CN109086576A - Licensing dissemination method, License Authentication method, system and electronic equipment - Google Patents

Licensing dissemination method, License Authentication method, system and electronic equipment Download PDF

Info

Publication number
CN109086576A
CN109086576A CN201810851596.4A CN201810851596A CN109086576A CN 109086576 A CN109086576 A CN 109086576A CN 201810851596 A CN201810851596 A CN 201810851596A CN 109086576 A CN109086576 A CN 109086576A
Authority
CN
China
Prior art keywords
feature code
software product
data
preset
shared key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810851596.4A
Other languages
Chinese (zh)
Inventor
杨斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Maipu Communication Technology Co Ltd
Original Assignee
Maipu Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Maipu Communication Technology Co Ltd filed Critical Maipu Communication Technology Co Ltd
Priority to CN201810851596.4A priority Critical patent/CN109086576A/en
Publication of CN109086576A publication Critical patent/CN109086576A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/101Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Power Engineering (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the present invention provides licensing dissemination method, License Authentication method, system and electronic equipment, belongs to field of computer technology.This method comprises: obtaining the fisrt feature code for storing the move media of software product, the second feature code of software product and default shared key;Signed data is generated according to fisrt feature code, second feature code and default shared key;The license file of software product is generated according to signed data;License file is stored on move media in the predetermined directory of software product.By the way that the second feature code of the fisrt feature code of permission and move media, software product and default shared key are realized binding in this programme, so that after user replaces server when application license authorization again, it only needs to can be completed by move media, and no longer needs as in the prior art to authorization server again application license authorization.

Description

Licensing dissemination method, License Authentication method, system and electronic equipment
Technical field
The present invention relates to field of computer technology, in particular to licensing dissemination method, License Authentication method, are System and electronic equipment.
Background technique
The piracy of software and illegal using annoying Software Development quotient always, it directly result in sales slip and Profit is lost, and has greatly hit the enthusiasm of Software Development quotient, and greatly hinders the development of software industry.In order to protect Intellectual property is protected, prevents from illegally using, application software protection technique universal at present is to provide a user License (licensing) File is controlled software and is used within the scope of authority by the operation of License document control software product.
And in the prior art, it is user when applying for License authority, by providing installation to software developer The equipment condition code of the server of License file, such as: MAC (Media Access Control, media access control) Location, CPU (Central Processing Unit, central processing unit) sequence number, hard disk serial number etc., to be authorized.Make Obtain the equipment feature that user needs to provide again when replacing server the server of installation License file to software developer Code is to apply authorizing, to influence the use of user.Simultaneously as MAC Address etc. can be repaired by some technological means Change, if unauthorized person knows the generating algorithm of License file by back door, will lead to the permission of software product Large area failure, and bring about great losses to software developer.
Summary of the invention
To solve the above problems, the embodiment of the present invention provides licensing dissemination method, License Authentication method, system and electronics Equipment.
In a first aspect, the embodiment of the invention provides a kind of licensing dissemination methods, which comprises obtain for depositing Store up the fisrt feature code of move media, the second feature code of the software product and the default shared key of software product;Root Signed data is generated according to the fisrt feature code, the second feature code and the default shared key;According to the number of signature According to the license file for generating the software product;The license file is stored in the software on the move media to produce In the predetermined directory of product.In this method, pass through the fisrt feature code of move media, the second feature code of software product and default Shared key generates signed data, and the license file of software product is generated by signed data, thus by permission and The fisrt feature code of move media, the second feature code of software product and default shared key realize binding, to enhance Safety.And by completing the permission of software product by move media, and the authorization of software product no longer needs It is bound with the software server of user, so that will not be awarded even if the features such as software server MAC Address of user are tampered It weighs, when further improving the safety of authorization, and applying for that License is authorized again after user replaces server, only needs Can be completed by move media, and no longer need to apply again License authorize, so, compared with the existing technology in award The problem for weighing existing safety and Authorized operation trouble, then use fisrt feature code, the software of move media in this programme The second feature code of product and default shared key come complete authorization then operate it is simpler and safer so that user is more It changes after server and no longer needs to apply again that License is authorized, thereby reduce the fussy degree of Authorized operation and improve The safety of authorization.
Further, shared key is preset in the acquisition, comprising: is obtained from preset pool of keys according to preset rules One or more keys are as default shared key.
Further, described raw according to the fisrt feature code, the second feature code and the default shared key At signed data, comprising: shared by MD5 hashing algorithm to the fisrt feature code, the second feature code and described preset Key is signed, and the signed data is generated.
Further, described raw according to the fisrt feature code, the second feature code and the default shared key At signed data, comprising: the fisrt feature code, the second feature code and the default shared key are combined, it is raw At data to be signed;It is signed by MD5 hashing algorithm to the data to be signed, generates the signed data.
Further, in the predetermined directory that the license file is stored in the software product, comprising: will The license file is stored in the predetermined directory of the software product and hides.
Second aspect, the embodiment of the invention provides a kind of License Authentication methods, which comprises to target software When product carries out predetermined registration operation, the fisrt feature code for storing the move media of the target software product is obtained;And described in obtaining Preset default shared key in the second feature code and the acquisition target software product of target software product;According to described Fisrt feature code, the second feature code and default shared key generate Target Signature data;Obtain the target software product In preset license file, the license file includes preset signed data;Wherein, the Target Signature data are generated Rule is identical as the rule for generating the preset signed data;Judge the Target Signature data whether with the preset number of signature According to matching;If the Target Signature data are matched with the preset signed data, to described in target software product progress Predetermined registration operation.
Further, the acquisition stores the fisrt feature code of the move media of the target software product, comprising: root The fisrt feature code for storing the move media of the target software product is obtained according to prefixed time interval.
The third aspect, the embodiment of the present invention provide a kind of licensing delivery system, the system comprises: data acquisition mould Block, for obtain the second feature code of the fisrt feature code of the move media for storing software product, the software product with And default shared key;First data processing module, for according to the fisrt feature code, the second feature code and described pre- If shared key generates signed data;Second data processing module, for generating the software product according to the signed data License file;Data memory module is produced for the license file to be stored in the software on the move media In the predetermined directory of product.
Fourth aspect, the embodiment of the present invention provide a kind of License Authentication system, the system comprises: the first data acquisition mould Block, for when carrying out predetermined registration operation to target software product, obtaining the of the move media for storing the target software product One condition code;And it obtains the second feature code of the target software product and obtains preset pre- in the target software product If shared key;Data generation module, for raw according to the fisrt feature code, the second feature code and default shared key At Target Signature data;Second data acquisition module, for obtaining license file preset in the target software product, institute Stating license file includes preset signed data;Wherein, the rule and the generation preset label of the Target Signature data are generated The rule of name data is identical;Data processing module, for judge the Target Signature data whether with the preset signed data Matching;Execution module produces the target software if matching for the Target Signature data with the preset signed data Product carry out the predetermined registration operation.
5th aspect, the embodiment of the present invention provide a kind of electronic equipment, including processor and memory, the memory It is stored with computer-readable instruction fetch, when the computer-readable instruction fetch is executed by the processor, operation such as above-mentioned the On the one hand the method provided;Alternatively, when the computer-readable instruction fetch is executed by the processor, operation such as above-mentioned second The method that aspect provides.
Compared with prior art, licensing dissemination method provided in an embodiment of the present invention, License Authentication method, system and electricity Sub- equipment brings following the utility model has the advantages that by the fisrt feature code of move media, the second feature code of software product and pre- If shared key generates signed data, and generates the license file of software product by signed data, thus by permission It realizes and binds with the fisrt feature code of move media, the second feature code of software product and default shared key, to enhance Safety.And by completing the permission of software product by move media, and the authorization of software product no longer needs It to bind with the software server of user, so that the features such as software server MAC Address of user are tampered, will not be awarded It weighs, when further improving the safety of authorization, and applying for that License is authorized again after user replaces server, only needs Can be completed by move media, and no longer need to apply again License authorize, so, compared with the existing technology in award The problem for weighing existing safety and Authorized operation trouble, then use fisrt feature code, the software of move media in this programme The second feature code of product and default shared key come complete authorization then operate it is simpler and safer so that user is more It changes after server and no longer needs to apply again that License is authorized, thereby reduce the fussy degree of Authorized operation and improve The safety of authorization.
Other features and advantages of the present invention will be illustrated in subsequent specification, also, partly be become from specification It is clear that by implementing understanding of the embodiment of the present invention.The objectives and other advantages of the invention can be by written theory Specifically noted structure is achieved and obtained in bright book, claims and attached drawing.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is a kind of flow chart for licensing dissemination method that first embodiment of the invention provides;
Fig. 2 is a kind of flow chart for License Authentication method that second embodiment of the invention provides;
Fig. 3 is a kind of structural block diagram for licensing delivery system that third embodiment of the invention provides;
Fig. 4 is a kind of structural block diagram for License Authentication system that fourth embodiment of the invention provides;
Fig. 5 shows a kind of structural block diagram that can be applied to the electronic equipment in the embodiment of the present invention;
Fig. 6 is another structural schematic diagram of a kind of electronic equipment provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause This, is not intended to limit claimed invention to the detailed description of the embodiment of the present invention provided in the accompanying drawings below Range, but it is merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not doing Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
First embodiment
Since existing permission is user when applying for License authority, by being provided to software developer The equipment condition code of the server of License file is installed, such as: MAC Address, CPU sequence number, hard disk serial number etc., thus It is authorized.So that user needs to provide the service of installation License file to software developer again when replacing server The equipment condition code of device, in order to reduce the fussy degree of Authorized operation, present embodiments provides a kind of licensing to apply authorizing Dissemination method, it should be noted that step shown in the flowchart of the accompanying drawings can be in such as a group of computer-executable instructions Computer system in execute, although also, logical order is shown in flow charts, in some cases, can be with Shown or described step is executed different from sequence herein.It describes in detail below to the present embodiment.
Fig. 1 is please referred to, Fig. 1 is a kind of flow chart of licensing dissemination method provided in an embodiment of the present invention, the method Include the following steps:
Step S101: for storing the fisrt feature code of the move media of software product, the software product is obtained Two condition codes and default shared key.
Wherein, move media may be, but not limited to, USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey The medium of sequence software product.
Fisrt feature code may be, but not limited to, PID (ProductID, product ID), VID (VendorID, supply Quotient ID) or SN (Serial number, sequence number) etc..
Second feature code may be, but not limited to, software version number, the MD5 Hash signature of software product installation package file or One characteristic of this software product of unique identification is (for example, this feature data can be with software product function or version number Then the character string that combination is formed combines the character string to be formed with version number for 1 for example, representing function with 1) etc..
For example, second feature code can be by the signed data after software version number progress MD5 Hash signature.
In actual use, presetting shared key is key preset in licensing Core Generator and software product, can To be 1 key, it is also possible to pool of keys.
As an implementation, step S101 includes: the first spy for obtaining the move media for storing software product Sign code, the software product second feature code and is obtained from preset pool of keys according to preset rules one or more it is close Key is as default shared key.
Optionally, obtained from preset pool of keys according to preset rules one or more keys as it is default share it is close Key, comprising: obtain one or more keys from preset pool of keys according to random algorithm as default shared key.
Optionally, obtained from preset pool of keys according to preset rules one or more keys as it is default share it is close Key, comprising: one or more put in order is selected to be used as default shared key for the key of even bit from preset pool of keys.
As an example it is assumed that the key in pool of keys is ranked up according to time or space or size order, then select The key of even bit of the one or more in sequence is as default shared key.For example, it is assumed that have in pool of keys 4 it is close Key, wherein 4 keys are respectively key 1, key 2, key 3 and key 4, wherein collating sequence are as follows: key 1- > key 2- > Key 3- > key 4.Assuming that needing to take the key an of even bit as default shared key, then it can be and take key 2, it can also To be to take key 4.
In the present embodiment, by the way that key is added, even if after the fisrt feature code that user can be made to modify move media, Also it can not crack easily, crack difficulty to effectively increase, and then improve the safety of permission.Further, pass through Code key pond, which is arranged, can further increase the difficulty that code key is cracked, and improve the safety of permission.
Step S102: signature is generated according to the fisrt feature code, the second feature code and the default shared key Data.
As a kind of possible embodiment, step S102 includes: by MD5 (Message Digest Algorithm 5, Message Digest Algorithm 5) hashing algorithm to the fisrt feature code, the second feature code and it is described it is default share it is close Key is signed, and the signed data is generated.
Optionally, by MD5 hashing algorithm to the fisrt feature code, the second feature code and it is described it is default share it is close Key is signed, and the signed data is generated, comprising: is total to the fisrt feature code, the second feature code and described preset It enjoys key to be combined, generates data to be signed;It is signed by MD5 hashing algorithm to the data to be signed, generates institute State signed data.
Optionally, the fisrt feature code, the second feature code and the default shared key are combined, are wrapped Include: by the fisrt feature code, the second feature code and the default shared key it is corresponding put in order progress with Machine combination.For example, the data sorting after combination are as follows: fisrt feature code -> second feature code -> default shared key.Or the One condition code -> default shared key -> second feature code etc..
Certainly, in practice, can also using other algorithms to the fisrt feature code, the second feature code and The default shared key is signed, and the signed data is generated, for example, other algorithms may be, but not limited to, CRC (Cyclic Redundancy Check, cyclic redundancy check) algorithm, SHA (Secure Hash Algorithm, secure hash Algorithm) or RIPEMD (RACE Integrity Primitives Evaluation Message Digest, RACE is original complete Whole property verification message abstract) algorithm etc..
Step S103: the license file of the software product is generated according to the signed data.
License file can only include signed data, can also further include other data, for example, the time, operation log, Licensing version, scope of authority etc..
Step S104: the license file is stored in the predetermined directory of the software product on the move media In.
As a kind of possible embodiment, the license file is stored in the predetermined directory of the software product In, comprising: the license file is stored in the predetermined directory of the software product and is hidden.
By the way that license file to be hidden, it is possible to prevente effectively from illegal user directly acquires, peace is further improved Quan Xing.
Wherein, predetermined directory can be any catalogue of software product, for example, it may be root, is also possible to specific item Record.Here, being not especially limited.
Optionally, software product can be stored in same move media with license file, can also be stored separately, or Person is that first software product is burnt in move media, then regenerates licensing.Either first generate licensing, then by software Product is burnt in move media.
In actual use, it in order to enable illegal user cannot copy software product multiplexing from move media, effectively keeps away The unauthorized propagation of software product is exempted from, software product and license file is stored separately, license file is such as passed through other Move media stored, even if so that illegal user takes software product, under the premise of no license file, It is not available still, even if even if illegal user has taken legal license file, if the license file is not bound Move media, then license file is also invalid;Likewise, by legal license file and its mobile Jie of binding Matter is used in the product of different editions, and invalid, and then to overcome illegal user that cannot copy software from move media The technical issues of product reuse, realizes and effectively prevents the technology of the unauthorized propagation of software product and repair effect.
Licensing dissemination method provided in an embodiment of the present invention passes through the fisrt feature code of move media, software product Second feature code and default shared key generate signed data, and the licensing text of software product is generated by signed data Part, thus by the fisrt feature code of permission and move media, the second feature code of software product and default shared key Binding is realized, to enhance safety.And by the way that the permission of software product is completed by move media, and software The authorization of product no longer needs to bind with the software server of user, so that even if the spies such as software server MAC Address of user Sign is tampered, and will not be authorized to, and further improves the safety of authorization, and apply again after user replaces server When License is authorized, it is only necessary to it can be completed by move media, and no longer need to apply again that License is authorized, so, The problem that existing safety and Authorized operation trouble are authorized in compared with the existing technology, then use move media in this programme Fisrt feature code, software product second feature code and default shared key then operated more simply and more to complete authorization Safety thereby reduces the numerous of Authorized operation so that user no longer needs to apply again that after replacing server, License is authorized Trivial degree and the safety for improving authorization.
Second embodiment
Referring to figure 2., Fig. 2 is a kind of flow chart of License Authentication method provided in an embodiment of the present invention, the method packet Include following steps:
Step S201: when carrying out predetermined registration operation to target software product, the shifting for storing the target software product is obtained The fisrt feature code of dynamic medium;And it obtains the second feature code of the target software product and obtains the target software product In preset default shared key.
Wherein, predetermined registration operation may be, but not limited to, the operation of the installation for installing software product, for software product The updating operation upgraded or the operation operation for runs software product etc..
Optionally, when software product is run, the efficiency of software operation is reduced in order to avoid influencing the normal operation of software, Obtain the fisrt feature code for storing the move media of the target software product, comprising: obtain and store according to prefixed time interval The fisrt feature code of the move media of the target software product, periodically to read movement by realizing in prefixed time interval The fisrt feature code of medium is verified, to effectively reduce the fisrt feature synchronous codes number for reading move media, and then is improved The efficiency of software operation.
Wherein, the setting of prefixed time interval can be configured according to user's actual need, for example, 22:00 point daily Read the fisrt feature code an of move media.
Wherein, it is real to please refer to first for the specific embodiment of fisrt feature code, second feature code and default shared key Implementation steps corresponding to example are applied, here, repeating no more.
Optionally, it when the default shared key in license file randomly selects, then obtains the target software and produces Preset default shared key in product, comprising: poll key or key from pool of keys preset in the target software product Combination, generates the corresponding all combinations to be compared of the pool of keys, by each combination to be compared respectively and in license file Default shared key is matched, if matching, by the default shared key of the combination as the target software product to be compared, And this combination is recorded in memory, convenient for direct contrast verification next time.To guarantee when being verified, what is obtained is close Key cipher key match corresponding with the license file being stored in move media, and then can guarantee that legal verifying can be normal It executes.
In the present embodiment, since move media can only operate on a software server simultaneously, so as to reach The same effect of License file use scope is controlled by software server condition code in the prior art.And by that will be permitted File can be demonstrate,proved and move media is bound, cause to crack again perhaps by way of the condition codes such as modification software server MAC It can authorize, even if the fisrt feature code of modification move media, also because default shared key processing has been carried out in binding, into one Step, which increases, cracks difficulty, effectively increases the safety of permission.
Step S202: Target Signature is generated according to the fisrt feature code, the second feature code and default shared key Data.
The specific embodiment of step S202 please refers to implementation steps corresponding to first embodiment, here, repeating no more.
Step S203: obtaining license file preset in the target software product, and the license file includes pre- Set signed data;Wherein, the rule for generating the Target Signature data is identical as the rule for generating the preset signed data.
Step S204: judge whether the Target Signature data match with the preset signed data.
By the way that the corresponding signature value of Target Signature data signature value corresponding with the preset signed data is compared, If the corresponding signature value of tag name data signature value corresponding with the preset signed data is equal, then it represents that the target label Name data are matched with the preset signed data.
Step S205: if the Target Signature data are matched with the preset signed data, the target software is produced Product carry out the predetermined registration operation.
When the Target Signature data are matched with the preset signed data, continue to execute the target software product The predetermined registration operation, for example, when software product is installed, if Target Signature data are matched with the preset signed data, Then continue to install.
In one optionally embodiment, after step S205, further includes: if the Target Signature data with it is described preset Signed data matching, record currently used default shared key (for example, record in memory it is currently used it is default share it is close Key), shared key failure is preset after restarting system.Wherein, after default shared key fails, when verifying again, weight is needed New poll calculates default shared key.
License Authentication method provided in an embodiment of the present invention, by obtaining when carrying out predetermined registration operation to target software product Take the fisrt feature code for storing the move media of the target software product;And the second feature code of the target software product And default shared key preset in the target software product is obtained, then according to license preset in target software product The rule that preset signed data is generated in card file generates Target Signature data, by by Target Signature data and preset number of signature According to being matched, to realize License Authentication, when Target Signature data are matched with preset signed data, indicate that License Authentication is logical It crosses.To which the user can be made to apply for License again after replacing server by realizing License Authentication in move media When authorization, it is only necessary to can be completed by being inserted into move media, and no longer need to apply again License and authorize.
3rd embodiment
Corresponding to the licensing dissemination method in first embodiment, Fig. 3 is shown using license shown in first embodiment Demonstrate,prove the one-to-one licensing delivery system of dissemination method.As shown in figure 3, the licensing delivery system 400 is obtained including data Modulus block 410, the first data processing module 420, the second data processing module 430 and data memory module 440.Wherein, data Obtain module 410, the first data processing module 420, the second data processing module 430 and data memory module 440 realization function Can be with the poly- one-to-one correspondence of step corresponding in first embodiment, to avoid repeating, the present embodiment is not described in detail one by one.
Data acquisition module 410, for obtaining the fisrt feature code, described soft of the move media for storing software product The second feature code of part product and default shared key.
Optionally, data acquisition module 410 is also used to obtain the fisrt feature of the move media for storing software product Code, the second feature code of the software product and is obtained from preset pool of keys according to preset rules one or more keys As default shared key.
First data processing module 420, for being total to according to the fisrt feature code, the second feature code and described preset It enjoys key and generates signed data.
Optionally, the first data processing module 420 is also used to: by MD5 hashing algorithm to the fisrt feature code, described Second feature code and the default shared key are signed, and the signed data is generated.
Optionally, the first data processing module 420 is also used to: by the fisrt feature code, the second feature code and institute It states default shared key to be combined, generates data to be signed;The data to be signed are signed by MD5 hashing algorithm Name, generates the signed data.
Second data processing module 430, for generating the license file of the software product according to the signed data.
Data memory module 440, for the license file to be stored in the software product on the move media Predetermined directory in.
Optionally, data memory module 440 is also used to: the license file is stored in the default of the software product In catalogue and hide.
Fourth embodiment
Corresponding to the License Authentication method in second embodiment, Fig. 4 is shown to be tested using license shown in second embodiment The one-to-one License Authentication system of card method.As shown in figure 4, the License Authentication system 500 includes the first data acquisition mould Block 510, data generation module 520, the second data acquisition module 530, data processing module 540 and execution module 550.Wherein, First data acquisition module 510, data generation module 520, the second data acquisition module 530, data processing module 540 and execution The realization function of module 550 is gathered with step corresponding in second embodiment to be corresponded, and to avoid repeating, the present embodiment is not detailed one by one It states.
First data acquisition module 510, for obtaining and storing the mesh when carrying out predetermined registration operation to target software product Mark the fisrt feature code of the move media of software product;And it obtains the second feature code of the target software product and obtains institute State default shared key preset in target software product.
Optionally, the first data acquisition module 510 is also used to: when carrying out predetermined registration operation to target software product, according to Prefixed time interval obtains the fisrt feature code for storing the move media of the target software product;And obtain the target software Preset default shared key in the second feature code and the acquisition target software product of product.
Data generation module 520, for raw according to the fisrt feature code, the second feature code and default shared key At Target Signature data.
Second data acquisition module 530, it is described to be permitted for obtaining license file preset in the target software product It includes preset signed data that file, which can be demonstrate,proved,;Wherein, the rule and the generation preset number of signature of the Target Signature data are generated According to rule it is identical.
Data processing module 540, for judging whether the Target Signature data match with the preset signed data.
Execution module 550, if being matched for the Target Signature data with the preset signed data, to the target Software product carries out the predetermined registration operation.
5th embodiment
As shown in figure 5, being the schematic diagram of terminal device 300.The terminal device 300 includes memory 302, processor 304 and it is stored in the computer-readable instruction fetch 303 that can be run in the memory 302 and on the processor 304.When When the computer-readable instruction fetch 303 is executed by the processor 304, the licensing hair as in the first embodiment is run Cloth method, to avoid repeating, details are not described herein again.Alternatively, when the computer-readable instruction fetch 303 is by the processor 304 When execution, the operation such as License Authentication method in second embodiment, to avoid repeating, details are not described herein again.Alternatively, working as institute When stating computer-readable instruction fetch 303 and being executed by the processor 304, the licensing delivery system as described in 3rd embodiment is realized In each model/unit function, to avoid repeating, details are not described herein again.Alternatively, when the computer-readable instruction fetch 303 by When the processor 304 executes, the function of each model/unit in License Authentication system as described in the fourth embodiment is realized, to keep away Exempt to repeat, details are not described herein again.
Illustratively, computer-readable instruction fetch 303 can be divided into one or more module/units, one or Multiple module/units are stored in memory 302, and are executed by processor 304, to complete the present invention.One or more moulds Block/unit can be the series of computation machine program instruction section that can complete specific function, and the instruction segment is for describing computer Implementation procedure of the readable instruction fetch 303 in terminal device 300.For example, computer-readable instruction fetch 303 can be divided into Data acquisition module 410, the first data processing module 420, the second data processing module 430 and data storage in three embodiments Module 440, the concrete function of each module will not repeat them here as described in first embodiment or 3rd embodiment.
Wherein, memory 302 may be, but not limited to, random access memory (Random Access Memory, RAM), read-only memory (Read Only Memory, ROM), programmable read only memory (Programmable Read-Only Memory, PROM), erasable read-only memory (Erasable Programmable Read-Only Memory, EPROM), Electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-Only Memory, EEPROM) etc.. Wherein, memory 302 is for storing program, and the processor 304 executes described program after receiving and executing instruction, aforementioned The method for the flow definition that any embodiment of the embodiment of the present invention discloses can be applied in processor 304, or by processor 304 realize.
Processor 304 may be a kind of IC chip, the processing capacity with signal.Above-mentioned processor 304 can To be general processor, including central processing unit (Central Processing Unit, CPU), network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (Digital Signal Processor, DSP), dedicated integrated Circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general Processor can be microprocessor or the processor is also possible to any conventional processor etc..
It is understood that structure shown in fig. 5 is only a kind of structural schematic diagram of terminal device 300, terminal device 300 It can also include than more or fewer components shown in Fig. 5.Each component shown in Fig. 4 can use hardware, software or its group It closes and realizes.
Fig. 6 is please referred to, Fig. 6 is another structural schematic diagram of a kind of electronic equipment provided in an embodiment of the present invention, described Electronic equipment may include: at least one processor 110, such as CPU, at least one communication interface 120, at least one processor 130 and at least one communication bus 140.Wherein, communication bus 140 is for realizing the direct connection communication of these components.Wherein, The communication interface 120 of equipment is used to carry out the communication of signaling or data with other node devices in the embodiment of the present invention.Memory 130 can be high speed RAM memory, be also possible to non-labile memory (non-volatile memory), for example, at least One magnetic disk storage.Memory 130 optionally can also be that at least one is located remotely from the storage device of aforementioned processor.It deposits Computer-readable instruction fetch is stored in reservoir 130, when the computer-readable instruction fetch is executed by the processor 110, Electronic equipment executes method process shown in above-mentioned Fig. 1 or Fig. 2.Either electronic equipment realizes above-mentioned Fig. 3 or Fig. 4 shown device Function.
In conclusion the embodiment of the present invention provides licensing dissemination method, License Authentication method, system and electronic equipment, Signed data is generated by the fisrt feature code of move media, the second feature code of software product and default shared key, and The license file of software product is generated by signed data, thus by the fisrt feature code of permission and move media, soft The second feature code of part product and default shared key realize binding, to enhance safety.And by the way that software is produced The permission of product is completed by move media, and the authorization of software product no longer needs to bind with the software server of user, So that will not be authorized to even if MAC Address is tampered, the safety of authorization is further improved, and when user replaces clothes When applying for License authorization after business device again, it is only necessary to can be completed by move media, and no longer need to apply again License authorization, so, compared with the existing technology in authorize the problem of existing safety and Authorized operation trouble, then this It completes to authorize using the fisrt feature code of move media, the second feature code of software product and default shared key in scheme Then operate it is simpler and safer so that user no longer need to apply again after replacing server License authorize, in turn It reduces the fussy degree of Authorized operation and improves the safety of authorization.
In several embodiments provided by the present invention, it should be understood that disclosed system and method can also pass through Other modes are realized.System embodiment described above is only schematical, for example, flow chart and block diagram in attached drawing Show the system of multiple embodiments according to the present invention, the architectural framework in the cards of method and computer program product, Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code Part, a part of the module, section or code, which includes that one or more is for implementing the specified logical function, to be held Row instruction.It should also be noted that function marked in the box can also be to be different from some implementations as replacement The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes It can execute in the opposite order, this depends on the function involved.It is also noted that every in block diagram and or flow chart The combination of box in a box and block diagram and or flow chart can use the dedicated base for executing defined function or movement It realizes, or can realize using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each functional module in each embodiment of the present invention can integrate one independent portion of formation together Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or electronic equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.It should also be noted that similar label and letter exist Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing It is further defined and explained.

Claims (10)

1. a kind of licensing dissemination method, which is characterized in that the described method includes:
Obtain second feature code for storing the fisrt feature code of the move media of software product, the software product and pre- If shared key;
Signed data is generated according to the fisrt feature code, the second feature code and the default shared key;
The license file of the software product is generated according to the signed data;
The license file is stored on the move media in the predetermined directory of the software product.
2. the method according to claim 1, wherein shared key is preset in the acquisition, comprising:
One or more keys are obtained from preset pool of keys according to preset rules as default shared key.
3. the method according to claim 1, wherein it is described according to the fisrt feature code, it is described second special It levies code and the default shared key generates signed data, comprising:
It is signed by MD5 hashing algorithm to the fisrt feature code, the second feature code and the default shared key, Generate the signed data.
4. the method according to claim 1, wherein it is described according to the fisrt feature code, it is described second special It levies code and the default shared key generates signed data, comprising:
The fisrt feature code, the second feature code and the default shared key are combined, data to be signed are generated;
It is signed by MD5 hashing algorithm to the data to be signed, generates the signed data.
5. the method according to claim 1, wherein described be stored in the software for the license file In the predetermined directory of product, comprising:
The license file is stored in the predetermined directory of the software product and is hidden.
6. a kind of License Authentication method, which is characterized in that the described method includes:
When carrying out predetermined registration operation to target software product, obtain the move media for storing the target software product first is special Levy code;And it obtains the second feature code of the target software product and obtains preset default total in the target software product Enjoy key;
Target Signature data are generated according to the fisrt feature code, the second feature code and default shared key;
License file preset in the target software product is obtained, the license file includes preset signed data;
Judge whether the Target Signature data match with the preset signed data;Wherein, the Target Signature data are generated Rule it is identical as the rule of the generation preset signed data;
If the Target Signature data are matched with the preset signed data, the target software product is carried out described default Operation.
7. according to the method described in claim 6, it is characterized in that, the acquisition stores the movement of the target software product The fisrt feature code of medium, comprising:
The fisrt feature code for storing the move media of the target software product is obtained according to prefixed time interval.
8. a kind of licensing delivery system, which is characterized in that the system comprises:
Data acquisition module, for obtaining fisrt feature code, the software product of the move media for storing software product Second feature code and default shared key;
First data processing module, for according to the fisrt feature code, the second feature code and the default shared key Generate signed data;
Second data processing module, for generating the license file of the software product according to the signed data;
Data memory module, for the license file to be stored in the default mesh of the software product on the move media In record.
9. a kind of License Authentication system, which is characterized in that the system comprises:
First data acquisition module, for obtaining and storing the target software when carrying out predetermined registration operation to target software product The fisrt feature code of the move media of product;And it obtains the second feature code of the target software product and obtains the target Preset default shared key in software product;
Data generation module, for generating target according to the fisrt feature code, the second feature code and default shared key Signed data;
Second data acquisition module, for obtaining license file preset in the target software product, the licensing text Part includes preset signed data;Wherein, the rule of the Target Signature data and the rule for generating the preset signed data are generated It is then identical;
Data processing module, for judging whether the Target Signature data match with the preset signed data;
Execution module produces the target software if matching for the Target Signature data with the preset signed data Product carry out the predetermined registration operation.
10. a kind of electronic equipment, which is characterized in that including processor and memory, the memory is stored with computer can Instruction is read, when the computer-readable instruction fetch is executed by the processor, operation such as any claim in claim 1-5 The method;Alternatively, operation is as in claim 6-7 when the computer-readable instruction fetch is executed by the processor Method described in any claim.
CN201810851596.4A 2018-07-27 2018-07-27 Licensing dissemination method, License Authentication method, system and electronic equipment Pending CN109086576A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810851596.4A CN109086576A (en) 2018-07-27 2018-07-27 Licensing dissemination method, License Authentication method, system and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810851596.4A CN109086576A (en) 2018-07-27 2018-07-27 Licensing dissemination method, License Authentication method, system and electronic equipment

Publications (1)

Publication Number Publication Date
CN109086576A true CN109086576A (en) 2018-12-25

Family

ID=64833370

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810851596.4A Pending CN109086576A (en) 2018-07-27 2018-07-27 Licensing dissemination method, License Authentication method, system and electronic equipment

Country Status (1)

Country Link
CN (1) CN109086576A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112395021A (en) * 2020-10-26 2021-02-23 中国电力科学研究院有限公司 Electric power metering equipment application software loading control method and device
CN113239327A (en) * 2021-04-27 2021-08-10 深圳中广核工程设计有限公司 Method, apparatus, computer device and storage medium for monitoring software licenses

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1704863A (en) * 2004-05-25 2005-12-07 华为技术有限公司 Licensing file generating method, software product protection method and system
CN1818919A (en) * 2006-03-02 2006-08-16 王清华 Permission verification and verifying system for electronic file
CN104361266A (en) * 2014-11-25 2015-02-18 上海精灵天下数字技术有限公司 Copyright protection method and system of digital contents
CN106529217A (en) * 2016-10-28 2017-03-22 华胜信泰信息产业发展有限公司 Software license generation method and apparatus

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1704863A (en) * 2004-05-25 2005-12-07 华为技术有限公司 Licensing file generating method, software product protection method and system
CN1818919A (en) * 2006-03-02 2006-08-16 王清华 Permission verification and verifying system for electronic file
CN104361266A (en) * 2014-11-25 2015-02-18 上海精灵天下数字技术有限公司 Copyright protection method and system of digital contents
CN106529217A (en) * 2016-10-28 2017-03-22 华胜信泰信息产业发展有限公司 Software license generation method and apparatus

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112395021A (en) * 2020-10-26 2021-02-23 中国电力科学研究院有限公司 Electric power metering equipment application software loading control method and device
CN112395021B (en) * 2020-10-26 2024-03-19 中国电力科学研究院有限公司 Power metering equipment application software loading control method and device
CN113239327A (en) * 2021-04-27 2021-08-10 深圳中广核工程设计有限公司 Method, apparatus, computer device and storage medium for monitoring software licenses

Similar Documents

Publication Publication Date Title
CN102271042B (en) Certificate authorization method, system, universal serial bus (USB) Key equipment and server
CN109740384A (en) Data based on block chain deposit card method and apparatus
CN107085675A (en) Controlled security code verification
US20030163685A1 (en) Method and system to allow performance of permitted activity with respect to a device
CN102314572A (en) Registration information file generation method and device, and use authorization method of application software
CN112165382B (en) Software authorization method and device, authorization server side and terminal equipment
CN103221961A (en) Method and apparatus including architecture for protecting multi-ser sensitive code and data
CN109600366A (en) The method and device of protection user data privacy based on block chain
CN101022337A (en) Network identification card realizing method
KR20130084671A (en) Application usage policy enforcement
CN104539634A (en) Security-enhanced authorizing and authenticating method of mobile application
CN109118377A (en) A kind of processing method, system and the electronic equipment of the Claims Resolution event based on block chain
CN108768975A (en) Support the data integrity verification method of key updating and third party's secret protection
CN103390122A (en) Application program transmitting method, application program operating method, sever and terminal
CN102750479B (en) A kind of delamination software copy-right protection method
CN109086576A (en) Licensing dissemination method, License Authentication method, system and electronic equipment
CN114726630A (en) License-based information security authorization method and device, electronic equipment and medium
CN114499859A (en) Password verification method, device, equipment and storage medium
CN102222195B (en) E-book reading method and system
CN107133499B (en) Software copyright protection method, client, server and system
US9177123B1 (en) Detecting illegitimate code generators
CN110890979B (en) Automatic deployment method, device, equipment and medium for fort machine
CN108256351A (en) Document handling method and device, storage medium and terminal
CN105933303A (en) File tempering detection method and device
CN109462620A (en) One kind realizing password method for retrieving and system based on a variety of safety verification modes

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181225

RJ01 Rejection of invention patent application after publication