user non-master operating system.
In the present invention, so-called GUI refers to graphic user interface.
Version authorization control system and method under (SuSE) Linux OS provided by the invention, installation is complete with system
After startup add in detection kernel program whether starting module and system core module completeness check instrument, prevent operating system core
Core module be illegally modified replacement and occur " disk fill " more, it is overdue it is illegal a variety of violations such as use, while existing
Authorization message is treated in copyright control(Feedback code)Only on the basis of MAC Address of Network Card information, more hardware informations and meter are increased newly
Calculation machine binding protection operating system exempts from pirate invasion, and make user's safe and secure uses legal operating system.
Description of the drawings
Fig. 1:Existing software copyright control method flow diagram;
Fig. 2:Existing software copyright control system structure diagram;
Fig. 3:Version authorization control system structure diagram under (SuSE) Linux OS provided by the invention;
Fig. 4:Version authentication control method flow chart under (SuSE) Linux OS provided by the invention;
Fig. 5:The work flow diagram of version authorization control system in one embodiment of the invention;
Fig. 6:Trial period overdue checking procedure flow chart in another embodiment of the present invention.
Reference sign
(The prior art)
201 clients
202 request modules
203 control modules
204 server-sides
205 receiving modules
206 authentication modules
207 sending modules
(The present invention)
10 operating system modules
11 process detection modules
111 gui monitoring scheduler modules
112 monitoring process modules
113 Linux desktop environments
114 (SuSE) Linux OS kernels
20 user space modules
21 feedback code generation modules
22 authority information generating modules
23 authority information import moduls
24 version authorization control modules
25 abnormal mandate reminding modules
26 operating system kernel modules
30 hardware layers.
Specific embodiment
In order to have further understanding to technical scheme and advantageous effect, below attached drawing is coordinated to be described in detail
Technical scheme and its advantageous effect of generation.
Fig. 3 is the version authorization control system structure diagram under (SuSE) Linux OS provided by the invention;Such as Fig. 3 institutes
Show, the present invention provides the version authorization control system under a kind of (SuSE) Linux OS, including user space module 20 and operation
System module 10, wherein,
Whether the operating system module 10 starts for the kernel program of real-time monitor operating system, and monitors the time of user
Whether expire and whether operating system kernel module is complete;
The user space module 20 is connected by operating system module 10 with hardware layer 30, to obtain the hardware of hardware layer 30
Information, generation feedback code, generation import authority information, meanwhile, the letter for monitoring and monitoring according to operating system module 10
Breath, decides whether to prompt abnormal mandate.
Specifically, the operating system module 10 includes process detection module 11, the process detection module 11 is used to supervise
Control version authorization control process whether there is, and start version authorization control process in the absence of;The process detection module
11 include monitoring process module 112 and gui monitoring scheduler module 111, wherein,
The monitoring process module 112 tries out whether the time expires for monitoring user;
Whether the gui monitoring scheduler module 111 is complete for monitor operating system nucleus module, and is finding operating system core
Operating system of user non-master operating system is prompted when core module is replaced by modification.
Preferably, the monitoring process module 112 is started by (SuSE) Linux OS kernel 114, the gui monitoring process
Module 111 is started by Linux desktop environments 113.
Specifically, the user space module 20 include feedback code generation module 21, authority information generating module 22,
Authority information import modul 23, version authorization control module 24, operating system kernel module 26 and abnormal authorize are prompted
Module 25, wherein,
The feedback code generation module 21 is used to obtain the hardware information of hardware layer 30 by operating system module 10 and generate anti-
Present code;
The authority information generating module 22 is connected with feedback code generation module 21, for generating authority information;
The authority information import modul 23 is connected with authority information generating module 22, for importing authority letter
Breath;
The version authorization control module 24 is connected with authority information import modul 23 and operating system kernel module 26, is used
In judge import authority information whether be legal authorization file, while according to judging result judge normal OS or
Start trial period overdue checking procedure;
The operating system kernel module 26 is connected with version authorization control module 24, for the time on probation according to system and
The result of integrity check process decides whether to prompt abnormal mandate;
The exception authorization module 25 is connected with operating system kernel module 26, for different in operating system kernel module prompts 26
Start-up operation pollution course when often mandate.
Wherein, acquired hardware information includes MAC Address, CPU sequence numbers, hard disk serial number and mainboard sequence number.
Version authorization control system under (SuSE) Linux OS provided by the invention, can improve operating system version mandate
The flexibility of control and security, by version authorization control module during (SuSE) Linux OS is used with user into
Row interaction, perceives user, to achieve the purpose that urge user using positive edition system, and then resists making for improper mandate version
With.
The present invention is suitable for (SuSE) Linux OS, the function of version authorization control is realized in a manner that system is installed, simultaneously
Achieve the purpose that again anti-piracy.
Fig. 4 is the version authentication control method flow chart under (SuSE) Linux OS provided by the invention;As shown in figure 4, this
Invention is additionally provided with the version authentication control method under a kind of (SuSE) Linux OS, includes the following steps:
S1:User enters operating system;
S2:Version authorization control module 24 and process detection module 11 are called while os starting, is awarded with starting version
Weigh control process and monitoring process process;
S3:Process detection module 11 triggers monitoring process process when operating system meets condition, detection version authorization control into
Journey whether there is, and start version authorization control process in the absence of;
S4:Operating system imports the authority information of user, and version authorization control module 24 judges whether it is legal authorization
File;If authorized, normal use operating system;If unauthorized, start monitoring process module 112 and carry out the trial period
Overdue checking procedure;During unauthorized, if trial period overdue checking procedure result is trial period mistake, starts abnormal authorize and carry
Show that module 25 performs pollution operation;If trial period non-mistake, normal use operating system, and it is legal that user's registration is prompted to use
Operating system;
S5:Operating system starts gui monitoring scheduler module 111 and carries out school to the integrality of operating system kernel module 26 simultaneously
It tests;Continue normal use operating system if if completeness check, if it find that operating system kernel module 26 by
Modification is replaced, then prompts operating system of user non-master operating system.
(SuSE) Linux OS version authentication control method provided by the invention, to being distributed to each of user with usual channel
The operating system of kind of version tries out it time and makes limitation, the trial period cannot be continuing with to rear user or " pollution " its
Operation during use treats authorization message, it is necessary to which user provides system according to what installation device hardware information generated(Feedback code)To public affairs
Department generates corresponding sequence number by company according to the information(license)It is handed down to user, user inputs the sequence number could be after
Continuous normal use operating system.
Version authentication control method under (SuSE) Linux OS provided by the invention, in the specific implementation, incorporated by reference to Fig. 5-
Shown in Fig. 6, following two specific embodiments are inventor provided:
Fig. 5 is the work flow diagram of version authorization control system in one embodiment of the invention, as shown in figure 5, the present invention provides
(SuSE) Linux OS under version authentication control method comprise the following steps:
S1:System starts, and user enters operating system;
S2:Version authorization control module and process detection module are called while os starting, to start version mandate control
Process processed and monitoring process process(It is not shown);
S3:Process detection module 11 can monitor system nucleus in each user's accessing system(That is version authorization control
Process)Whether start, start kernel program if not starting, step S4 is performed if having been started up;
S4:Version authorization control module 24 imports user authorization file, and operating system is continuing with if authorizing successfully;
S5:Gui monitoring scheduler module 111 hashes system file, and hashed value with the hashed value preserved is compared, is verified
Whether operating system is complete, if it is not, then the non-legal operating system of meeting timing prompting custom system version, if it is continues just
Often use.
Fig. 6 is the trial period overdue checking procedure flow chart in another embodiment of the present invention, as shown in fig. 6, of the invention
Version authentication control method under the (SuSE) Linux OS of offer can also be performed by following operating procedure:
S1:System boot(Step S2 and S3 is not shown);
S4:Judge whether system authorizes, if it is terminate, if otherwise performing step S41;
S41:By the usage time of system compared with the time threshold set, step S412 is performed if beyond threshold value;
If otherwise perform step S411;
S411:By cycle accumulor statistical system usage time, and meet at step S41 and judged;
S412:Prompt system is out of date if the usage time of system is more than the time on probation.
The beneficial effects of the present invention are:
1st, in the present invention, from operating system is logined to during exiting operating system, process detection module can supervise user in real time
It surveys whether kernel program starts, starts kernel program if not starting.
2nd, system core module completeness check instrument is added in the present invention, the integrality of system is verified, energy
Enough prevent operating system nucleus module be illegally modified replacement and occur " disk fill " more, it is overdue it is illegal use etc. it is a variety of
Violations.
3rd, the present invention combines closely control process and operating system, prevents user's deletion or kill authorization control processes.
4th, the present invention obtains hardware information by reading DMI information and being realized by two methods of read operation system interface
(MAC Address, CPU sequence numbers, hard disk serial number, mainboard sequence number etc.), DMI (Desktop Management
Interface, DMI) it is a kind of management system for helping to collect computer system information, by DMI, user can obtain sequence
Number, manufacturer computer, Serial Port Information and other system accessories information, read operation system interface can be in meeting under/proc catalogues
Main hardware information is preserved, hardware configuration information file is corresponded under the catalogue by reading, obtains system hardware information.This hair
Bright acquisition hardware information using both the above acquisition method, first goes acquisition information using reading DMI information and acquisition is tied simultaneously
Fruit is simultaneously analyzed, and is directly used if hardware information needed for taking out, if cannot if continue through read operation system
Interface gathers information and analyzes use, avoids the problem of hardware information does not collect as far as possible.Than the information in existed system more
Add it is abundant, by more hardware informations and computer binding protection operating system exempt from pirate invasion, with making user's safe and secure
Use legal operating system.
5th, the present invention in the time limit that energy valid metric system is tried out, is evaded by the usage time of cycle index Accumulation System
User attempts by changing system time come the operation of extended probationary period.
6th, the present invention can realize version authorization control with the startup of operating system, can improve operating system certification
Flexibility and security.
Although the present invention is illustrated using above-mentioned preferred embodiment, the protection model that however, it is not to limit the invention
It encloses, any those skilled in the art are not being departed within the spirit and scope of the present invention, and various changes are carried out with respect to above-described embodiment
It is dynamic still to belong to the scope of the invention protected with modification, therefore protection scope of the present invention is subject to what claims were defined.
Claims (9)
1. the version authorization control system under a kind of (SuSE) Linux OS, which is characterized in that including user space module and operation
System module, wherein,
Whether the operating system module starts for the kernel program of real-time monitor operating system, and the time for monitoring user is
It is no to expire and whether operating system kernel module is complete;
The user space module is connected by operating system module with hardware layer, to obtain the hardware information of hardware layer, life
Into feedback code, generation imports authority information, meanwhile, it is according to operating system module monitoring and the information monitored, decision
No prompting is abnormal to be authorized.
2. the version authorization control system under (SuSE) Linux OS as described in claim 1, which is characterized in that the operation
System module includes process detection module, and the process detection module whether there is for monitoring version authorization control process, and
Start version authorization control process in the absence of;The process detection module includes monitoring process module and gui monitoring process
Module, wherein,
The monitoring process module tries out whether the time expires for monitoring user;
Whether the gui monitoring scheduler module is complete for monitor operating system nucleus module, and is finding operating system kernel
Operating system of user non-master operating system is prompted when module is replaced by modification.
3. the version authorization control system under (SuSE) Linux OS as claimed in claim 2, which is characterized in that the monitoring
Scheduler module is started by (SuSE) Linux OS kernel, and the gui monitoring scheduler module is started by Linux desktop environments.
4. the version authorization control system under (SuSE) Linux OS as described in claim 1, which is characterized in that the user
Space module includes feedback code generation module, authority information generating module, authority information import modul, version mandate
Control module, operating system kernel module and abnormal mandate reminding module, wherein,
The feedback code generation module is used to obtain the hardware information of hardware layer by operating system module and generates feedback code;
The authority information generating module is connected with feedback code generation module, for generating authority information;
The authority information import modul is connected with authority information generating module, for importing authority information;
The version authorization control module is connected with authority information import modul and operating system kernel module, for judging
Whether the authority information of importing is legal authorization file, while judges normal OS or start to try according to judging result
With phase overdue checking procedure;
The operating system kernel module is connected with version authorization control module, for the time on probation according to system and completely
The result of property checking procedure decides whether to prompt abnormal mandate;
The exception authorization module is connected with operating system kernel module, for being authorized extremely in operating system kernel module prompts
When start-up operation pollution course.
5. the version authorization control system under (SuSE) Linux OS as described in claim 1, which is characterized in that acquired
Hardware information include MAC Address, CPU sequence numbers, hard disk serial number and mainboard sequence number.
6. the version authentication control method under a kind of (SuSE) Linux OS, which is characterized in that include the following steps:
S1:User enters operating system;
S2:Version authorization control module and process detection module are called while os starting, to start version mandate control
Process processed and monitoring process process;
S3:Process detection module triggers monitoring process process when operating system meets condition, detects version authorization control process
It whether there is, and start version authorization control process in the absence of;
S4:Operating system imports the authority information of user, and version authorization control module judges whether it is legal authorization text
Part;
S5:Operating system starts gui monitoring scheduler module and the integrality of operating system kernel module is verified simultaneously.
7. the version authentication control method under (SuSE) Linux OS as claimed in claim 6, which is characterized in that the step
In S4, if authorized, normal use operating system;If unauthorized, start monitoring process module carry out the trial period exceed
Phase checking procedure.
8. the version authentication control method under (SuSE) Linux OS as claimed in claim 7, which is characterized in that the step
In S4, during unauthorized, if trial period overdue checking procedure result is trial period mistake, starts and abnormal reminding module is authorized to hold
Row pollution operation;If trial period non-mistake, normal use operating system, and user's registration would be prompted to use legal operating system.
9. the version authentication control method under (SuSE) Linux OS as claimed in claim 6, which is characterized in that the step
In S5, continue normal use operating system if if completeness check, if it find that operating system kernel module by
Modification is replaced, then prompts operating system of user non-master operating system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611041120.1A CN108073792B (en) | 2016-11-10 | 2016-11-10 | Version authorization control system and method under Linux operating system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611041120.1A CN108073792B (en) | 2016-11-10 | 2016-11-10 | Version authorization control system and method under Linux operating system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108073792A true CN108073792A (en) | 2018-05-25 |
CN108073792B CN108073792B (en) | 2021-05-28 |
Family
ID=62161613
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611041120.1A Active CN108073792B (en) | 2016-11-10 | 2016-11-10 | Version authorization control system and method under Linux operating system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108073792B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110674475A (en) * | 2019-09-29 | 2020-01-10 | 北京可信华泰信息技术有限公司 | Authorization control method and device and trusted computing terminal |
CN115357869A (en) * | 2022-10-19 | 2022-11-18 | 安徽华云安科技有限公司 | Software activation method and device based on multipath configuration |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102456111A (en) * | 2011-07-12 | 2012-05-16 | 中标软件有限公司 | Method and system for license control of Linux operating system |
CN102982260A (en) * | 2012-11-12 | 2013-03-20 | 中标软件有限公司 | Linux operation system and verification method for installing serial number thereof |
CN104112098A (en) * | 2014-07-17 | 2014-10-22 | 中国人民解放军国防科学技术大学 | Loading control method for kernel module in operating system |
CN104866768A (en) * | 2015-05-15 | 2015-08-26 | 深圳怡化电脑股份有限公司 | Startup control method and device for ATM (Automatic Teller Machine) operating system |
CN105308610A (en) * | 2013-03-26 | 2016-02-03 | 爱迪德技术有限公司 | Method and system for platform and user application security on a device |
-
2016
- 2016-11-10 CN CN201611041120.1A patent/CN108073792B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102456111A (en) * | 2011-07-12 | 2012-05-16 | 中标软件有限公司 | Method and system for license control of Linux operating system |
CN102982260A (en) * | 2012-11-12 | 2013-03-20 | 中标软件有限公司 | Linux operation system and verification method for installing serial number thereof |
CN105308610A (en) * | 2013-03-26 | 2016-02-03 | 爱迪德技术有限公司 | Method and system for platform and user application security on a device |
CN104112098A (en) * | 2014-07-17 | 2014-10-22 | 中国人民解放军国防科学技术大学 | Loading control method for kernel module in operating system |
CN104866768A (en) * | 2015-05-15 | 2015-08-26 | 深圳怡化电脑股份有限公司 | Startup control method and device for ATM (Automatic Teller Machine) operating system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110674475A (en) * | 2019-09-29 | 2020-01-10 | 北京可信华泰信息技术有限公司 | Authorization control method and device and trusted computing terminal |
CN115357869A (en) * | 2022-10-19 | 2022-11-18 | 安徽华云安科技有限公司 | Software activation method and device based on multipath configuration |
Also Published As
Publication number | Publication date |
---|---|
CN108073792B (en) | 2021-05-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2620998C2 (en) | Method and authentication device for unlocking administrative rights | |
CN103368973B (en) | A kind of cloud operating system security system | |
US20150261554A1 (en) | System and methods for remote maintenance in an electronic network with multiple clients | |
CN110175466B (en) | Security management method and device for open platform, computer equipment and storage medium | |
CN105743903B (en) | Digital audio copyright managing method, intelligent terminal, certificate server and system | |
CN108295477B (en) | Game account safety detection method, system and device based on big data | |
CN111064757A (en) | Application access method and device, electronic equipment and storage medium | |
CN102457491B (en) | Dynamic identity authenticating method and system | |
CN1981277A (en) | Quarantine system | |
WO2013079037A1 (en) | Method for allowing user access, client, server, and system | |
CN105429943B (en) | Information processing method and terminal thereof | |
JP2014534515A5 (en) | ||
CN109088857A (en) | A kind of distributed authorization management method under scenes of internet of things | |
CN106992859B (en) | Bastion machine private key management method and device | |
CN110032835A (en) | A kind of soft encryption technology preventing software duplication and migration | |
CN108073792A (en) | A kind of version authorization control system and method under (SuSE) Linux OS | |
CN102427459A (en) | Offline authorization method based on Usbkeys | |
CN101854357B (en) | Method and system for monitoring network authentication | |
CN110474916A (en) | Web oriented application provides the method and device of franchise account | |
US9954833B2 (en) | Management of access sessions | |
Xia et al. | Security Access Solution of Cloud Services for Trusted Mobile Terminals Based on TrustZone. | |
KR20100068046A (en) | Apparatus for managing identity data and method thereof | |
CN107276967B (en) | Distributed system and login verification method thereof | |
CN116346415A (en) | Multi-factor login authentication method and device for industrial control PLC system and PLC system | |
CN113542438B (en) | Method and device for entering link of linked user, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |