CN109086576A - Licensing dissemination method, License Authentication method, system and electronic equipment - Google Patents
Licensing dissemination method, License Authentication method, system and electronic equipment Download PDFInfo
- Publication number
- CN109086576A CN109086576A CN201810851596.4A CN201810851596A CN109086576A CN 109086576 A CN109086576 A CN 109086576A CN 201810851596 A CN201810851596 A CN 201810851596A CN 109086576 A CN109086576 A CN 109086576A
- Authority
- CN
- China
- Prior art keywords
- feature code
- software product
- data
- preset
- shared key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 56
- 238000012545 processing Methods 0.000 claims description 26
- 238000004422 calculation algorithm Methods 0.000 claims description 19
- 238000013475 authorization Methods 0.000 abstract description 21
- 238000005516 engineering process Methods 0.000 abstract description 8
- 230000006870 function Effects 0.000 description 16
- 238000010586 diagram Methods 0.000 description 12
- 238000004891 communication Methods 0.000 description 6
- 238000009434 installation Methods 0.000 description 5
- 230000008859 change Effects 0.000 description 2
- 125000004122 cyclic group Chemical group 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000008439 repair process Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 238000005303 weighing Methods 0.000 description 2
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/101—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Power Engineering (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the present invention provides licensing dissemination method, License Authentication method, system and electronic equipment, belongs to field of computer technology.This method comprises: obtaining the fisrt feature code for storing the move media of software product, the second feature code of software product and default shared key;Signed data is generated according to fisrt feature code, second feature code and default shared key;The license file of software product is generated according to signed data;License file is stored on move media in the predetermined directory of software product.By the way that the second feature code of the fisrt feature code of permission and move media, software product and default shared key are realized binding in this programme, so that after user replaces server when application license authorization again, it only needs to can be completed by move media, and no longer needs as in the prior art to authorization server again application license authorization.
Description
Technical field
The present invention relates to field of computer technology, in particular to licensing dissemination method, License Authentication method, are
System and electronic equipment.
Background technique
The piracy of software and illegal using annoying Software Development quotient always, it directly result in sales slip and
Profit is lost, and has greatly hit the enthusiasm of Software Development quotient, and greatly hinders the development of software industry.In order to protect
Intellectual property is protected, prevents from illegally using, application software protection technique universal at present is to provide a user License (licensing)
File is controlled software and is used within the scope of authority by the operation of License document control software product.
And in the prior art, it is user when applying for License authority, by providing installation to software developer
The equipment condition code of the server of License file, such as: MAC (Media Access Control, media access control)
Location, CPU (Central Processing Unit, central processing unit) sequence number, hard disk serial number etc., to be authorized.Make
Obtain the equipment feature that user needs to provide again when replacing server the server of installation License file to software developer
Code is to apply authorizing, to influence the use of user.Simultaneously as MAC Address etc. can be repaired by some technological means
Change, if unauthorized person knows the generating algorithm of License file by back door, will lead to the permission of software product
Large area failure, and bring about great losses to software developer.
Summary of the invention
To solve the above problems, the embodiment of the present invention provides licensing dissemination method, License Authentication method, system and electronics
Equipment.
In a first aspect, the embodiment of the invention provides a kind of licensing dissemination methods, which comprises obtain for depositing
Store up the fisrt feature code of move media, the second feature code of the software product and the default shared key of software product;Root
Signed data is generated according to the fisrt feature code, the second feature code and the default shared key;According to the number of signature
According to the license file for generating the software product;The license file is stored in the software on the move media to produce
In the predetermined directory of product.In this method, pass through the fisrt feature code of move media, the second feature code of software product and default
Shared key generates signed data, and the license file of software product is generated by signed data, thus by permission and
The fisrt feature code of move media, the second feature code of software product and default shared key realize binding, to enhance
Safety.And by completing the permission of software product by move media, and the authorization of software product no longer needs
It is bound with the software server of user, so that will not be awarded even if the features such as software server MAC Address of user are tampered
It weighs, when further improving the safety of authorization, and applying for that License is authorized again after user replaces server, only needs
Can be completed by move media, and no longer need to apply again License authorize, so, compared with the existing technology in award
The problem for weighing existing safety and Authorized operation trouble, then use fisrt feature code, the software of move media in this programme
The second feature code of product and default shared key come complete authorization then operate it is simpler and safer so that user is more
It changes after server and no longer needs to apply again that License is authorized, thereby reduce the fussy degree of Authorized operation and improve
The safety of authorization.
Further, shared key is preset in the acquisition, comprising: is obtained from preset pool of keys according to preset rules
One or more keys are as default shared key.
Further, described raw according to the fisrt feature code, the second feature code and the default shared key
At signed data, comprising: shared by MD5 hashing algorithm to the fisrt feature code, the second feature code and described preset
Key is signed, and the signed data is generated.
Further, described raw according to the fisrt feature code, the second feature code and the default shared key
At signed data, comprising: the fisrt feature code, the second feature code and the default shared key are combined, it is raw
At data to be signed;It is signed by MD5 hashing algorithm to the data to be signed, generates the signed data.
Further, in the predetermined directory that the license file is stored in the software product, comprising: will
The license file is stored in the predetermined directory of the software product and hides.
Second aspect, the embodiment of the invention provides a kind of License Authentication methods, which comprises to target software
When product carries out predetermined registration operation, the fisrt feature code for storing the move media of the target software product is obtained;And described in obtaining
Preset default shared key in the second feature code and the acquisition target software product of target software product;According to described
Fisrt feature code, the second feature code and default shared key generate Target Signature data;Obtain the target software product
In preset license file, the license file includes preset signed data;Wherein, the Target Signature data are generated
Rule is identical as the rule for generating the preset signed data;Judge the Target Signature data whether with the preset number of signature
According to matching;If the Target Signature data are matched with the preset signed data, to described in target software product progress
Predetermined registration operation.
Further, the acquisition stores the fisrt feature code of the move media of the target software product, comprising: root
The fisrt feature code for storing the move media of the target software product is obtained according to prefixed time interval.
The third aspect, the embodiment of the present invention provide a kind of licensing delivery system, the system comprises: data acquisition mould
Block, for obtain the second feature code of the fisrt feature code of the move media for storing software product, the software product with
And default shared key;First data processing module, for according to the fisrt feature code, the second feature code and described pre-
If shared key generates signed data;Second data processing module, for generating the software product according to the signed data
License file;Data memory module is produced for the license file to be stored in the software on the move media
In the predetermined directory of product.
Fourth aspect, the embodiment of the present invention provide a kind of License Authentication system, the system comprises: the first data acquisition mould
Block, for when carrying out predetermined registration operation to target software product, obtaining the of the move media for storing the target software product
One condition code;And it obtains the second feature code of the target software product and obtains preset pre- in the target software product
If shared key;Data generation module, for raw according to the fisrt feature code, the second feature code and default shared key
At Target Signature data;Second data acquisition module, for obtaining license file preset in the target software product, institute
Stating license file includes preset signed data;Wherein, the rule and the generation preset label of the Target Signature data are generated
The rule of name data is identical;Data processing module, for judge the Target Signature data whether with the preset signed data
Matching;Execution module produces the target software if matching for the Target Signature data with the preset signed data
Product carry out the predetermined registration operation.
5th aspect, the embodiment of the present invention provide a kind of electronic equipment, including processor and memory, the memory
It is stored with computer-readable instruction fetch, when the computer-readable instruction fetch is executed by the processor, operation such as above-mentioned the
On the one hand the method provided;Alternatively, when the computer-readable instruction fetch is executed by the processor, operation such as above-mentioned second
The method that aspect provides.
Compared with prior art, licensing dissemination method provided in an embodiment of the present invention, License Authentication method, system and electricity
Sub- equipment brings following the utility model has the advantages that by the fisrt feature code of move media, the second feature code of software product and pre-
If shared key generates signed data, and generates the license file of software product by signed data, thus by permission
It realizes and binds with the fisrt feature code of move media, the second feature code of software product and default shared key, to enhance
Safety.And by completing the permission of software product by move media, and the authorization of software product no longer needs
It to bind with the software server of user, so that the features such as software server MAC Address of user are tampered, will not be awarded
It weighs, when further improving the safety of authorization, and applying for that License is authorized again after user replaces server, only needs
Can be completed by move media, and no longer need to apply again License authorize, so, compared with the existing technology in award
The problem for weighing existing safety and Authorized operation trouble, then use fisrt feature code, the software of move media in this programme
The second feature code of product and default shared key come complete authorization then operate it is simpler and safer so that user is more
It changes after server and no longer needs to apply again that License is authorized, thereby reduce the fussy degree of Authorized operation and improve
The safety of authorization.
Other features and advantages of the present invention will be illustrated in subsequent specification, also, partly be become from specification
It is clear that by implementing understanding of the embodiment of the present invention.The objectives and other advantages of the invention can be by written theory
Specifically noted structure is achieved and obtained in bright book, claims and attached drawing.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 is a kind of flow chart for licensing dissemination method that first embodiment of the invention provides;
Fig. 2 is a kind of flow chart for License Authentication method that second embodiment of the invention provides;
Fig. 3 is a kind of structural block diagram for licensing delivery system that third embodiment of the invention provides;
Fig. 4 is a kind of structural block diagram for License Authentication system that fourth embodiment of the invention provides;
Fig. 5 shows a kind of structural block diagram that can be applied to the electronic equipment in the embodiment of the present invention;
Fig. 6 is another structural schematic diagram of a kind of electronic equipment provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete
Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist
The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause
This, is not intended to limit claimed invention to the detailed description of the embodiment of the present invention provided in the accompanying drawings below
Range, but it is merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
First embodiment
Since existing permission is user when applying for License authority, by being provided to software developer
The equipment condition code of the server of License file is installed, such as: MAC Address, CPU sequence number, hard disk serial number etc., thus
It is authorized.So that user needs to provide the service of installation License file to software developer again when replacing server
The equipment condition code of device, in order to reduce the fussy degree of Authorized operation, present embodiments provides a kind of licensing to apply authorizing
Dissemination method, it should be noted that step shown in the flowchart of the accompanying drawings can be in such as a group of computer-executable instructions
Computer system in execute, although also, logical order is shown in flow charts, in some cases, can be with
Shown or described step is executed different from sequence herein.It describes in detail below to the present embodiment.
Fig. 1 is please referred to, Fig. 1 is a kind of flow chart of licensing dissemination method provided in an embodiment of the present invention, the method
Include the following steps:
Step S101: for storing the fisrt feature code of the move media of software product, the software product is obtained
Two condition codes and default shared key.
Wherein, move media may be, but not limited to, USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey
The medium of sequence software product.
Fisrt feature code may be, but not limited to, PID (ProductID, product ID), VID (VendorID, supply
Quotient ID) or SN (Serial number, sequence number) etc..
Second feature code may be, but not limited to, software version number, the MD5 Hash signature of software product installation package file or
One characteristic of this software product of unique identification is (for example, this feature data can be with software product function or version number
Then the character string that combination is formed combines the character string to be formed with version number for 1 for example, representing function with 1) etc..
For example, second feature code can be by the signed data after software version number progress MD5 Hash signature.
In actual use, presetting shared key is key preset in licensing Core Generator and software product, can
To be 1 key, it is also possible to pool of keys.
As an implementation, step S101 includes: the first spy for obtaining the move media for storing software product
Sign code, the software product second feature code and is obtained from preset pool of keys according to preset rules one or more it is close
Key is as default shared key.
Optionally, obtained from preset pool of keys according to preset rules one or more keys as it is default share it is close
Key, comprising: obtain one or more keys from preset pool of keys according to random algorithm as default shared key.
Optionally, obtained from preset pool of keys according to preset rules one or more keys as it is default share it is close
Key, comprising: one or more put in order is selected to be used as default shared key for the key of even bit from preset pool of keys.
As an example it is assumed that the key in pool of keys is ranked up according to time or space or size order, then select
The key of even bit of the one or more in sequence is as default shared key.For example, it is assumed that have in pool of keys 4 it is close
Key, wherein 4 keys are respectively key 1, key 2, key 3 and key 4, wherein collating sequence are as follows: key 1- > key 2- >
Key 3- > key 4.Assuming that needing to take the key an of even bit as default shared key, then it can be and take key 2, it can also
To be to take key 4.
In the present embodiment, by the way that key is added, even if after the fisrt feature code that user can be made to modify move media,
Also it can not crack easily, crack difficulty to effectively increase, and then improve the safety of permission.Further, pass through
Code key pond, which is arranged, can further increase the difficulty that code key is cracked, and improve the safety of permission.
Step S102: signature is generated according to the fisrt feature code, the second feature code and the default shared key
Data.
As a kind of possible embodiment, step S102 includes: by MD5 (Message Digest Algorithm
5, Message Digest Algorithm 5) hashing algorithm to the fisrt feature code, the second feature code and it is described it is default share it is close
Key is signed, and the signed data is generated.
Optionally, by MD5 hashing algorithm to the fisrt feature code, the second feature code and it is described it is default share it is close
Key is signed, and the signed data is generated, comprising: is total to the fisrt feature code, the second feature code and described preset
It enjoys key to be combined, generates data to be signed;It is signed by MD5 hashing algorithm to the data to be signed, generates institute
State signed data.
Optionally, the fisrt feature code, the second feature code and the default shared key are combined, are wrapped
Include: by the fisrt feature code, the second feature code and the default shared key it is corresponding put in order progress with
Machine combination.For example, the data sorting after combination are as follows: fisrt feature code -> second feature code -> default shared key.Or the
One condition code -> default shared key -> second feature code etc..
Certainly, in practice, can also using other algorithms to the fisrt feature code, the second feature code and
The default shared key is signed, and the signed data is generated, for example, other algorithms may be, but not limited to, CRC
(Cyclic Redundancy Check, cyclic redundancy check) algorithm, SHA (Secure Hash Algorithm, secure hash
Algorithm) or RIPEMD (RACE Integrity Primitives Evaluation Message Digest, RACE is original complete
Whole property verification message abstract) algorithm etc..
Step S103: the license file of the software product is generated according to the signed data.
License file can only include signed data, can also further include other data, for example, the time, operation log,
Licensing version, scope of authority etc..
Step S104: the license file is stored in the predetermined directory of the software product on the move media
In.
As a kind of possible embodiment, the license file is stored in the predetermined directory of the software product
In, comprising: the license file is stored in the predetermined directory of the software product and is hidden.
By the way that license file to be hidden, it is possible to prevente effectively from illegal user directly acquires, peace is further improved
Quan Xing.
Wherein, predetermined directory can be any catalogue of software product, for example, it may be root, is also possible to specific item
Record.Here, being not especially limited.
Optionally, software product can be stored in same move media with license file, can also be stored separately, or
Person is that first software product is burnt in move media, then regenerates licensing.Either first generate licensing, then by software
Product is burnt in move media.
In actual use, it in order to enable illegal user cannot copy software product multiplexing from move media, effectively keeps away
The unauthorized propagation of software product is exempted from, software product and license file is stored separately, license file is such as passed through other
Move media stored, even if so that illegal user takes software product, under the premise of no license file,
It is not available still, even if even if illegal user has taken legal license file, if the license file is not bound
Move media, then license file is also invalid;Likewise, by legal license file and its mobile Jie of binding
Matter is used in the product of different editions, and invalid, and then to overcome illegal user that cannot copy software from move media
The technical issues of product reuse, realizes and effectively prevents the technology of the unauthorized propagation of software product and repair effect.
Licensing dissemination method provided in an embodiment of the present invention passes through the fisrt feature code of move media, software product
Second feature code and default shared key generate signed data, and the licensing text of software product is generated by signed data
Part, thus by the fisrt feature code of permission and move media, the second feature code of software product and default shared key
Binding is realized, to enhance safety.And by the way that the permission of software product is completed by move media, and software
The authorization of product no longer needs to bind with the software server of user, so that even if the spies such as software server MAC Address of user
Sign is tampered, and will not be authorized to, and further improves the safety of authorization, and apply again after user replaces server
When License is authorized, it is only necessary to it can be completed by move media, and no longer need to apply again that License is authorized, so,
The problem that existing safety and Authorized operation trouble are authorized in compared with the existing technology, then use move media in this programme
Fisrt feature code, software product second feature code and default shared key then operated more simply and more to complete authorization
Safety thereby reduces the numerous of Authorized operation so that user no longer needs to apply again that after replacing server, License is authorized
Trivial degree and the safety for improving authorization.
Second embodiment
Referring to figure 2., Fig. 2 is a kind of flow chart of License Authentication method provided in an embodiment of the present invention, the method packet
Include following steps:
Step S201: when carrying out predetermined registration operation to target software product, the shifting for storing the target software product is obtained
The fisrt feature code of dynamic medium;And it obtains the second feature code of the target software product and obtains the target software product
In preset default shared key.
Wherein, predetermined registration operation may be, but not limited to, the operation of the installation for installing software product, for software product
The updating operation upgraded or the operation operation for runs software product etc..
Optionally, when software product is run, the efficiency of software operation is reduced in order to avoid influencing the normal operation of software,
Obtain the fisrt feature code for storing the move media of the target software product, comprising: obtain and store according to prefixed time interval
The fisrt feature code of the move media of the target software product, periodically to read movement by realizing in prefixed time interval
The fisrt feature code of medium is verified, to effectively reduce the fisrt feature synchronous codes number for reading move media, and then is improved
The efficiency of software operation.
Wherein, the setting of prefixed time interval can be configured according to user's actual need, for example, 22:00 point daily
Read the fisrt feature code an of move media.
Wherein, it is real to please refer to first for the specific embodiment of fisrt feature code, second feature code and default shared key
Implementation steps corresponding to example are applied, here, repeating no more.
Optionally, it when the default shared key in license file randomly selects, then obtains the target software and produces
Preset default shared key in product, comprising: poll key or key from pool of keys preset in the target software product
Combination, generates the corresponding all combinations to be compared of the pool of keys, by each combination to be compared respectively and in license file
Default shared key is matched, if matching, by the default shared key of the combination as the target software product to be compared,
And this combination is recorded in memory, convenient for direct contrast verification next time.To guarantee when being verified, what is obtained is close
Key cipher key match corresponding with the license file being stored in move media, and then can guarantee that legal verifying can be normal
It executes.
In the present embodiment, since move media can only operate on a software server simultaneously, so as to reach
The same effect of License file use scope is controlled by software server condition code in the prior art.And by that will be permitted
File can be demonstrate,proved and move media is bound, cause to crack again perhaps by way of the condition codes such as modification software server MAC
It can authorize, even if the fisrt feature code of modification move media, also because default shared key processing has been carried out in binding, into one
Step, which increases, cracks difficulty, effectively increases the safety of permission.
Step S202: Target Signature is generated according to the fisrt feature code, the second feature code and default shared key
Data.
The specific embodiment of step S202 please refers to implementation steps corresponding to first embodiment, here, repeating no more.
Step S203: obtaining license file preset in the target software product, and the license file includes pre-
Set signed data;Wherein, the rule for generating the Target Signature data is identical as the rule for generating the preset signed data.
Step S204: judge whether the Target Signature data match with the preset signed data.
By the way that the corresponding signature value of Target Signature data signature value corresponding with the preset signed data is compared,
If the corresponding signature value of tag name data signature value corresponding with the preset signed data is equal, then it represents that the target label
Name data are matched with the preset signed data.
Step S205: if the Target Signature data are matched with the preset signed data, the target software is produced
Product carry out the predetermined registration operation.
When the Target Signature data are matched with the preset signed data, continue to execute the target software product
The predetermined registration operation, for example, when software product is installed, if Target Signature data are matched with the preset signed data,
Then continue to install.
In one optionally embodiment, after step S205, further includes: if the Target Signature data with it is described preset
Signed data matching, record currently used default shared key (for example, record in memory it is currently used it is default share it is close
Key), shared key failure is preset after restarting system.Wherein, after default shared key fails, when verifying again, weight is needed
New poll calculates default shared key.
License Authentication method provided in an embodiment of the present invention, by obtaining when carrying out predetermined registration operation to target software product
Take the fisrt feature code for storing the move media of the target software product;And the second feature code of the target software product
And default shared key preset in the target software product is obtained, then according to license preset in target software product
The rule that preset signed data is generated in card file generates Target Signature data, by by Target Signature data and preset number of signature
According to being matched, to realize License Authentication, when Target Signature data are matched with preset signed data, indicate that License Authentication is logical
It crosses.To which the user can be made to apply for License again after replacing server by realizing License Authentication in move media
When authorization, it is only necessary to can be completed by being inserted into move media, and no longer need to apply again License and authorize.
3rd embodiment
Corresponding to the licensing dissemination method in first embodiment, Fig. 3 is shown using license shown in first embodiment
Demonstrate,prove the one-to-one licensing delivery system of dissemination method.As shown in figure 3, the licensing delivery system 400 is obtained including data
Modulus block 410, the first data processing module 420, the second data processing module 430 and data memory module 440.Wherein, data
Obtain module 410, the first data processing module 420, the second data processing module 430 and data memory module 440 realization function
Can be with the poly- one-to-one correspondence of step corresponding in first embodiment, to avoid repeating, the present embodiment is not described in detail one by one.
Data acquisition module 410, for obtaining the fisrt feature code, described soft of the move media for storing software product
The second feature code of part product and default shared key.
Optionally, data acquisition module 410 is also used to obtain the fisrt feature of the move media for storing software product
Code, the second feature code of the software product and is obtained from preset pool of keys according to preset rules one or more keys
As default shared key.
First data processing module 420, for being total to according to the fisrt feature code, the second feature code and described preset
It enjoys key and generates signed data.
Optionally, the first data processing module 420 is also used to: by MD5 hashing algorithm to the fisrt feature code, described
Second feature code and the default shared key are signed, and the signed data is generated.
Optionally, the first data processing module 420 is also used to: by the fisrt feature code, the second feature code and institute
It states default shared key to be combined, generates data to be signed;The data to be signed are signed by MD5 hashing algorithm
Name, generates the signed data.
Second data processing module 430, for generating the license file of the software product according to the signed data.
Data memory module 440, for the license file to be stored in the software product on the move media
Predetermined directory in.
Optionally, data memory module 440 is also used to: the license file is stored in the default of the software product
In catalogue and hide.
Fourth embodiment
Corresponding to the License Authentication method in second embodiment, Fig. 4 is shown to be tested using license shown in second embodiment
The one-to-one License Authentication system of card method.As shown in figure 4, the License Authentication system 500 includes the first data acquisition mould
Block 510, data generation module 520, the second data acquisition module 530, data processing module 540 and execution module 550.Wherein,
First data acquisition module 510, data generation module 520, the second data acquisition module 530, data processing module 540 and execution
The realization function of module 550 is gathered with step corresponding in second embodiment to be corresponded, and to avoid repeating, the present embodiment is not detailed one by one
It states.
First data acquisition module 510, for obtaining and storing the mesh when carrying out predetermined registration operation to target software product
Mark the fisrt feature code of the move media of software product;And it obtains the second feature code of the target software product and obtains institute
State default shared key preset in target software product.
Optionally, the first data acquisition module 510 is also used to: when carrying out predetermined registration operation to target software product, according to
Prefixed time interval obtains the fisrt feature code for storing the move media of the target software product;And obtain the target software
Preset default shared key in the second feature code and the acquisition target software product of product.
Data generation module 520, for raw according to the fisrt feature code, the second feature code and default shared key
At Target Signature data.
Second data acquisition module 530, it is described to be permitted for obtaining license file preset in the target software product
It includes preset signed data that file, which can be demonstrate,proved,;Wherein, the rule and the generation preset number of signature of the Target Signature data are generated
According to rule it is identical.
Data processing module 540, for judging whether the Target Signature data match with the preset signed data.
Execution module 550, if being matched for the Target Signature data with the preset signed data, to the target
Software product carries out the predetermined registration operation.
5th embodiment
As shown in figure 5, being the schematic diagram of terminal device 300.The terminal device 300 includes memory 302, processor
304 and it is stored in the computer-readable instruction fetch 303 that can be run in the memory 302 and on the processor 304.When
When the computer-readable instruction fetch 303 is executed by the processor 304, the licensing hair as in the first embodiment is run
Cloth method, to avoid repeating, details are not described herein again.Alternatively, when the computer-readable instruction fetch 303 is by the processor 304
When execution, the operation such as License Authentication method in second embodiment, to avoid repeating, details are not described herein again.Alternatively, working as institute
When stating computer-readable instruction fetch 303 and being executed by the processor 304, the licensing delivery system as described in 3rd embodiment is realized
In each model/unit function, to avoid repeating, details are not described herein again.Alternatively, when the computer-readable instruction fetch 303 by
When the processor 304 executes, the function of each model/unit in License Authentication system as described in the fourth embodiment is realized, to keep away
Exempt to repeat, details are not described herein again.
Illustratively, computer-readable instruction fetch 303 can be divided into one or more module/units, one or
Multiple module/units are stored in memory 302, and are executed by processor 304, to complete the present invention.One or more moulds
Block/unit can be the series of computation machine program instruction section that can complete specific function, and the instruction segment is for describing computer
Implementation procedure of the readable instruction fetch 303 in terminal device 300.For example, computer-readable instruction fetch 303 can be divided into
Data acquisition module 410, the first data processing module 420, the second data processing module 430 and data storage in three embodiments
Module 440, the concrete function of each module will not repeat them here as described in first embodiment or 3rd embodiment.
Wherein, memory 302 may be, but not limited to, random access memory (Random Access Memory,
RAM), read-only memory (Read Only Memory, ROM), programmable read only memory (Programmable Read-Only
Memory, PROM), erasable read-only memory (Erasable Programmable Read-Only Memory, EPROM),
Electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-Only Memory, EEPROM) etc..
Wherein, memory 302 is for storing program, and the processor 304 executes described program after receiving and executing instruction, aforementioned
The method for the flow definition that any embodiment of the embodiment of the present invention discloses can be applied in processor 304, or by processor
304 realize.
Processor 304 may be a kind of IC chip, the processing capacity with signal.Above-mentioned processor 304 can
To be general processor, including central processing unit (Central Processing Unit, CPU), network processing unit (Network
Processor, NP) etc.;It can also be digital signal processor (Digital Signal Processor, DSP), dedicated integrated
Circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general
Processor can be microprocessor or the processor is also possible to any conventional processor etc..
It is understood that structure shown in fig. 5 is only a kind of structural schematic diagram of terminal device 300, terminal device 300
It can also include than more or fewer components shown in Fig. 5.Each component shown in Fig. 4 can use hardware, software or its group
It closes and realizes.
Fig. 6 is please referred to, Fig. 6 is another structural schematic diagram of a kind of electronic equipment provided in an embodiment of the present invention, described
Electronic equipment may include: at least one processor 110, such as CPU, at least one communication interface 120, at least one processor
130 and at least one communication bus 140.Wherein, communication bus 140 is for realizing the direct connection communication of these components.Wherein,
The communication interface 120 of equipment is used to carry out the communication of signaling or data with other node devices in the embodiment of the present invention.Memory
130 can be high speed RAM memory, be also possible to non-labile memory (non-volatile memory), for example, at least
One magnetic disk storage.Memory 130 optionally can also be that at least one is located remotely from the storage device of aforementioned processor.It deposits
Computer-readable instruction fetch is stored in reservoir 130, when the computer-readable instruction fetch is executed by the processor 110,
Electronic equipment executes method process shown in above-mentioned Fig. 1 or Fig. 2.Either electronic equipment realizes above-mentioned Fig. 3 or Fig. 4 shown device
Function.
In conclusion the embodiment of the present invention provides licensing dissemination method, License Authentication method, system and electronic equipment,
Signed data is generated by the fisrt feature code of move media, the second feature code of software product and default shared key, and
The license file of software product is generated by signed data, thus by the fisrt feature code of permission and move media, soft
The second feature code of part product and default shared key realize binding, to enhance safety.And by the way that software is produced
The permission of product is completed by move media, and the authorization of software product no longer needs to bind with the software server of user,
So that will not be authorized to even if MAC Address is tampered, the safety of authorization is further improved, and when user replaces clothes
When applying for License authorization after business device again, it is only necessary to can be completed by move media, and no longer need to apply again
License authorization, so, compared with the existing technology in authorize the problem of existing safety and Authorized operation trouble, then this
It completes to authorize using the fisrt feature code of move media, the second feature code of software product and default shared key in scheme
Then operate it is simpler and safer so that user no longer need to apply again after replacing server License authorize, in turn
It reduces the fussy degree of Authorized operation and improves the safety of authorization.
In several embodiments provided by the present invention, it should be understood that disclosed system and method can also pass through
Other modes are realized.System embodiment described above is only schematical, for example, flow chart and block diagram in attached drawing
Show the system of multiple embodiments according to the present invention, the architectural framework in the cards of method and computer program product,
Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code
Part, a part of the module, section or code, which includes that one or more is for implementing the specified logical function, to be held
Row instruction.It should also be noted that function marked in the box can also be to be different from some implementations as replacement
The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes
It can execute in the opposite order, this depends on the function involved.It is also noted that every in block diagram and or flow chart
The combination of box in a box and block diagram and or flow chart can use the dedicated base for executing defined function or movement
It realizes, or can realize using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each functional module in each embodiment of the present invention can integrate one independent portion of formation together
Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module
It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or electronic equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field
For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair
Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.It should also be noted that similar label and letter exist
Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing
It is further defined and explained.
Claims (10)
1. a kind of licensing dissemination method, which is characterized in that the described method includes:
Obtain second feature code for storing the fisrt feature code of the move media of software product, the software product and pre-
If shared key;
Signed data is generated according to the fisrt feature code, the second feature code and the default shared key;
The license file of the software product is generated according to the signed data;
The license file is stored on the move media in the predetermined directory of the software product.
2. the method according to claim 1, wherein shared key is preset in the acquisition, comprising:
One or more keys are obtained from preset pool of keys according to preset rules as default shared key.
3. the method according to claim 1, wherein it is described according to the fisrt feature code, it is described second special
It levies code and the default shared key generates signed data, comprising:
It is signed by MD5 hashing algorithm to the fisrt feature code, the second feature code and the default shared key,
Generate the signed data.
4. the method according to claim 1, wherein it is described according to the fisrt feature code, it is described second special
It levies code and the default shared key generates signed data, comprising:
The fisrt feature code, the second feature code and the default shared key are combined, data to be signed are generated;
It is signed by MD5 hashing algorithm to the data to be signed, generates the signed data.
5. the method according to claim 1, wherein described be stored in the software for the license file
In the predetermined directory of product, comprising:
The license file is stored in the predetermined directory of the software product and is hidden.
6. a kind of License Authentication method, which is characterized in that the described method includes:
When carrying out predetermined registration operation to target software product, obtain the move media for storing the target software product first is special
Levy code;And it obtains the second feature code of the target software product and obtains preset default total in the target software product
Enjoy key;
Target Signature data are generated according to the fisrt feature code, the second feature code and default shared key;
License file preset in the target software product is obtained, the license file includes preset signed data;
Judge whether the Target Signature data match with the preset signed data;Wherein, the Target Signature data are generated
Rule it is identical as the rule of the generation preset signed data;
If the Target Signature data are matched with the preset signed data, the target software product is carried out described default
Operation.
7. according to the method described in claim 6, it is characterized in that, the acquisition stores the movement of the target software product
The fisrt feature code of medium, comprising:
The fisrt feature code for storing the move media of the target software product is obtained according to prefixed time interval.
8. a kind of licensing delivery system, which is characterized in that the system comprises:
Data acquisition module, for obtaining fisrt feature code, the software product of the move media for storing software product
Second feature code and default shared key;
First data processing module, for according to the fisrt feature code, the second feature code and the default shared key
Generate signed data;
Second data processing module, for generating the license file of the software product according to the signed data;
Data memory module, for the license file to be stored in the default mesh of the software product on the move media
In record.
9. a kind of License Authentication system, which is characterized in that the system comprises:
First data acquisition module, for obtaining and storing the target software when carrying out predetermined registration operation to target software product
The fisrt feature code of the move media of product;And it obtains the second feature code of the target software product and obtains the target
Preset default shared key in software product;
Data generation module, for generating target according to the fisrt feature code, the second feature code and default shared key
Signed data;
Second data acquisition module, for obtaining license file preset in the target software product, the licensing text
Part includes preset signed data;Wherein, the rule of the Target Signature data and the rule for generating the preset signed data are generated
It is then identical;
Data processing module, for judging whether the Target Signature data match with the preset signed data;
Execution module produces the target software if matching for the Target Signature data with the preset signed data
Product carry out the predetermined registration operation.
10. a kind of electronic equipment, which is characterized in that including processor and memory, the memory is stored with computer can
Instruction is read, when the computer-readable instruction fetch is executed by the processor, operation such as any claim in claim 1-5
The method;Alternatively, operation is as in claim 6-7 when the computer-readable instruction fetch is executed by the processor
Method described in any claim.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810851596.4A CN109086576A (en) | 2018-07-27 | 2018-07-27 | Licensing dissemination method, License Authentication method, system and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810851596.4A CN109086576A (en) | 2018-07-27 | 2018-07-27 | Licensing dissemination method, License Authentication method, system and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109086576A true CN109086576A (en) | 2018-12-25 |
Family
ID=64833370
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810851596.4A Pending CN109086576A (en) | 2018-07-27 | 2018-07-27 | Licensing dissemination method, License Authentication method, system and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109086576A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112395021A (en) * | 2020-10-26 | 2021-02-23 | 中国电力科学研究院有限公司 | Electric power metering equipment application software loading control method and device |
CN113239327A (en) * | 2021-04-27 | 2021-08-10 | 深圳中广核工程设计有限公司 | Method, apparatus, computer device and storage medium for monitoring software licenses |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1704863A (en) * | 2004-05-25 | 2005-12-07 | 华为技术有限公司 | Licensing file generating method, software product protection method and system |
CN1818919A (en) * | 2006-03-02 | 2006-08-16 | 王清华 | Permission verification and verifying system for electronic file |
CN104361266A (en) * | 2014-11-25 | 2015-02-18 | 上海精灵天下数字技术有限公司 | Copyright protection method and system of digital contents |
CN106529217A (en) * | 2016-10-28 | 2017-03-22 | 华胜信泰信息产业发展有限公司 | Software license generation method and apparatus |
-
2018
- 2018-07-27 CN CN201810851596.4A patent/CN109086576A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1704863A (en) * | 2004-05-25 | 2005-12-07 | 华为技术有限公司 | Licensing file generating method, software product protection method and system |
CN1818919A (en) * | 2006-03-02 | 2006-08-16 | 王清华 | Permission verification and verifying system for electronic file |
CN104361266A (en) * | 2014-11-25 | 2015-02-18 | 上海精灵天下数字技术有限公司 | Copyright protection method and system of digital contents |
CN106529217A (en) * | 2016-10-28 | 2017-03-22 | 华胜信泰信息产业发展有限公司 | Software license generation method and apparatus |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112395021A (en) * | 2020-10-26 | 2021-02-23 | 中国电力科学研究院有限公司 | Electric power metering equipment application software loading control method and device |
CN112395021B (en) * | 2020-10-26 | 2024-03-19 | 中国电力科学研究院有限公司 | Power metering equipment application software loading control method and device |
CN113239327A (en) * | 2021-04-27 | 2021-08-10 | 深圳中广核工程设计有限公司 | Method, apparatus, computer device and storage medium for monitoring software licenses |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102271042B (en) | Certificate authorization method, system, universal serial bus (USB) Key equipment and server | |
CN109740384A (en) | Data based on block chain deposit card method and apparatus | |
CN107085675A (en) | Controlled security code verification | |
US20030163685A1 (en) | Method and system to allow performance of permitted activity with respect to a device | |
CN102314572A (en) | Registration information file generation method and device, and use authorization method of application software | |
CN112165382B (en) | Software authorization method and device, authorization server side and terminal equipment | |
CN103221961A (en) | Method and apparatus including architecture for protecting multi-ser sensitive code and data | |
CN109600366A (en) | The method and device of protection user data privacy based on block chain | |
CN101022337A (en) | Network identification card realizing method | |
KR20130084671A (en) | Application usage policy enforcement | |
CN104539634A (en) | Security-enhanced authorizing and authenticating method of mobile application | |
CN109118377A (en) | A kind of processing method, system and the electronic equipment of the Claims Resolution event based on block chain | |
CN108768975A (en) | Support the data integrity verification method of key updating and third party's secret protection | |
CN103390122A (en) | Application program transmitting method, application program operating method, sever and terminal | |
CN102750479B (en) | A kind of delamination software copy-right protection method | |
CN109086576A (en) | Licensing dissemination method, License Authentication method, system and electronic equipment | |
CN114726630A (en) | License-based information security authorization method and device, electronic equipment and medium | |
CN114499859A (en) | Password verification method, device, equipment and storage medium | |
CN102222195B (en) | E-book reading method and system | |
CN107133499B (en) | Software copyright protection method, client, server and system | |
US9177123B1 (en) | Detecting illegitimate code generators | |
CN110890979B (en) | Automatic deployment method, device, equipment and medium for fort machine | |
CN108256351A (en) | Document handling method and device, storage medium and terminal | |
CN105933303A (en) | File tempering detection method and device | |
CN109462620A (en) | One kind realizing password method for retrieving and system based on a variety of safety verification modes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181225 |
|
RJ01 | Rejection of invention patent application after publication |