CN109086578A - A kind of method that soft ware authorization uses, equipment and storage medium - Google Patents

A kind of method that soft ware authorization uses, equipment and storage medium Download PDF

Info

Publication number
CN109086578A
CN109086578A CN201710449673.9A CN201710449673A CN109086578A CN 109086578 A CN109086578 A CN 109086578A CN 201710449673 A CN201710449673 A CN 201710449673A CN 109086578 A CN109086578 A CN 109086578A
Authority
CN
China
Prior art keywords
software
mark
equipment
verifying
soft ware
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710449673.9A
Other languages
Chinese (zh)
Inventor
张忠威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201710449673.9A priority Critical patent/CN109086578A/en
Publication of CN109086578A publication Critical patent/CN109086578A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Abstract

The invention discloses a kind of method that soft ware authorization uses, equipment and storage mediums.Wherein, this method comprises: obtaining the signature identification of equipment;Software, which is generated, according to signature identification uses verifying mark;Software licensing mark is read from the device, and software licensing mark is verified using verifying mark according to software, when passed the verification, then allows runs software.The present invention effectively reduces the interaction with server; the safety of verifying is effectively increased using irreversible encryption algorithm simultaneously; so that software only operates normally on authorized hardware device, uncommitted hardware device then forbids operation to use, and protects the right of software developer well.

Description

A kind of method that soft ware authorization uses, equipment and storage medium
Technical field
The present invention relates to fields of communication technology, are situated between more particularly to a kind of method that soft ware authorization uses, equipment and storage Matter.
Background technique
With the rapid development of terminal technology, no longer only limit is equipped on hand to intelligent operating system (such as Android) The equipment such as machine, tablet computer, Intelligent set top box also start to be carried, to provide richer programme content for people.And With the rapid development of hardware, terminal is lower and lower in the input cost of hardware aspect, and software application abundant is becoming convex The pith of aobvious product.Software is upper more and more abundant in function and design, and the effort that exploitation software application is paid is also more next It is bigger.And the abundant of software application brings software security problem therewith, and software how to be prevented to be not authorized to use then more It is important.
Summary of the invention
The present invention provides a kind of method that soft ware authorization uses, equipment and storage medium, soft in the prior art to solve The problem of part is not authorized to use.
For achieving the above object, the present invention uses following technical solutions:
According to the present invention on one side, a kind of method that soft ware authorization uses is provided, comprising:
Obtain the signature identification of equipment;
Software, which is generated, according to the signature identification uses verifying mark;
Software licensing mark is read from the equipment, and is identified using verifying to the software according to the software It is verified using permission flag, when passed the verification, then allows to run the software.
Optionally, the signature identification includes hardware identifier and the identity of equipment.
It is optionally, described that verifying mark is used according to the signature identification generation software, comprising:
The software is generated to signature identification encryption according to preset Encryption Algorithm and uses verifying mark.
Optionally, the Encryption Algorithm includes that secure hash algorithm SHA256, public key encryption algorithm RSA and BASE64 add One or more of close algorithm.
It is optionally, described that the software licensing mark is read from the equipment, comprising:
The software licensing mark is read from the storage region of the equipment;Wherein, the software licensing It is identified as external device (ED) and generation is encrypted to the signature identification according to the Encryption Algorithm, and be stored in advance to the storage region In.
Optionally, the software licensing mark also carries the validity period that software uses;
It is described that software licensing mark is verified using verifying mark according to the software, comprising:
Judge the current time whether within the validity period;
When determining within the validity period, identify further according to the verifying to the feature encrypted in the permission flag Mark is verified.
Optionally, the method also includes:
When determining not within the validity period, then forbid running the software.
Optionally, the method also includes:
It is obstructed out-of-date when being verified according to verifying mark to the permission flag, then forbid running the software.
According to one aspect of the present invention, a kind of equipment that soft ware authorization uses is provided, comprising: memory and processor; Wherein, the program that soft ware authorization uses is stored in the memory, when the program that the soft ware authorization uses is by the processing When device executes, to realize the step in method described above.
According to one aspect of the present invention, a kind of computer readable storage medium, the computer-readable storage medium are provided Matter is stored with the program that soft ware authorization uses, when the program that the soft ware authorization uses is executed by the processor, to realize Step in method described above.
The present invention has the beneficial effect that:
Method, equipment and the storage medium that soft ware authorization provided by the present invention uses, in local to soft ware authorization situation It is verified, is not necessarily to interact with server side in entire verification process, effectively reduces the processing load of server, adopt simultaneously The safety that verifying effectively increases verifying is carried out with irreversible encryption algorithm.Based on this, software is made only to exist through the invention It is operated normally above authorized hardware device, uncommitted hardware device then forbids operation to use, and protects well soft The right of part developer.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
In order to illustrate the embodiments of the present invention more clearly or it is existing in scheme, below will be in embodiment or existing description Required attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some Embodiment without any creative labor, can also be according to these attached drawings for ordinary people in the field Obtain other attached drawings.
Fig. 1 is the flow chart of soft ware authorization application method provided by the embodiment of the present invention;
Fig. 2 is the flow chart of generation and the verification of License in a specific embodiment of the invention;
Fig. 3 is the flow chart that License is generated in a specific embodiment of the invention;
Fig. 4 is the flow chart of License generating means encryption in a specific embodiment of the invention;
Fig. 5 is the specific flow chart that License is provided in a specific embodiment of the invention;
Fig. 6 is the specific flow chart of License verification in a specific embodiment of the invention;
Fig. 7 is the functional block diagram that soft ware authorization provided by the embodiment of the present invention uses equipment.
Specific embodiment
Below in conjunction with attached drawing and embodiment, the present invention will be described in further detail.It should be appreciated that described herein Specific embodiment be only used to explain the present invention, limit the present invention.
Its thinking of the method that soft ware authorization provided by the embodiment of the present invention uses is, after software download to equipment, It is local that soft ware authorization situation is verified, it is not necessarily to interact with server side in entire verification process, it only need to be according to equipment Unique features mark whether matched with the permission flag stored in equipment again after preset algorithm calculates to determine using soft Whether part authorizes operation.It is described in detail with reference to the accompanying drawing.
Embodiment of the method
As shown in Figure 1, the method that soft ware authorization provided by the embodiment of the present invention uses, includes the following steps:
Step 101, the signature identification of equipment is obtained.
In this step, equipment can the terminals such as mobile phone, tablet computer, laptop, palm PC, can be with For terminals such as Intelligent set top box, desktop computers.
Signature identification is to refer to indicate the unique identification information of equipment.Optionally, this feature mark includes the hard of equipment Part mark and identity.Hardware identifier is primarily referred to as the MAC Address of equipment, and identity can be the factory of the equipment The information such as the sequence number of the mark of quotient or equipment.For example, IMEI (the International Mobile Equipment of equipment Identity, International Mobile Equipment Identity code) or android system be developer provide for identifying the string number of equipment (DEVICE_ID).Since these identification informations are all information entrained by equipment itself, in the signature identification for obtaining equipment When, it can directly be obtained by the relevant interface of equipment itself, be believed without other configurations device (such as network interface card) etc. Breath is to obtain.
Step 102, software is generated according to signature identification and uses verifying mark.
In this step, real by preset Encryption Algorithm when generating software using verifying mark according to signature identification It is existing.Here Encryption Algorithm includes secure hash algorithm SHA256, in public key encryption algorithm RSA and BASE64 Encryption Algorithm It is one or more kinds of.
Step 103, software licensing mark is read from the device, and software is used using verifying mark according to software Permission flag is verified, and when passed the verification, then allows software to run.
In this step, software licensing mark is read from the device, need to read software from the storage region of equipment Use permission flag.Here, software licensing is identified as external device (ED) and encrypts generation to signature identification according to Encryption Algorithm, and It is stored in advance into storage region.
When verifying using verifying mark to software licensing mark according to software, two marks are mainly judged It is whether identical: when identical, then it represents that verification passes through, and allows for runs software;When two marks are not identical, then it represents that verification Failure, then forbid running the software.
It is found that being verified by the software licensing mark generated according to the unique signature identification of equipment, Ke Yiyou Effect ensures the uniqueness that soft ware authorization uses, and effectively avoids the situation identified using illegal software licensing.
It wherein, optionally, further include that software makes in software licensing mark other than above-mentioned encrypted feature mark Validity period.In order to which the software licensing confirmed in equipment identifies whether before the deadline, to software licensing mark When knowledge is verified, include the following:
Current time is obtained, in the validity period whether judgement currently carries in permission flag:
When within the validity period, then it represents that the software licensing is identified as effective information, is further made according to software The signature identification encrypted in permission flag is used with verifying mark verification software;
When not within the validity period, then determine that the software licensing is identified as illegal mark, indicates that the software uses Permission flag is no longer valid, and forbids running the software.
Based on it is above-mentioned it is found that the present invention equipment locally can full authority certification, be not necessarily to and server side carry out data Interaction, at the same only with Encryption Algorithm rather than decipherment algorithm so that checking procedure be it is irreversible, effectively increase the peace of verifying Quan Xing.Based on this, operate normally software only on authorized hardware device, uncommitted hardware Equipment then forbids operation to use, and protects the right of software developer well.
Technology contents of the invention are described in further detail combined with specific embodiments below.Setting in the present embodiment It is standby by taking Android intelligent set top box as an example into illustrate specific implementation process.In this embodiment in addition to Intelligent set top box, It further include external device (ED), external device (ED) here includes License (software licensing mark) generating means and License hair Put device.Certainly, two devices can also be located in a device by way of synthesis, here without limitation.As shown in Figure 2 The implementation use-case process of the method for the present invention specifically includes the following steps:
Step 201, License generating means are by MAC | and DeviceID generates License by Encryption Algorithm.
Wherein, License generating means use License Core Generator.MAC | DeviceID is hardware unique identification MAC With the signature identification of device id (DeviceID) assembling.MAC | the initial data of DeviceID is stored with Excel, is ultimately generated License data are also stored with Excel.
License generating means generate the detailed process of License, as shown in Figure 3, comprising: step 301, from data Read MAC | DeviceID;Step 302, by MAC | DeviceID carries out algorithm for encryption and generates License;Step 303, it stores License data.
The algorithm used in this embodiment includes secure hash algorithm SHA256, public key encryption algorithm RSA and BASE64 Algorithm generates.Specifically, referring to fig. 4, step 401, K1=MAC is set | DeviceID.Step 402, SHA256 is carried out to K1 to add It is dense at K2, K2=SHA256 (K1);Step 403, rsa encryption is carried out to K2 and generates K3, K3=RSA (K2, rsa.pub);Step Rapid 404, BASE64 encryption is carried out to K3 and generates License, Licens=BASE64ENCODE (K3).Based on this, pass through The mode that tri- kinds of algorithms of SHA256, RSA and BASE64 combine, can effectively improve the safety of data.
Step 202, License dispensing apparatus reads License, and is written in equipment.
In this step, as shown in figure 5, the dispensing flow path of License dispensing apparatus, can equipment generation link it is complete At being written the License of reading into equipment.
Step 203, equipment reads License, and it is to allow to run that software determines whether to be authorized to by verifying License, Otherwise forbid running.
As shown in fig. 6, verifying the legitimacy of License according to preset checking routine after software download to local.Tool Body, according to the MAC obtained from the device | DeviceID carries out encryption by the Encryption Algorithm that Fig. 4 is described and generates License1 (software using verifying mark), then, the License read according to License1 and from the device are verified, and are matched then Allow runs software, otherwise forbids running.
Based on above-mentioned it is found that the present invention is in verifying, after application software layer encrypts equipment unique features mark Value and License carry out verification matching;Using SHA256 and RSA double-encryption in Encryption Algorithm, and eventually by BASE64 transcoding, the irreversibility of Encryption Algorithm effectively increase the safety of verification, finally improve user experience;In addition, this Invention does not depend on network environment and permission flag publisher server, and verification process interacts without with server, effectively subtracts The processing load of light server side.
Apparatus embodiments
According to an embodiment of the invention, a kind of equipment that soft ware authorization uses is provided, for realizing in above-described embodiment Method.As shown in Figure 7.The equipment includes processor 72 and is stored with the memory 71 of 72 executable instruction of processor.Wherein, Processor 72 can be general processor, such as central processing unit (central processing unit, CPU), can also be Digital signal processor (digital signal processor, DSP), specific integrated circuit (application Specific integrated circuit, ASIC), or be arranged to implement the one or more of the embodiment of the present invention Integrated circuit.Memory 71 is transferred to CPU for storing program code, and by the program code.Memory 71 may include easy The property lost memory (volatile memory), such as random access memory (random access memory, RAM);Storage Device 71 also may include nonvolatile memory (non-volatile memory), such as read-only memory (read-only Memory, ROM), flash memory (flash memory), hard disk (hard disk drive, HDD) or solid state hard disk (solid-state drive, SSD);Memory 71 can also include the combination of the memory of mentioned kind.
Specifically, the embodiment of the present invention provides a kind of equipment that soft ware authorization uses, including memory 71 and processor 72; Wherein, the program that soft ware authorization uses is stored in memory 71, when the program that soft ware authorization uses is executed by processor 72, To realize following steps:
Obtain the signature identification of equipment;
Software, which is generated, according to signature identification uses verifying mark;
Software licensing mark is read from the device, and software licensing is identified using verifying mark according to software It is verified, when passed the verification, then allows runs software.
Wherein, optionally, signature identification includes hardware identifier and the identity of equipment.
When the program that soft ware authorization uses is executed by processor 72, to realize following steps:
Generation software is encrypted to signature identification according to preset Encryption Algorithm and uses verifying mark.
Wherein, Encryption Algorithm includes secure hash algorithm SHA277, public key encryption algorithm RSA and BASE74 Encryption Algorithm One or more of.
Optionally, when the program that soft ware authorization uses is executed by processor 72, to realize following steps:
The software licensing mark is read from the storage region of the equipment;Wherein, the software licensing It is identified as external device (ED) and generation is encrypted to the signature identification according to the Encryption Algorithm, and be stored in advance to the storage region In.
Wherein, optionally, software licensing mark also carries the validity period that software uses;
When the program that soft ware authorization uses is executed by processor 72, to realize following steps:
Judge current time whether within validity period;
When within validity period, further according to software using verifying mark to the feature encrypted in software licensing mark Mark is verified.
When the program that soft ware authorization uses is executed by processor 72, it is also used to realize following steps:
It is obstructed out-of-date when being verified using verifying mark to software licensing mark according to software, then forbid runs software.
Storage medium embodiment
The embodiment of the invention also provides a kind of computer readable storage mediums.Here computer readable storage medium is deposited Contain one or more program.Wherein, computer readable storage medium may include volatile memory, such as arbitrary access Memory;Memory also may include nonvolatile memory, such as read-only memory, flash memory, hard disk or solid-state are hard Disk;Memory can also include the combination of the memory of mentioned kind.When one or more in computer readable storage medium Program can be executed by one or more processor, to realize a kind of side that soft ware authorization uses provided in above-described embodiment Method.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, program can be stored in computer-readable storage medium, the journey Sequence is when being executed, it may include such as the process of the embodiment of above-mentioned each method.
Although describing the application by embodiment, it will be apparent to one skilled in the art that the application is there are many deformation and becomes Change without departing from the spirit and scope of the present invention.If being wanted in this way, these modifications and changes of the present invention belongs to right of the present invention Ask and its equivalent technologies within the scope of, then the present invention is also intended to include these modifications and variations.

Claims (10)

1. a kind of method that soft ware authorization uses characterized by comprising
Obtain the signature identification of equipment;
Software, which is generated, according to the signature identification uses verifying mark;
Software licensing mark is read from the equipment, and the software is used using verifying mark according to the software Permission flag is verified, and when passed the verification, then allows to run the software.
2. the method as described in claim 1, which is characterized in that the signature identification includes the hardware identifier and identity mark of equipment Know.
3. method according to claim 1 or 2, which is characterized in that described to be made according to the signature identification generation software It is identified with verifying, comprising:
The software is generated to signature identification encryption according to preset Encryption Algorithm and uses verifying mark.
4. method as claimed in claim 3, which is characterized in that the Encryption Algorithm includes secure hash algorithm SHA256, public affairs One or more of key Encryption Algorithm RSA and BASE64 Encryption Algorithm.
5. method as claimed in claim 3, which is characterized in that described to read the software licensing mark from the equipment Know, comprising:
The software licensing mark is read from the storage region of the equipment;Wherein, the software licensing mark The signature identification is encrypted according to the Encryption Algorithm for external device (ED) and is generated, and is stored in advance into the storage region.
6. method as claimed in claim 5, which is characterized in that the software licensing mark also carries what software used Validity period;
It is described that software licensing mark is verified using verifying mark according to the software, comprising:
Judge the current time whether within the validity period;
When determining within the validity period, identify further according to the verifying to the signature identification encrypted in the permission flag It is verified.
7. method as claimed in claim 6, which is characterized in that the method also includes:
When determining not within the validity period, then forbid running the software.
8. the method as described in claim 1, which is characterized in that the method also includes:
It is obstructed out-of-date when being verified according to verifying mark to the permission flag, then forbid running the software.
9. a kind of equipment that soft ware authorization uses characterized by comprising memory and processor;Wherein, in the memory It is stored with the program that soft ware authorization uses, when the program that the soft ware authorization uses is executed by the processor, to realize power Benefit requires the step in any one of 1~8 the method.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has soft ware authorization The program used, when the program that the soft ware authorization uses is executed by the processor, to realize that claim 1~8 is any Step in item the method.
CN201710449673.9A 2017-06-14 2017-06-14 A kind of method that soft ware authorization uses, equipment and storage medium Pending CN109086578A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710449673.9A CN109086578A (en) 2017-06-14 2017-06-14 A kind of method that soft ware authorization uses, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710449673.9A CN109086578A (en) 2017-06-14 2017-06-14 A kind of method that soft ware authorization uses, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN109086578A true CN109086578A (en) 2018-12-25

Family

ID=64838998

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710449673.9A Pending CN109086578A (en) 2017-06-14 2017-06-14 A kind of method that soft ware authorization uses, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109086578A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110096849A (en) * 2019-04-02 2019-08-06 深圳市中博科创信息技术有限公司 A kind of License authorization and authentication method, device, equipment and readable storage medium storing program for executing
CN111159652A (en) * 2019-11-29 2020-05-15 云深互联(北京)科技有限公司 Management and control platform authorization file verification method, device, equipment and storage medium
CN112149066A (en) * 2020-09-23 2020-12-29 深兰人工智能芯片研究院(江苏)有限公司 Activation verification method and device for software
CN112507291A (en) * 2020-11-18 2021-03-16 北京深思数盾科技股份有限公司 Method and device for generating unique identifier of Android device
CN113486305A (en) * 2021-09-08 2021-10-08 深圳市信润富联数字科技有限公司 Software License verification method and system based on filtering, intercepting and encrypting technologies
WO2022242035A1 (en) * 2021-05-21 2022-11-24 长扬科技(北京)有限公司 Software secure application method and apparatus
CN117472035A (en) * 2023-12-27 2024-01-30 东方电气风电股份有限公司 Verification method for software and hardware of main control system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040107368A1 (en) * 1998-06-04 2004-06-03 Z4 Technologies, Inc. Method for digital rights management including self activating/self authentication software
CN101068441A (en) * 2007-06-25 2007-11-07 华为技术有限公司 Permission identifying method, identification center and certification system
CN101211394A (en) * 2006-12-30 2008-07-02 智多微电子(上海)有限公司 Software authorization method and device
CN105577644A (en) * 2015-12-07 2016-05-11 汉柏科技有限公司 Encryption and authentication method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040107368A1 (en) * 1998-06-04 2004-06-03 Z4 Technologies, Inc. Method for digital rights management including self activating/self authentication software
CN101211394A (en) * 2006-12-30 2008-07-02 智多微电子(上海)有限公司 Software authorization method and device
CN101068441A (en) * 2007-06-25 2007-11-07 华为技术有限公司 Permission identifying method, identification center and certification system
CN105577644A (en) * 2015-12-07 2016-05-11 汉柏科技有限公司 Encryption and authentication method and system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110096849A (en) * 2019-04-02 2019-08-06 深圳市中博科创信息技术有限公司 A kind of License authorization and authentication method, device, equipment and readable storage medium storing program for executing
CN111159652A (en) * 2019-11-29 2020-05-15 云深互联(北京)科技有限公司 Management and control platform authorization file verification method, device, equipment and storage medium
CN112149066A (en) * 2020-09-23 2020-12-29 深兰人工智能芯片研究院(江苏)有限公司 Activation verification method and device for software
CN112507291A (en) * 2020-11-18 2021-03-16 北京深思数盾科技股份有限公司 Method and device for generating unique identifier of Android device
WO2022242035A1 (en) * 2021-05-21 2022-11-24 长扬科技(北京)有限公司 Software secure application method and apparatus
CN113486305A (en) * 2021-09-08 2021-10-08 深圳市信润富联数字科技有限公司 Software License verification method and system based on filtering, intercepting and encrypting technologies
CN117472035A (en) * 2023-12-27 2024-01-30 东方电气风电股份有限公司 Verification method for software and hardware of main control system
CN117472035B (en) * 2023-12-27 2024-03-08 东方电气风电股份有限公司 Verification method for software and hardware of main control system

Similar Documents

Publication Publication Date Title
JP7086908B2 (en) How to authenticate the actions performed on the target computing device
CN111201530B (en) System and method for security application monitoring
CN109086578A (en) A kind of method that soft ware authorization uses, equipment and storage medium
TWI662432B (en) Mobile communication device and method of operating thereof
TWI648649B (en) Mobile communication device and method of operating same
EP3275159B1 (en) Technologies for secure server access using a trusted license agent
US9112854B1 (en) Secure communication between applications on untrusted platforms
US8966653B2 (en) Method and apparatus for provisioning a mobile application
US8886964B1 (en) Protecting remote asset against data exploits utilizing an embedded key generator
CN109313690A (en) Self-contained encryption boot policy verifying
US20200175208A1 (en) Personalized and cryptographically secure access control in operating systems
CN105164633B (en) The configuration and verifying carried out by trusted provider
CN108781210A (en) Mobile device with credible performing environment
KR20140099325A (en) System and method for key management for issuer security domain using global platform specifications
TW202036347A (en) Method and apparatus for data storage and verification
CN101983375A (en) Binding a cryptographic module to a platform
CN107430658A (en) Fail-safe software certification and checking
CN110222531A (en) A kind of method, system and equipment accessing database
CN110661779B (en) Block chain network-based electronic certificate management method, system, device and medium
US20140157368A1 (en) Software authentication
EP2503482A1 (en) Electronic device with flash memory component
CN115022091B (en) Autonomous authorization method and system based on digital certificate
EP3338214B1 (en) Secure computation environment
Cooijmans et al. Secure key storage and secure computation in Android
US8745375B2 (en) Handling of the usage of software in a disconnected computing environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination