CN109033762A - A method of for solving complicated checked object soft ware authorization - Google Patents

A method of for solving complicated checked object soft ware authorization Download PDF

Info

Publication number
CN109033762A
CN109033762A CN201810733464.1A CN201810733464A CN109033762A CN 109033762 A CN109033762 A CN 109033762A CN 201810733464 A CN201810733464 A CN 201810733464A CN 109033762 A CN109033762 A CN 109033762A
Authority
CN
China
Prior art keywords
authorization
algorithm
encryption algorithm
irreversible
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810733464.1A
Other languages
Chinese (zh)
Inventor
梁亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Yunxinda Technology Co Ltd
Original Assignee
Nanjing Yunxinda Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Yunxinda Technology Co Ltd filed Critical Nanjing Yunxinda Technology Co Ltd
Priority to CN201810733464.1A priority Critical patent/CN109033762A/en
Publication of CN109033762A publication Critical patent/CN109033762A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices

Abstract

The invention discloses a kind of methods for solving complicated checked object soft ware authorization, this method includes 1) running Encryption Algorithm step, Encryption Algorithm includes irreversible encryption algorithm and irreversible cryptographic algorithm, and irreversible encryption algorithm is to carry out irreversible encryption to hardware key message using SHA256 algorithm to machine code;The irreversible cryptographic algorithm is RSA asymmetrical encryption algorithm, and in the RSA asymmetrical encryption algorithm, public key is generated without transmission, the software code of public key system where product;2) setting steps 3 are authorized) setting software interface, the method have the benefit that: all kinds of soft ware authorization demands are common to, no longer needs to do extra customization, can be used directly;Irreversible cryptographic algorithm is used in combination with irreversible encryption algorithm, so that authorization reliability is higher;Interface facilitates compatible more complicated demands convenient for extension.

Description

A method of for solving complicated checked object soft ware authorization
Technical field
The present invention relates to a kind of software authorization methods more particularly to a kind of for solving complicated checked object soft ware authorization Method.
Background technique
Verification object is not needed from product authorization and verifies specified object to product authorization, and industry way is multifarious.For Different product demands customizes different authorization solutions, will lead to exploitation and the increase of maintenance cost.In addition, all kinds of solutions Certainly the reliability of scheme can be difficult to judge because of the relationship excessively customized.Secondly, being verified for multi-quantity, the complicated of multiple types Object, there is no good settling modes for classical authorization software.Industry licensed software often leaves serious loophole, leads to product quilt It cracks easily.
Summary of the invention
The purpose of the present invention is to provide a kind of methods for solving complicated checked object soft ware authorization, solve existing skill Shortcoming existing for art.
The present invention adopts the following technical scheme that realization:
A method of for solving complicated checked object soft ware authorization, which is characterized in that this method comprises the following steps:
1) run Encryption Algorithm: the Encryption Algorithm includes irreversible encryption algorithm and irreversible cryptographic algorithm, it is described can not Reverse encryption algorithm is to carry out irreversible encryption to hardware key message using SHA256 Encryption Algorithm to machine code;It is described it is reversible plus Close algorithm is RSA asymmetrical encryption algorithm, and in the RSA asymmetrical encryption algorithm, public key is without transmission, and public key is by product The software code of place system generates;
2) authorization setting: after user possesses machine code, apply for authorization code to authorized party, authorization is carried out after authorized access code and is set It sets, receives the checked object of authorization code and user demand, it is reversible to overall data progress RSA to add after carrying out information integration It is close, ciphertext is stored in the specified place of system, authorization setting terminates;
3) software interface: the software interface includes that effective time (including year, month, day), the order of magnitude is authorized to compare class, is wrapped It includes larger and smaller than comparing, if do not allowed more than 5 login users, no more than 3 database, equivalent class.
Further, in step 1), machine code carries out more than twice hardware key message using SHA256 algorithm Combined type can not cryptographic calculation.
The method have the benefit that: all kinds of soft ware authorization demands are common to, no longer need to do extra customization, it can be direct It uses;Irreversible cryptographic algorithm is used in combination with irreversible encryption algorithm, so that authorization reliability is higher;Interface is convenient for extension, side Just compatible more complicated demands.
Detailed description of the invention
Fig. 1 is the flow chart of authorization verification.
Fig. 2 is the flow chart of authorization setting.
Specific embodiment
By the following description of the embodiment, the public understanding present invention will more be facilitated, but can't should be by Shen Given specific embodiment of asking someone is considered as the limitation to technical solution of the present invention, the definition of any pair of component or technical characteristic Be changed and/or to overall structure make form and immaterial transformation is regarded as defined by technical solution of the present invention Protection scope.
A method of for solving complicated checked object soft ware authorization, this method comprises the following steps:
1) Encryption Algorithm is run: where the Encryption Algorithm includes irreversible encryption algorithm and irreversible cryptographic algorithm, described Irreversible encryption algorithm is to carry out irreversible encryption to hardware key message using SHA256 algorithm to machine code;It is described it is reversible plus Close algorithm is RSA asymmetrical encryption algorithm, and in the RSA asymmetrical encryption algorithm, public key is without transmission, and public key is by product The software code of place system generates;In the present embodiment, machine code carries out hardware key message using SHA256 algorithm Combined type more than twice can not cryptographic calculation.
2) authorization setting: after user possesses machine code, apply for authorization code to authorized party, authorization is carried out after authorized access code and is set It sets, receives the checked object of authorization code and user demand, it is reversible to overall data progress RSA to add after carrying out information integration It is close, ciphertext is stored in the specified place of system, authorization setting terminates;
3) software interface: the software interface includes that effective time (including year, month, day), the order of magnitude is authorized to compare class, is wrapped It includes larger and smaller than comparing, if do not allowed more than 5 login users, no more than 3 database, equivalent class.
In the Authorization execution step of the present embodiment, scheme is divided into authorization verification and authorization setting two parts.
Authorization verification: when using this programme, whether verification product first is authorized when product use.First encrypted using SHA256 Algorithm obtains machine code, then is combined and through SHA256 Encryption Algorithm with salt figure and obtains authorization code.Then pass through RSA reversible algorithm The practical ciphertext retained of system is converted into authorization code and verification object, if system does not retain ciphertext, returns to machine code to use Family, user can be used this machine code and apply authorizing to authorized party.The authorization code and what is generated before award that comparison system retains again Weighted code, if authorization code is inconsistent, the authorization code for illustrating that system retains is invalid, returns to machine code.Finally compare verifying pair one by one As, if there is identifying object condition is not met, machine code is returned, if all being passed through by representing verification, the authorization that system retains Information is effective.
Authorization setting: after user possesses machine code, it can apply for authorization code to authorized party, be awarded after obtaining authorization code Power setting.Scheme receives the verification object of authorization code and user demand at this time.Carry out information integration after, to overall data into Row RSA reversible encryption.Ciphertext, which is stored in system, specifies authorization setting behind place to terminate.
Software interface: in addition to the input of authorization code, the input for verifying object is included in software interface, it is main comprising with Under several classes:
Time class, including year, month, day, i.e. authorization effective time;
The order of magnitude compares class, including larger and smaller than comparing, if do not allowed more than 5 login users, no more than 3 data Library etc.;
Equivalent class, the matching including number and character string;
Other classes, exploitation when having demand.
Certainly, the present invention can also have other various embodiments, without deviating from the spirit and substance of the present invention, Those skilled in the art can make various corresponding changes and modifications according to the present invention, but these it is corresponding change and Deformation all should fall within the scope of protection of the appended claims of the present invention.

Claims (2)

1. a kind of method for solving complicated checked object soft ware authorization, which is characterized in that this method comprises the following steps:
1) run Encryption Algorithm: the Encryption Algorithm includes irreversible encryption algorithm and irreversible cryptographic algorithm, it is described irreversible plus Close algorithm is to carry out irreversible encryption to hardware key message using SHA256 Encryption Algorithm to machine code;The reversible encryption is calculated Method is RSA asymmetrical encryption algorithm, and in the RSA asymmetrical encryption algorithm, public key is without transmission, and public key is where product The software code of system generates;
2) authorization setting: after user possesses machine code, applying for authorization code to authorized party, carry out authorization setting after authorized access code, The checked object of authorization code and user demand is received, after carrying out information integration, RSA reversible encryption is carried out to overall data, Ciphertext is stored in the specified place of system, authorization setting terminates;
3) software interface: the software interface includes that effective time, the order of magnitude is authorized to compare class, equivalent class.
2. the method according to claim 1 for solving complicated checked object soft ware authorization, which is characterized in that in step It 1), can not cryptographic calculation using the combined type that SHA256 algorithm carries out more than twice hardware key message to machine code in.
CN201810733464.1A 2018-07-05 2018-07-05 A method of for solving complicated checked object soft ware authorization Pending CN109033762A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810733464.1A CN109033762A (en) 2018-07-05 2018-07-05 A method of for solving complicated checked object soft ware authorization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810733464.1A CN109033762A (en) 2018-07-05 2018-07-05 A method of for solving complicated checked object soft ware authorization

Publications (1)

Publication Number Publication Date
CN109033762A true CN109033762A (en) 2018-12-18

Family

ID=64641160

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810733464.1A Pending CN109033762A (en) 2018-07-05 2018-07-05 A method of for solving complicated checked object soft ware authorization

Country Status (1)

Country Link
CN (1) CN109033762A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110601854A (en) * 2019-09-19 2019-12-20 许继集团有限公司 Authorization client, power distribution terminal equipment and authorization method thereof
CN110968844A (en) * 2019-12-02 2020-04-07 卫盈联信息技术(深圳)有限公司 Software authorization method in off-line state, server and readable storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1811787A (en) * 2006-02-15 2006-08-02 施兆洲 Method for preventing software from being embezzled
CN102402671A (en) * 2011-12-28 2012-04-04 苏州铭星科技股份有限公司 Method for preventing fraudulent use of software
CN102780699A (en) * 2012-07-09 2012-11-14 广州杰赛科技股份有限公司 Protecting method and protecting system for authentication server software copyright
CN103714273A (en) * 2013-12-31 2014-04-09 深圳市兴邦创新信息技术有限公司 Software authorization system and method based on online dynamic authorization
CN104166809A (en) * 2013-05-17 2014-11-26 广州杰赛科技股份有限公司 Control method and system for operating information system
CN105701402A (en) * 2014-11-24 2016-06-22 阿里巴巴集团控股有限公司 Method and device for monitoring display hijack
CN106503592A (en) * 2016-11-09 2017-03-15 深圳市德名利电子有限公司 Encryption method and system based on PLD
CN106603243A (en) * 2016-04-08 2017-04-26 数安时代科技股份有限公司 Digital signature private key processing method and system
CN106714274A (en) * 2016-06-23 2017-05-24 腾讯科技(深圳)有限公司 Access point connection method and device
CN107368744A (en) * 2016-04-11 2017-11-21 恩德莱斯和豪瑟尔分析仪表两合公司 For updating the method and the equipment of measurement and control technology of fastener components

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1811787A (en) * 2006-02-15 2006-08-02 施兆洲 Method for preventing software from being embezzled
CN102402671A (en) * 2011-12-28 2012-04-04 苏州铭星科技股份有限公司 Method for preventing fraudulent use of software
CN102780699A (en) * 2012-07-09 2012-11-14 广州杰赛科技股份有限公司 Protecting method and protecting system for authentication server software copyright
CN104166809A (en) * 2013-05-17 2014-11-26 广州杰赛科技股份有限公司 Control method and system for operating information system
CN103714273A (en) * 2013-12-31 2014-04-09 深圳市兴邦创新信息技术有限公司 Software authorization system and method based on online dynamic authorization
CN105701402A (en) * 2014-11-24 2016-06-22 阿里巴巴集团控股有限公司 Method and device for monitoring display hijack
CN106603243A (en) * 2016-04-08 2017-04-26 数安时代科技股份有限公司 Digital signature private key processing method and system
CN107368744A (en) * 2016-04-11 2017-11-21 恩德莱斯和豪瑟尔分析仪表两合公司 For updating the method and the equipment of measurement and control technology of fastener components
CN106714274A (en) * 2016-06-23 2017-05-24 腾讯科技(深圳)有限公司 Access point connection method and device
CN106503592A (en) * 2016-11-09 2017-03-15 深圳市德名利电子有限公司 Encryption method and system based on PLD

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110601854A (en) * 2019-09-19 2019-12-20 许继集团有限公司 Authorization client, power distribution terminal equipment and authorization method thereof
CN110968844A (en) * 2019-12-02 2020-04-07 卫盈联信息技术(深圳)有限公司 Software authorization method in off-line state, server and readable storage medium
CN110968844B (en) * 2019-12-02 2021-12-17 卫盈联信息技术(深圳)有限公司 Software authorization method in off-line state, server and readable storage medium

Similar Documents

Publication Publication Date Title
CN111080295B (en) Electronic contract processing method and device based on blockchain
JP2022070968A (en) Distributed, decentralized data aggregation
CN109460966A (en) Contract signing method, apparatus and terminal device based on requesting party's classification
CN107153786A (en) A kind of man-machine recognition methods, system and terminal device, readable storage medium storing program for executing
CN110598434B (en) House information processing method and device based on blockchain network, electronic equipment and storage medium
CN104994064B (en) A kind of authorization and authentication method and system based on client plug-in
CN106341381A (en) Method and system of key management for rack server system
US20140157368A1 (en) Software authentication
US9563763B1 (en) Enhanced captchas
CN110020526A (en) The measures and procedures for the examination and approval, device and storage medium based on block chain authentication
CN111541542B (en) Request sending and verifying method, device and equipment
CN109361508A (en) Data transmission method, electronic equipment and computer readable storage medium
CN112163240A (en) Block chain based distributed government affair architecture unifying method and system
CN105847000A (en) Token generation method and communication system based on same
CN112257086A (en) User privacy data protection method and electronic equipment
CN109792446A (en) Transient state trading server
CN107342966A (en) Authority credentials distribution method and device
CN113225297A (en) Data hybrid encryption method, device and equipment
CN110519280A (en) A kind of crawler recognition methods, device, computer equipment and storage medium
CN109033762A (en) A method of for solving complicated checked object soft ware authorization
CN108768938B (en) A kind of web data encryption and decryption method and device
CN110414253A (en) A kind of electronic health record management method, device, system and equipment based on block chain
CN108964883A (en) It is a kind of using smart phone as the digital certificate store of medium and endorsement method
CN112217632B (en) Identity authentication method and device based on intelligent contract and hash chain
CN111125734B (en) Data processing method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181218