CN109033762A - A method of for solving complicated checked object soft ware authorization - Google Patents
A method of for solving complicated checked object soft ware authorization Download PDFInfo
- Publication number
- CN109033762A CN109033762A CN201810733464.1A CN201810733464A CN109033762A CN 109033762 A CN109033762 A CN 109033762A CN 201810733464 A CN201810733464 A CN 201810733464A CN 109033762 A CN109033762 A CN 109033762A
- Authority
- CN
- China
- Prior art keywords
- authorization
- algorithm
- encryption algorithm
- irreversible
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000013475 authorization Methods 0.000 title claims abstract description 50
- 238000000034 method Methods 0.000 title claims abstract description 18
- 230000002427 irreversible effect Effects 0.000 claims abstract description 20
- 230000005540 biological transmission Effects 0.000 claims abstract description 4
- 230000002441 reversible effect Effects 0.000 claims description 9
- 230000010354 integration Effects 0.000 claims description 4
- 238000004364 calculation method Methods 0.000 claims description 3
- 238000012795 verification Methods 0.000 description 8
- 239000000047 product Substances 0.000 description 6
- 239000006227 byproduct Substances 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 150000003839 salts Chemical class 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
Abstract
The invention discloses a kind of methods for solving complicated checked object soft ware authorization, this method includes 1) running Encryption Algorithm step, Encryption Algorithm includes irreversible encryption algorithm and irreversible cryptographic algorithm, and irreversible encryption algorithm is to carry out irreversible encryption to hardware key message using SHA256 algorithm to machine code;The irreversible cryptographic algorithm is RSA asymmetrical encryption algorithm, and in the RSA asymmetrical encryption algorithm, public key is generated without transmission, the software code of public key system where product;2) setting steps 3 are authorized) setting software interface, the method have the benefit that: all kinds of soft ware authorization demands are common to, no longer needs to do extra customization, can be used directly;Irreversible cryptographic algorithm is used in combination with irreversible encryption algorithm, so that authorization reliability is higher;Interface facilitates compatible more complicated demands convenient for extension.
Description
Technical field
The present invention relates to a kind of software authorization methods more particularly to a kind of for solving complicated checked object soft ware authorization
Method.
Background technique
Verification object is not needed from product authorization and verifies specified object to product authorization, and industry way is multifarious.For
Different product demands customizes different authorization solutions, will lead to exploitation and the increase of maintenance cost.In addition, all kinds of solutions
Certainly the reliability of scheme can be difficult to judge because of the relationship excessively customized.Secondly, being verified for multi-quantity, the complicated of multiple types
Object, there is no good settling modes for classical authorization software.Industry licensed software often leaves serious loophole, leads to product quilt
It cracks easily.
Summary of the invention
The purpose of the present invention is to provide a kind of methods for solving complicated checked object soft ware authorization, solve existing skill
Shortcoming existing for art.
The present invention adopts the following technical scheme that realization:
A method of for solving complicated checked object soft ware authorization, which is characterized in that this method comprises the following steps:
1) run Encryption Algorithm: the Encryption Algorithm includes irreversible encryption algorithm and irreversible cryptographic algorithm, it is described can not
Reverse encryption algorithm is to carry out irreversible encryption to hardware key message using SHA256 Encryption Algorithm to machine code;It is described it is reversible plus
Close algorithm is RSA asymmetrical encryption algorithm, and in the RSA asymmetrical encryption algorithm, public key is without transmission, and public key is by product
The software code of place system generates;
2) authorization setting: after user possesses machine code, apply for authorization code to authorized party, authorization is carried out after authorized access code and is set
It sets, receives the checked object of authorization code and user demand, it is reversible to overall data progress RSA to add after carrying out information integration
It is close, ciphertext is stored in the specified place of system, authorization setting terminates;
3) software interface: the software interface includes that effective time (including year, month, day), the order of magnitude is authorized to compare class, is wrapped
It includes larger and smaller than comparing, if do not allowed more than 5 login users, no more than 3 database, equivalent class.
Further, in step 1), machine code carries out more than twice hardware key message using SHA256 algorithm
Combined type can not cryptographic calculation.
The method have the benefit that: all kinds of soft ware authorization demands are common to, no longer need to do extra customization, it can be direct
It uses;Irreversible cryptographic algorithm is used in combination with irreversible encryption algorithm, so that authorization reliability is higher;Interface is convenient for extension, side
Just compatible more complicated demands.
Detailed description of the invention
Fig. 1 is the flow chart of authorization verification.
Fig. 2 is the flow chart of authorization setting.
Specific embodiment
By the following description of the embodiment, the public understanding present invention will more be facilitated, but can't should be by Shen
Given specific embodiment of asking someone is considered as the limitation to technical solution of the present invention, the definition of any pair of component or technical characteristic
Be changed and/or to overall structure make form and immaterial transformation is regarded as defined by technical solution of the present invention
Protection scope.
A method of for solving complicated checked object soft ware authorization, this method comprises the following steps:
1) Encryption Algorithm is run: where the Encryption Algorithm includes irreversible encryption algorithm and irreversible cryptographic algorithm, described
Irreversible encryption algorithm is to carry out irreversible encryption to hardware key message using SHA256 algorithm to machine code;It is described it is reversible plus
Close algorithm is RSA asymmetrical encryption algorithm, and in the RSA asymmetrical encryption algorithm, public key is without transmission, and public key is by product
The software code of place system generates;In the present embodiment, machine code carries out hardware key message using SHA256 algorithm
Combined type more than twice can not cryptographic calculation.
2) authorization setting: after user possesses machine code, apply for authorization code to authorized party, authorization is carried out after authorized access code and is set
It sets, receives the checked object of authorization code and user demand, it is reversible to overall data progress RSA to add after carrying out information integration
It is close, ciphertext is stored in the specified place of system, authorization setting terminates;
3) software interface: the software interface includes that effective time (including year, month, day), the order of magnitude is authorized to compare class, is wrapped
It includes larger and smaller than comparing, if do not allowed more than 5 login users, no more than 3 database, equivalent class.
In the Authorization execution step of the present embodiment, scheme is divided into authorization verification and authorization setting two parts.
Authorization verification: when using this programme, whether verification product first is authorized when product use.First encrypted using SHA256
Algorithm obtains machine code, then is combined and through SHA256 Encryption Algorithm with salt figure and obtains authorization code.Then pass through RSA reversible algorithm
The practical ciphertext retained of system is converted into authorization code and verification object, if system does not retain ciphertext, returns to machine code to use
Family, user can be used this machine code and apply authorizing to authorized party.The authorization code and what is generated before award that comparison system retains again
Weighted code, if authorization code is inconsistent, the authorization code for illustrating that system retains is invalid, returns to machine code.Finally compare verifying pair one by one
As, if there is identifying object condition is not met, machine code is returned, if all being passed through by representing verification, the authorization that system retains
Information is effective.
Authorization setting: after user possesses machine code, it can apply for authorization code to authorized party, be awarded after obtaining authorization code
Power setting.Scheme receives the verification object of authorization code and user demand at this time.Carry out information integration after, to overall data into
Row RSA reversible encryption.Ciphertext, which is stored in system, specifies authorization setting behind place to terminate.
Software interface: in addition to the input of authorization code, the input for verifying object is included in software interface, it is main comprising with
Under several classes:
Time class, including year, month, day, i.e. authorization effective time;
The order of magnitude compares class, including larger and smaller than comparing, if do not allowed more than 5 login users, no more than 3 data
Library etc.;
Equivalent class, the matching including number and character string;
Other classes, exploitation when having demand.
Certainly, the present invention can also have other various embodiments, without deviating from the spirit and substance of the present invention,
Those skilled in the art can make various corresponding changes and modifications according to the present invention, but these it is corresponding change and
Deformation all should fall within the scope of protection of the appended claims of the present invention.
Claims (2)
1. a kind of method for solving complicated checked object soft ware authorization, which is characterized in that this method comprises the following steps:
1) run Encryption Algorithm: the Encryption Algorithm includes irreversible encryption algorithm and irreversible cryptographic algorithm, it is described irreversible plus
Close algorithm is to carry out irreversible encryption to hardware key message using SHA256 Encryption Algorithm to machine code;The reversible encryption is calculated
Method is RSA asymmetrical encryption algorithm, and in the RSA asymmetrical encryption algorithm, public key is without transmission, and public key is where product
The software code of system generates;
2) authorization setting: after user possesses machine code, applying for authorization code to authorized party, carry out authorization setting after authorized access code,
The checked object of authorization code and user demand is received, after carrying out information integration, RSA reversible encryption is carried out to overall data,
Ciphertext is stored in the specified place of system, authorization setting terminates;
3) software interface: the software interface includes that effective time, the order of magnitude is authorized to compare class, equivalent class.
2. the method according to claim 1 for solving complicated checked object soft ware authorization, which is characterized in that in step
It 1), can not cryptographic calculation using the combined type that SHA256 algorithm carries out more than twice hardware key message to machine code in.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810733464.1A CN109033762A (en) | 2018-07-05 | 2018-07-05 | A method of for solving complicated checked object soft ware authorization |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810733464.1A CN109033762A (en) | 2018-07-05 | 2018-07-05 | A method of for solving complicated checked object soft ware authorization |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109033762A true CN109033762A (en) | 2018-12-18 |
Family
ID=64641160
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810733464.1A Pending CN109033762A (en) | 2018-07-05 | 2018-07-05 | A method of for solving complicated checked object soft ware authorization |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109033762A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110601854A (en) * | 2019-09-19 | 2019-12-20 | 许继集团有限公司 | Authorization client, power distribution terminal equipment and authorization method thereof |
CN110968844A (en) * | 2019-12-02 | 2020-04-07 | 卫盈联信息技术(深圳)有限公司 | Software authorization method in off-line state, server and readable storage medium |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1811787A (en) * | 2006-02-15 | 2006-08-02 | 施兆洲 | Method for preventing software from being embezzled |
CN102402671A (en) * | 2011-12-28 | 2012-04-04 | 苏州铭星科技股份有限公司 | Method for preventing fraudulent use of software |
CN102780699A (en) * | 2012-07-09 | 2012-11-14 | 广州杰赛科技股份有限公司 | Protecting method and protecting system for authentication server software copyright |
CN103714273A (en) * | 2013-12-31 | 2014-04-09 | 深圳市兴邦创新信息技术有限公司 | Software authorization system and method based on online dynamic authorization |
CN104166809A (en) * | 2013-05-17 | 2014-11-26 | 广州杰赛科技股份有限公司 | Control method and system for operating information system |
CN105701402A (en) * | 2014-11-24 | 2016-06-22 | 阿里巴巴集团控股有限公司 | Method and device for monitoring display hijack |
CN106503592A (en) * | 2016-11-09 | 2017-03-15 | 深圳市德名利电子有限公司 | Encryption method and system based on PLD |
CN106603243A (en) * | 2016-04-08 | 2017-04-26 | 数安时代科技股份有限公司 | Digital signature private key processing method and system |
CN106714274A (en) * | 2016-06-23 | 2017-05-24 | 腾讯科技(深圳)有限公司 | Access point connection method and device |
CN107368744A (en) * | 2016-04-11 | 2017-11-21 | 恩德莱斯和豪瑟尔分析仪表两合公司 | For updating the method and the equipment of measurement and control technology of fastener components |
-
2018
- 2018-07-05 CN CN201810733464.1A patent/CN109033762A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1811787A (en) * | 2006-02-15 | 2006-08-02 | 施兆洲 | Method for preventing software from being embezzled |
CN102402671A (en) * | 2011-12-28 | 2012-04-04 | 苏州铭星科技股份有限公司 | Method for preventing fraudulent use of software |
CN102780699A (en) * | 2012-07-09 | 2012-11-14 | 广州杰赛科技股份有限公司 | Protecting method and protecting system for authentication server software copyright |
CN104166809A (en) * | 2013-05-17 | 2014-11-26 | 广州杰赛科技股份有限公司 | Control method and system for operating information system |
CN103714273A (en) * | 2013-12-31 | 2014-04-09 | 深圳市兴邦创新信息技术有限公司 | Software authorization system and method based on online dynamic authorization |
CN105701402A (en) * | 2014-11-24 | 2016-06-22 | 阿里巴巴集团控股有限公司 | Method and device for monitoring display hijack |
CN106603243A (en) * | 2016-04-08 | 2017-04-26 | 数安时代科技股份有限公司 | Digital signature private key processing method and system |
CN107368744A (en) * | 2016-04-11 | 2017-11-21 | 恩德莱斯和豪瑟尔分析仪表两合公司 | For updating the method and the equipment of measurement and control technology of fastener components |
CN106714274A (en) * | 2016-06-23 | 2017-05-24 | 腾讯科技(深圳)有限公司 | Access point connection method and device |
CN106503592A (en) * | 2016-11-09 | 2017-03-15 | 深圳市德名利电子有限公司 | Encryption method and system based on PLD |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110601854A (en) * | 2019-09-19 | 2019-12-20 | 许继集团有限公司 | Authorization client, power distribution terminal equipment and authorization method thereof |
CN110968844A (en) * | 2019-12-02 | 2020-04-07 | 卫盈联信息技术(深圳)有限公司 | Software authorization method in off-line state, server and readable storage medium |
CN110968844B (en) * | 2019-12-02 | 2021-12-17 | 卫盈联信息技术(深圳)有限公司 | Software authorization method in off-line state, server and readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111080295B (en) | Electronic contract processing method and device based on blockchain | |
JP2022070968A (en) | Distributed, decentralized data aggregation | |
CN109460966A (en) | Contract signing method, apparatus and terminal device based on requesting party's classification | |
CN107153786A (en) | A kind of man-machine recognition methods, system and terminal device, readable storage medium storing program for executing | |
CN110598434B (en) | House information processing method and device based on blockchain network, electronic equipment and storage medium | |
CN104994064B (en) | A kind of authorization and authentication method and system based on client plug-in | |
CN106341381A (en) | Method and system of key management for rack server system | |
US20140157368A1 (en) | Software authentication | |
US9563763B1 (en) | Enhanced captchas | |
CN110020526A (en) | The measures and procedures for the examination and approval, device and storage medium based on block chain authentication | |
CN111541542B (en) | Request sending and verifying method, device and equipment | |
CN109361508A (en) | Data transmission method, electronic equipment and computer readable storage medium | |
CN112163240A (en) | Block chain based distributed government affair architecture unifying method and system | |
CN105847000A (en) | Token generation method and communication system based on same | |
CN112257086A (en) | User privacy data protection method and electronic equipment | |
CN109792446A (en) | Transient state trading server | |
CN107342966A (en) | Authority credentials distribution method and device | |
CN113225297A (en) | Data hybrid encryption method, device and equipment | |
CN110519280A (en) | A kind of crawler recognition methods, device, computer equipment and storage medium | |
CN109033762A (en) | A method of for solving complicated checked object soft ware authorization | |
CN108768938B (en) | A kind of web data encryption and decryption method and device | |
CN110414253A (en) | A kind of electronic health record management method, device, system and equipment based on block chain | |
CN108964883A (en) | It is a kind of using smart phone as the digital certificate store of medium and endorsement method | |
CN112217632B (en) | Identity authentication method and device based on intelligent contract and hash chain | |
CN111125734B (en) | Data processing method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181218 |