CN109086578A - A kind of method that soft ware authorization uses, equipment and storage medium - Google Patents
A kind of method that soft ware authorization uses, equipment and storage medium Download PDFInfo
- Publication number
- CN109086578A CN109086578A CN201710449673.9A CN201710449673A CN109086578A CN 109086578 A CN109086578 A CN 109086578A CN 201710449673 A CN201710449673 A CN 201710449673A CN 109086578 A CN109086578 A CN 109086578A
- Authority
- CN
- China
- Prior art keywords
- software
- mark
- equipment
- verifying
- soft ware
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 238000013475 authorization Methods 0.000 title claims abstract description 34
- 238000012795 verification Methods 0.000 claims abstract description 14
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 claims description 7
- 230000008901 benefit Effects 0.000 claims description 2
- 230000002427 irreversible effect Effects 0.000 abstract description 3
- 230000003993 interaction Effects 0.000 abstract description 2
- 230000008569 process Effects 0.000 description 8
- 238000012545 processing Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 238000011161 development Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000003786 synthesis reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
Abstract
The invention discloses a kind of method that soft ware authorization uses, equipment and storage mediums.Wherein, this method comprises: obtaining the signature identification of equipment;Software, which is generated, according to signature identification uses verifying mark;Software licensing mark is read from the device, and software licensing mark is verified using verifying mark according to software, when passed the verification, then allows runs software.The present invention effectively reduces the interaction with server; the safety of verifying is effectively increased using irreversible encryption algorithm simultaneously; so that software only operates normally on authorized hardware device, uncommitted hardware device then forbids operation to use, and protects the right of software developer well.
Description
Technical field
The present invention relates to fields of communication technology, are situated between more particularly to a kind of method that soft ware authorization uses, equipment and storage
Matter.
Background technique
With the rapid development of terminal technology, no longer only limit is equipped on hand to intelligent operating system (such as Android)
The equipment such as machine, tablet computer, Intelligent set top box also start to be carried, to provide richer programme content for people.And
With the rapid development of hardware, terminal is lower and lower in the input cost of hardware aspect, and software application abundant is becoming convex
The pith of aobvious product.Software is upper more and more abundant in function and design, and the effort that exploitation software application is paid is also more next
It is bigger.And the abundant of software application brings software security problem therewith, and software how to be prevented to be not authorized to use then more
It is important.
Summary of the invention
The present invention provides a kind of method that soft ware authorization uses, equipment and storage medium, soft in the prior art to solve
The problem of part is not authorized to use.
For achieving the above object, the present invention uses following technical solutions:
According to the present invention on one side, a kind of method that soft ware authorization uses is provided, comprising:
Obtain the signature identification of equipment;
Software, which is generated, according to the signature identification uses verifying mark;
Software licensing mark is read from the equipment, and is identified using verifying to the software according to the software
It is verified using permission flag, when passed the verification, then allows to run the software.
Optionally, the signature identification includes hardware identifier and the identity of equipment.
It is optionally, described that verifying mark is used according to the signature identification generation software, comprising:
The software is generated to signature identification encryption according to preset Encryption Algorithm and uses verifying mark.
Optionally, the Encryption Algorithm includes that secure hash algorithm SHA256, public key encryption algorithm RSA and BASE64 add
One or more of close algorithm.
It is optionally, described that the software licensing mark is read from the equipment, comprising:
The software licensing mark is read from the storage region of the equipment;Wherein, the software licensing
It is identified as external device (ED) and generation is encrypted to the signature identification according to the Encryption Algorithm, and be stored in advance to the storage region
In.
Optionally, the software licensing mark also carries the validity period that software uses;
It is described that software licensing mark is verified using verifying mark according to the software, comprising:
Judge the current time whether within the validity period;
When determining within the validity period, identify further according to the verifying to the feature encrypted in the permission flag
Mark is verified.
Optionally, the method also includes:
When determining not within the validity period, then forbid running the software.
Optionally, the method also includes:
It is obstructed out-of-date when being verified according to verifying mark to the permission flag, then forbid running the software.
According to one aspect of the present invention, a kind of equipment that soft ware authorization uses is provided, comprising: memory and processor;
Wherein, the program that soft ware authorization uses is stored in the memory, when the program that the soft ware authorization uses is by the processing
When device executes, to realize the step in method described above.
According to one aspect of the present invention, a kind of computer readable storage medium, the computer-readable storage medium are provided
Matter is stored with the program that soft ware authorization uses, when the program that the soft ware authorization uses is executed by the processor, to realize
Step in method described above.
The present invention has the beneficial effect that:
Method, equipment and the storage medium that soft ware authorization provided by the present invention uses, in local to soft ware authorization situation
It is verified, is not necessarily to interact with server side in entire verification process, effectively reduces the processing load of server, adopt simultaneously
The safety that verifying effectively increases verifying is carried out with irreversible encryption algorithm.Based on this, software is made only to exist through the invention
It is operated normally above authorized hardware device, uncommitted hardware device then forbids operation to use, and protects well soft
The right of part developer.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention,
And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can
It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
In order to illustrate the embodiments of the present invention more clearly or it is existing in scheme, below will be in embodiment or existing description
Required attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some
Embodiment without any creative labor, can also be according to these attached drawings for ordinary people in the field
Obtain other attached drawings.
Fig. 1 is the flow chart of soft ware authorization application method provided by the embodiment of the present invention;
Fig. 2 is the flow chart of generation and the verification of License in a specific embodiment of the invention;
Fig. 3 is the flow chart that License is generated in a specific embodiment of the invention;
Fig. 4 is the flow chart of License generating means encryption in a specific embodiment of the invention;
Fig. 5 is the specific flow chart that License is provided in a specific embodiment of the invention;
Fig. 6 is the specific flow chart of License verification in a specific embodiment of the invention;
Fig. 7 is the functional block diagram that soft ware authorization provided by the embodiment of the present invention uses equipment.
Specific embodiment
Below in conjunction with attached drawing and embodiment, the present invention will be described in further detail.It should be appreciated that described herein
Specific embodiment be only used to explain the present invention, limit the present invention.
Its thinking of the method that soft ware authorization provided by the embodiment of the present invention uses is, after software download to equipment,
It is local that soft ware authorization situation is verified, it is not necessarily to interact with server side in entire verification process, it only need to be according to equipment
Unique features mark whether matched with the permission flag stored in equipment again after preset algorithm calculates to determine using soft
Whether part authorizes operation.It is described in detail with reference to the accompanying drawing.
Embodiment of the method
As shown in Figure 1, the method that soft ware authorization provided by the embodiment of the present invention uses, includes the following steps:
Step 101, the signature identification of equipment is obtained.
In this step, equipment can the terminals such as mobile phone, tablet computer, laptop, palm PC, can be with
For terminals such as Intelligent set top box, desktop computers.
Signature identification is to refer to indicate the unique identification information of equipment.Optionally, this feature mark includes the hard of equipment
Part mark and identity.Hardware identifier is primarily referred to as the MAC Address of equipment, and identity can be the factory of the equipment
The information such as the sequence number of the mark of quotient or equipment.For example, IMEI (the International Mobile Equipment of equipment
Identity, International Mobile Equipment Identity code) or android system be developer provide for identifying the string number of equipment
(DEVICE_ID).Since these identification informations are all information entrained by equipment itself, in the signature identification for obtaining equipment
When, it can directly be obtained by the relevant interface of equipment itself, be believed without other configurations device (such as network interface card) etc.
Breath is to obtain.
Step 102, software is generated according to signature identification and uses verifying mark.
In this step, real by preset Encryption Algorithm when generating software using verifying mark according to signature identification
It is existing.Here Encryption Algorithm includes secure hash algorithm SHA256, in public key encryption algorithm RSA and BASE64 Encryption Algorithm
It is one or more kinds of.
Step 103, software licensing mark is read from the device, and software is used using verifying mark according to software
Permission flag is verified, and when passed the verification, then allows software to run.
In this step, software licensing mark is read from the device, need to read software from the storage region of equipment
Use permission flag.Here, software licensing is identified as external device (ED) and encrypts generation to signature identification according to Encryption Algorithm, and
It is stored in advance into storage region.
When verifying using verifying mark to software licensing mark according to software, two marks are mainly judged
It is whether identical: when identical, then it represents that verification passes through, and allows for runs software;When two marks are not identical, then it represents that verification
Failure, then forbid running the software.
It is found that being verified by the software licensing mark generated according to the unique signature identification of equipment, Ke Yiyou
Effect ensures the uniqueness that soft ware authorization uses, and effectively avoids the situation identified using illegal software licensing.
It wherein, optionally, further include that software makes in software licensing mark other than above-mentioned encrypted feature mark
Validity period.In order to which the software licensing confirmed in equipment identifies whether before the deadline, to software licensing mark
When knowledge is verified, include the following:
Current time is obtained, in the validity period whether judgement currently carries in permission flag:
When within the validity period, then it represents that the software licensing is identified as effective information, is further made according to software
The signature identification encrypted in permission flag is used with verifying mark verification software;
When not within the validity period, then determine that the software licensing is identified as illegal mark, indicates that the software uses
Permission flag is no longer valid, and forbids running the software.
Based on it is above-mentioned it is found that the present invention equipment locally can full authority certification, be not necessarily to and server side carry out data
Interaction, at the same only with Encryption Algorithm rather than decipherment algorithm so that checking procedure be it is irreversible, effectively increase the peace of verifying
Quan Xing.Based on this, operate normally software only on authorized hardware device, uncommitted hardware
Equipment then forbids operation to use, and protects the right of software developer well.
Technology contents of the invention are described in further detail combined with specific embodiments below.Setting in the present embodiment
It is standby by taking Android intelligent set top box as an example into illustrate specific implementation process.In this embodiment in addition to Intelligent set top box,
It further include external device (ED), external device (ED) here includes License (software licensing mark) generating means and License hair
Put device.Certainly, two devices can also be located in a device by way of synthesis, here without limitation.As shown in Figure 2
The implementation use-case process of the method for the present invention specifically includes the following steps:
Step 201, License generating means are by MAC | and DeviceID generates License by Encryption Algorithm.
Wherein, License generating means use License Core Generator.MAC | DeviceID is hardware unique identification MAC
With the signature identification of device id (DeviceID) assembling.MAC | the initial data of DeviceID is stored with Excel, is ultimately generated
License data are also stored with Excel.
License generating means generate the detailed process of License, as shown in Figure 3, comprising: step 301, from data
Read MAC | DeviceID;Step 302, by MAC | DeviceID carries out algorithm for encryption and generates License;Step 303, it stores
License data.
The algorithm used in this embodiment includes secure hash algorithm SHA256, public key encryption algorithm RSA and BASE64
Algorithm generates.Specifically, referring to fig. 4, step 401, K1=MAC is set | DeviceID.Step 402, SHA256 is carried out to K1 to add
It is dense at K2, K2=SHA256 (K1);Step 403, rsa encryption is carried out to K2 and generates K3, K3=RSA (K2, rsa.pub);Step
Rapid 404, BASE64 encryption is carried out to K3 and generates License, Licens=BASE64ENCODE (K3).Based on this, pass through
The mode that tri- kinds of algorithms of SHA256, RSA and BASE64 combine, can effectively improve the safety of data.
Step 202, License dispensing apparatus reads License, and is written in equipment.
In this step, as shown in figure 5, the dispensing flow path of License dispensing apparatus, can equipment generation link it is complete
At being written the License of reading into equipment.
Step 203, equipment reads License, and it is to allow to run that software determines whether to be authorized to by verifying License,
Otherwise forbid running.
As shown in fig. 6, verifying the legitimacy of License according to preset checking routine after software download to local.Tool
Body, according to the MAC obtained from the device | DeviceID carries out encryption by the Encryption Algorithm that Fig. 4 is described and generates License1
(software using verifying mark), then, the License read according to License1 and from the device are verified, and are matched then
Allow runs software, otherwise forbids running.
Based on above-mentioned it is found that the present invention is in verifying, after application software layer encrypts equipment unique features mark
Value and License carry out verification matching;Using SHA256 and RSA double-encryption in Encryption Algorithm, and eventually by
BASE64 transcoding, the irreversibility of Encryption Algorithm effectively increase the safety of verification, finally improve user experience;In addition, this
Invention does not depend on network environment and permission flag publisher server, and verification process interacts without with server, effectively subtracts
The processing load of light server side.
Apparatus embodiments
According to an embodiment of the invention, a kind of equipment that soft ware authorization uses is provided, for realizing in above-described embodiment
Method.As shown in Figure 7.The equipment includes processor 72 and is stored with the memory 71 of 72 executable instruction of processor.Wherein,
Processor 72 can be general processor, such as central processing unit (central processing unit, CPU), can also be
Digital signal processor (digital signal processor, DSP), specific integrated circuit (application
Specific integrated circuit, ASIC), or be arranged to implement the one or more of the embodiment of the present invention
Integrated circuit.Memory 71 is transferred to CPU for storing program code, and by the program code.Memory 71 may include easy
The property lost memory (volatile memory), such as random access memory (random access memory, RAM);Storage
Device 71 also may include nonvolatile memory (non-volatile memory), such as read-only memory (read-only
Memory, ROM), flash memory (flash memory), hard disk (hard disk drive, HDD) or solid state hard disk
(solid-state drive, SSD);Memory 71 can also include the combination of the memory of mentioned kind.
Specifically, the embodiment of the present invention provides a kind of equipment that soft ware authorization uses, including memory 71 and processor 72;
Wherein, the program that soft ware authorization uses is stored in memory 71, when the program that soft ware authorization uses is executed by processor 72,
To realize following steps:
Obtain the signature identification of equipment;
Software, which is generated, according to signature identification uses verifying mark;
Software licensing mark is read from the device, and software licensing is identified using verifying mark according to software
It is verified, when passed the verification, then allows runs software.
Wherein, optionally, signature identification includes hardware identifier and the identity of equipment.
When the program that soft ware authorization uses is executed by processor 72, to realize following steps:
Generation software is encrypted to signature identification according to preset Encryption Algorithm and uses verifying mark.
Wherein, Encryption Algorithm includes secure hash algorithm SHA277, public key encryption algorithm RSA and BASE74 Encryption Algorithm
One or more of.
Optionally, when the program that soft ware authorization uses is executed by processor 72, to realize following steps:
The software licensing mark is read from the storage region of the equipment;Wherein, the software licensing
It is identified as external device (ED) and generation is encrypted to the signature identification according to the Encryption Algorithm, and be stored in advance to the storage region
In.
Wherein, optionally, software licensing mark also carries the validity period that software uses;
When the program that soft ware authorization uses is executed by processor 72, to realize following steps:
Judge current time whether within validity period;
When within validity period, further according to software using verifying mark to the feature encrypted in software licensing mark
Mark is verified.
When the program that soft ware authorization uses is executed by processor 72, it is also used to realize following steps:
It is obstructed out-of-date when being verified using verifying mark to software licensing mark according to software, then forbid runs software.
Storage medium embodiment
The embodiment of the invention also provides a kind of computer readable storage mediums.Here computer readable storage medium is deposited
Contain one or more program.Wherein, computer readable storage medium may include volatile memory, such as arbitrary access
Memory;Memory also may include nonvolatile memory, such as read-only memory, flash memory, hard disk or solid-state are hard
Disk;Memory can also include the combination of the memory of mentioned kind.When one or more in computer readable storage medium
Program can be executed by one or more processor, to realize a kind of side that soft ware authorization uses provided in above-described embodiment
Method.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, program can be stored in computer-readable storage medium, the journey
Sequence is when being executed, it may include such as the process of the embodiment of above-mentioned each method.
Although describing the application by embodiment, it will be apparent to one skilled in the art that the application is there are many deformation and becomes
Change without departing from the spirit and scope of the present invention.If being wanted in this way, these modifications and changes of the present invention belongs to right of the present invention
Ask and its equivalent technologies within the scope of, then the present invention is also intended to include these modifications and variations.
Claims (10)
1. a kind of method that soft ware authorization uses characterized by comprising
Obtain the signature identification of equipment;
Software, which is generated, according to the signature identification uses verifying mark;
Software licensing mark is read from the equipment, and the software is used using verifying mark according to the software
Permission flag is verified, and when passed the verification, then allows to run the software.
2. the method as described in claim 1, which is characterized in that the signature identification includes the hardware identifier and identity mark of equipment
Know.
3. method according to claim 1 or 2, which is characterized in that described to be made according to the signature identification generation software
It is identified with verifying, comprising:
The software is generated to signature identification encryption according to preset Encryption Algorithm and uses verifying mark.
4. method as claimed in claim 3, which is characterized in that the Encryption Algorithm includes secure hash algorithm SHA256, public affairs
One or more of key Encryption Algorithm RSA and BASE64 Encryption Algorithm.
5. method as claimed in claim 3, which is characterized in that described to read the software licensing mark from the equipment
Know, comprising:
The software licensing mark is read from the storage region of the equipment;Wherein, the software licensing mark
The signature identification is encrypted according to the Encryption Algorithm for external device (ED) and is generated, and is stored in advance into the storage region.
6. method as claimed in claim 5, which is characterized in that the software licensing mark also carries what software used
Validity period;
It is described that software licensing mark is verified using verifying mark according to the software, comprising:
Judge the current time whether within the validity period;
When determining within the validity period, identify further according to the verifying to the signature identification encrypted in the permission flag
It is verified.
7. method as claimed in claim 6, which is characterized in that the method also includes:
When determining not within the validity period, then forbid running the software.
8. the method as described in claim 1, which is characterized in that the method also includes:
It is obstructed out-of-date when being verified according to verifying mark to the permission flag, then forbid running the software.
9. a kind of equipment that soft ware authorization uses characterized by comprising memory and processor;Wherein, in the memory
It is stored with the program that soft ware authorization uses, when the program that the soft ware authorization uses is executed by the processor, to realize power
Benefit requires the step in any one of 1~8 the method.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has soft ware authorization
The program used, when the program that the soft ware authorization uses is executed by the processor, to realize that claim 1~8 is any
Step in item the method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710449673.9A CN109086578A (en) | 2017-06-14 | 2017-06-14 | A kind of method that soft ware authorization uses, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710449673.9A CN109086578A (en) | 2017-06-14 | 2017-06-14 | A kind of method that soft ware authorization uses, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109086578A true CN109086578A (en) | 2018-12-25 |
Family
ID=64838998
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710449673.9A Pending CN109086578A (en) | 2017-06-14 | 2017-06-14 | A kind of method that soft ware authorization uses, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109086578A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110096849A (en) * | 2019-04-02 | 2019-08-06 | 深圳市中博科创信息技术有限公司 | A kind of License authorization and authentication method, device, equipment and readable storage medium storing program for executing |
CN111159652A (en) * | 2019-11-29 | 2020-05-15 | 云深互联(北京)科技有限公司 | Management and control platform authorization file verification method, device, equipment and storage medium |
CN112149066A (en) * | 2020-09-23 | 2020-12-29 | 深兰人工智能芯片研究院(江苏)有限公司 | Activation verification method and device for software |
CN112507291A (en) * | 2020-11-18 | 2021-03-16 | 北京深思数盾科技股份有限公司 | Method and device for generating unique identifier of Android device |
CN113486305A (en) * | 2021-09-08 | 2021-10-08 | 深圳市信润富联数字科技有限公司 | Software License verification method and system based on filtering, intercepting and encrypting technologies |
WO2022242035A1 (en) * | 2021-05-21 | 2022-11-24 | 长扬科技(北京)有限公司 | Software secure application method and apparatus |
CN117472035A (en) * | 2023-12-27 | 2024-01-30 | 东方电气风电股份有限公司 | Verification method for software and hardware of main control system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040107368A1 (en) * | 1998-06-04 | 2004-06-03 | Z4 Technologies, Inc. | Method for digital rights management including self activating/self authentication software |
CN101068441A (en) * | 2007-06-25 | 2007-11-07 | 华为技术有限公司 | Permission identifying method, identification center and certification system |
CN101211394A (en) * | 2006-12-30 | 2008-07-02 | 智多微电子(上海)有限公司 | Software authorization method and device |
CN105577644A (en) * | 2015-12-07 | 2016-05-11 | 汉柏科技有限公司 | Encryption and authentication method and system |
-
2017
- 2017-06-14 CN CN201710449673.9A patent/CN109086578A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040107368A1 (en) * | 1998-06-04 | 2004-06-03 | Z4 Technologies, Inc. | Method for digital rights management including self activating/self authentication software |
CN101211394A (en) * | 2006-12-30 | 2008-07-02 | 智多微电子(上海)有限公司 | Software authorization method and device |
CN101068441A (en) * | 2007-06-25 | 2007-11-07 | 华为技术有限公司 | Permission identifying method, identification center and certification system |
CN105577644A (en) * | 2015-12-07 | 2016-05-11 | 汉柏科技有限公司 | Encryption and authentication method and system |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110096849A (en) * | 2019-04-02 | 2019-08-06 | 深圳市中博科创信息技术有限公司 | A kind of License authorization and authentication method, device, equipment and readable storage medium storing program for executing |
CN111159652A (en) * | 2019-11-29 | 2020-05-15 | 云深互联(北京)科技有限公司 | Management and control platform authorization file verification method, device, equipment and storage medium |
CN112149066A (en) * | 2020-09-23 | 2020-12-29 | 深兰人工智能芯片研究院(江苏)有限公司 | Activation verification method and device for software |
CN112507291A (en) * | 2020-11-18 | 2021-03-16 | 北京深思数盾科技股份有限公司 | Method and device for generating unique identifier of Android device |
WO2022242035A1 (en) * | 2021-05-21 | 2022-11-24 | 长扬科技(北京)有限公司 | Software secure application method and apparatus |
CN113486305A (en) * | 2021-09-08 | 2021-10-08 | 深圳市信润富联数字科技有限公司 | Software License verification method and system based on filtering, intercepting and encrypting technologies |
CN117472035A (en) * | 2023-12-27 | 2024-01-30 | 东方电气风电股份有限公司 | Verification method for software and hardware of main control system |
CN117472035B (en) * | 2023-12-27 | 2024-03-08 | 东方电气风电股份有限公司 | Verification method for software and hardware of main control system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7086908B2 (en) | How to authenticate the actions performed on the target computing device | |
CN111201530B (en) | System and method for security application monitoring | |
CN109086578A (en) | A kind of method that soft ware authorization uses, equipment and storage medium | |
TWI662432B (en) | Mobile communication device and method of operating thereof | |
TWI648649B (en) | Mobile communication device and method of operating same | |
EP3275159B1 (en) | Technologies for secure server access using a trusted license agent | |
US9112854B1 (en) | Secure communication between applications on untrusted platforms | |
US8966653B2 (en) | Method and apparatus for provisioning a mobile application | |
US8886964B1 (en) | Protecting remote asset against data exploits utilizing an embedded key generator | |
CN109313690A (en) | Self-contained encryption boot policy verifying | |
US20200175208A1 (en) | Personalized and cryptographically secure access control in operating systems | |
CN105164633B (en) | The configuration and verifying carried out by trusted provider | |
CN108781210A (en) | Mobile device with credible performing environment | |
KR20140099325A (en) | System and method for key management for issuer security domain using global platform specifications | |
TW202036347A (en) | Method and apparatus for data storage and verification | |
CN101983375A (en) | Binding a cryptographic module to a platform | |
CN107430658A (en) | Fail-safe software certification and checking | |
CN110222531A (en) | A kind of method, system and equipment accessing database | |
CN110661779B (en) | Block chain network-based electronic certificate management method, system, device and medium | |
US20140157368A1 (en) | Software authentication | |
EP2503482A1 (en) | Electronic device with flash memory component | |
CN115022091B (en) | Autonomous authorization method and system based on digital certificate | |
EP3338214B1 (en) | Secure computation environment | |
Cooijmans et al. | Secure key storage and secure computation in Android | |
US8745375B2 (en) | Handling of the usage of software in a disconnected computing environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |