CN109753769A - A kind of software authorization method and system based on block chain - Google Patents

A kind of software authorization method and system based on block chain Download PDF

Info

Publication number
CN109753769A
CN109753769A CN201811405865.0A CN201811405865A CN109753769A CN 109753769 A CN109753769 A CN 109753769A CN 201811405865 A CN201811405865 A CN 201811405865A CN 109753769 A CN109753769 A CN 109753769A
Authority
CN
China
Prior art keywords
software
block chain
license info
authorization
catenary system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811405865.0A
Other languages
Chinese (zh)
Other versions
CN109753769B (en
Inventor
曹京奇
唐正超
瞿争
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhongan Information Technology Service Co ltd
Original Assignee
Zhongan Information Technology Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongan Information Technology Service Co Ltd filed Critical Zhongan Information Technology Service Co Ltd
Priority to CN201811405865.0A priority Critical patent/CN109753769B/en
Publication of CN109753769A publication Critical patent/CN109753769A/en
Application granted granted Critical
Publication of CN109753769B publication Critical patent/CN109753769B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of software authorization method and system based on block chain, this method comprises: to increase block chain module in licensed software;It presets the first soft ware authorization information and block catenary system is written and obtain the first execution License Info;When licensed software, block chain module starts and accesses block catenary system for starting;It carries out first and executes License Info verification, if the first execution License Info is effective, runs software, otherwise refusal starting;Block catenary system is to management software authorization message.Software is authorized by block chain in the present invention, utilize the characteristic of block chain, so that the software authorization method is versatile, software security after authorization is high, any to carry out software piracy by copying, resetting the illegal acts such as authorization message privately, all will lead to software can not be unable to run by the authority checking of block chain, due to the characteristic of block chain, so that attempting to crack software in a manner of by cracking block chain, it is nearly impossible.

Description

A kind of software authorization method and system based on block chain
Technical field
The present invention relates to Software Protection Technique field, in particular to a kind of software authorization method based on block chain and it is System.
Background technique
Block chain (Block Chain) technology is the peer-to-peer network based on decentralization, by Cryptography Principles and common recognition machine System combines, and the data to ensure distributed each node are coherent and continue, and realizes that information is verified immediately, be can be traced, difficulty is distorted Characteristic, to create a set of privacy, distributed trust system efficiently, safe.
Soft ware authorization is the extension and development of software protection concept.The target of soft ware authorization is to allow software users according to purchase License to be related to the installation number of software using software, using the time, the contents such as application range and function sub-modules.For For software protection, core concept is to prevent software pirate version.
There are many kinds of the methods of software piracy, usually has modification system time, resetting authorization message, redirects the service for checking credentials Device, dis-assembling etc..Wherein in addition to the pirate mode of dis-assembling has high difficulty, remaining method difficulty is all general, i.e. software Pirate cost is not very high.Therefore soft ware authorization is always the problem of influencing software developer's personal equity.
Current soft ware authorization technology is generally divided into hardware authorization and soft ware authorization.The former is that visit is added when writing for software The code snippet for asking external equipment, when software at runtime, need to rely on external pluggable authorization hardware (such as softdog) It could normally execute, if hardware lacks, software executes refusal.And the latter realizes usually using the authorization code of encryption, it will Authorization code is bound one by one with the unique identifying information extracted from the host of runs software, when software is replicated or authorization message quilt When abuse, software will be prevented this behavior by verifying binding relationship.
The prior art has the following disadvantages: for hardware authorization, needs additionally to purchase external encryption equipment, not only causes wave Take, and there are many usage scenarios that can not access external equipment, such as software to be disposed using cloud;For soft ware authorization, one Denier a copy of it software is cracked, then the software being cracked usually can be copied infinitely, and is often difficult to take to arrange It applies and control is carried out to this behavior, to greatly invade the equity of software developer.
It would therefore be desirable to find a kind of versatile, higher software authorization method of safety.
Summary of the invention
In view of this, the embodiment of the invention provides a kind of software authorization method and system based on block chain, the software Authorization method is versatile, and the software security after authorization is high.
Technical solution provided in an embodiment of the present invention is as follows:
To increase block chain module in licensed software;
It presets the first soft ware authorization information and block catenary system is written, obtain first and execute License Info;
Starting is described when licensed software, and the block chain module starts and accesses the block catenary system;
It carries out first and executes License Info verification, if the first execution License Info is effective, runs software;Otherwise it refuses Operation absolutely;
Wherein, the block catenary system is to management software authorization message.
It is described to preset the first soft ware authorization information and the block linkwork is written as a kind of preferable implementation method System obtains first and executes License Info, includes the following steps:
The block catenary system receives the first soft ware authorization information;
The block catenary system identifies and executes the first soft ware authorization information, obtains first and executes License Info;
The block catenary system records described first and executes License Info.
It as a kind of preferable implementation method, carries out first and executes License Info verification, if described first executes license letter Breath is effective, then runs software;Otherwise refusal operation, comprising:
The block chain module reads the first execution License Info in the block catenary system;
Judge whether the first execution License Info is effective, if effectively, runs software, if in vain, refusing to run Software.
As a kind of preferable implementation method, the method also includes:
Judge whether the first execution License Info is in validity period in software use, if first execution is permitted Can information failure out of date, then prompt user to be authorized again;
User independently chooses whether to be authorized again, if so, it is prompted to buy the second soft ware authorization information, carries out weight New authorization.
It is described to authorize again as a kind of preferable implementation method, include the following steps:
Second soft ware authorization information is set and the block catenary system is written, obtains second and executes License Info;
Starting is described when licensed software, and the block chain module starts and accesses the block catenary system;
It carries out second and executes License Info verification, if the second execution License Info is effective, runs software;Otherwise it refuses Operation absolutely.
On the other hand, a kind of software authorization system of block chain for executing the above method, the soft ware authorization system are provided System includes the block chain module and block catenary system of communication connection, wherein
The block chain module includes:
Input submodule: for inputting the first soft ware authorization information;
Promoter module: for starting the block chain module;
Access submodule: for the block chain module to be accessed the block catenary system;
Verification submodule: for carrying out the verification of the first execution License Info;
Control submodule: for starting software when described first executes License Info and verify effective.
As a kind of preferable implementation method, the block catenary system includes:
Receiving module: for receiving the first soft ware authorization information;
Execution module: it for executing the first soft ware authorization information, obtains described first and executes License Info;
Memory module: License Info is executed for recording described first.
As a kind of preferable implementation method, the block chain module further include:
Reading submodule: License Info is executed for reading first in the block catenary system;
As a kind of preferable implementation method, the block chain module further include:
Judging submodule: whether it is in validity period for the first execution License Info described in judging in software use;
Output sub-module: for when the first execution License Info failure out of date, whether output to need to carry out weight The prompt information newly authorized;
Identify submodule: the information of user's input whether authorized again for identification;
Handle submodule: the information whether authorized again for being inputted according to user is handled, if so, mentioning Show that user buys the second soft ware authorization information, if it is not, then terminating software license.
The beneficial effect of the embodiment of the present invention compared to existing technologies is that the embodiment of the present invention provides a kind of based on area The software authorization method and system of block chain, which comprises to increase block chain module in licensed software;Preset Simultaneously block catenary system is written in one soft ware authorization information, obtains first and executes License Info;Starting is described when licensed software, described Block chain module starts and accesses the block catenary system;It carries out first and executes License Info verification, if first execution is permitted Can information it is effective, then runs software;Otherwise refusal operation;Wherein, the block catenary system is to management software authorization message.This In invention, software is authorized by block chain, efficient, safe, traceable, the difficult characteristic distorted using block chain, so that should Software authorization method is versatile, and the software security after authorization is high, any by copying, modifying system time, resetting privately The illegal acts such as authorization message carry out software piracy, all will lead to software can not by the authority checking on block chain and nothing Method operation, and due to the characteristic of block chain, so that attempting to crack software in a manner of by cracking block chain, almost It is impossible.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing.
Fig. 1 is a kind of flow chart of the software authorization method based on block chain in the embodiment of the present invention one;
Fig. 2 is a kind of structural schematic diagram of the software authorization system based on block chain in the embodiment of the present invention two.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached in the embodiment of the present invention Figure, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only this Invention a part of the embodiment, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art exist Every other embodiment obtained under the premise of creative work is not made, shall fall within the protection scope of the present invention.
Embodiment one
A kind of software authorization method based on block chain is provided in the present embodiment, versatile, the software peace after authorization Quan Xinggao.
The software authorization method that the present embodiment one is protected is to be realized based on block chain, therefore need before being authorized Safeguard the block catenary system to manage authorization message of corresponding scale.It, can be according to software in selected block catenary system Specific authorization scene, selects different block catenary systems.If authorization scene is the software batch authorization of enterprises, can Using the private catenary system for operating in the enterprises;If authorizing scene is the software batch authorization towards multiple enterprises, that System can be linked using the alliance operated between multiple enterprises;If authorizing scene is the soft of Internet individual consumer Part authorization, can be using the public catenary system of operation on the internet.
It is not high to the performance of block chain, memory requirement due under the special scenes of soft ware authorization, therefore using extremely The block catenary system of lightweight, can meet the needs of authorization function, while will not bring again to the execution of software itself big It influences.
Fig. 1 is a kind of flow chart for software authorization method based on block chain that the embodiment of the present invention one provides, referring to figure 1, this method specifically comprises the following steps:
S1, in licensed software increase block chain module.
Since block catenary system itself is also software systems, being with software to be authorized can be with the product of seamless connection.? Increase block chain module in software to be authorized, software itself can't be affected.Match confidence needed for block chain module Breath, may be incorporated in the configuration information of software itself.
Since software may be to be write using various programming languages, the block catenary system that we select is required to solve each Information compatibling problem caused by kind programming language.Therefore, we can use some good coding mode informations of compatibility, Such as: json, protobuf etc..
S2, it presets the first soft ware authorization information and block catenary system is written, obtain first and execute License Info.
When software user buys software to software developer, software user can obtain the first soft ware authorization information, By the verifying of block catenary system, software is authorized, and can star.
In software deployment, the setting of the first soft ware authorization information is carried out, which is block linkwork The information that system can identify.Software user buys the first soft ware authorization information to software developer, and software developer is by first Block catenary system is written in soft ware authorization information, after the first soft ware authorization information is identified and executed by block catenary system, obtains the One executes License Info, and first that corresponding software will be recorded in block chain executes License Info, the first execution License Info It will be used when software starts.
Specifically, block catenary system is written in the first soft ware authorization information by software developer comprising following sub-step:
S21, block catenary system receive the first soft ware authorization information;
S22, block catenary system identify and execute the first soft ware authorization information, obtain first and execute License Info;
S23, block catenary system record first execute License Info.
Certainly, before block catenary system receives the first soft ware authorization information, software developer needs to pass through respective nodes The first soft ware authorization information is sent to block catenary system.
When licensed software, block chain module starts and accesses block catenary system for S3, starting.
When licensed software starting, block chain module starts first.After the starting of block chain module, block can be accessed Catenary system, and the information in block catenary system is read, carry out communications.
S4, the first execution License Info verification is carried out, if the first execution License Info is effective, runs software;Otherwise it refuses Operation absolutely comprising following sub-step:
S41, block chain module read the first execution License Info in block catenary system.
Specifically, after block chain module access block catenary system, the information in block chain can be read, so that discovery is preparatory Record executes License Info to the first of licensed software.
S42, judge whether the first execution License Info is effective, if effectively, runs software, if in vain, refusing Runs software.
So far, software is authorized, and can be used normally.
After soft ware authorization, validity period is used with certain, after authorization expires, software is out of service, software user The authorization again of software can be carried out as needed.
Therefore, software authorization method of one of the present embodiment based on block chain further include:
Judge whether the first execution License Info is in validity period in software use, if first has executed License Info Expired failure, then prompt user to be authorized again;
User independently chooses whether to be authorized again, if so, it is prompted to buy the second soft ware authorization information, carries out weight New authorization.
Wherein, authorization includes the following steps: again
Second soft ware authorization information is set and block catenary system is written, obtains the second software execution information;
When licensed software, block chain module starts and accesses block catenary system for starting;
The second software execution information verification is carried out, if second software execution information is effective, runs software;Otherwise it refuses Operation absolutely.
A kind of software authorization method based on block chain provided in this embodiment, software are authorized by block chain, benefit With block chain is efficient, safe, traceable, the difficult characteristic distorted, so that the software authorization method is versatile, the software after authorization It is highly-safe, it is any to carry out software piracy by copying, modifying the illegal acts such as system time, resetting authorization message privately, All will lead to software can not be unable to run by the authority checking on block chain, and due to the characteristic of block chain, so that Attempt to crack software in a manner of by cracking block chain, be nearly impossible.
Embodiment two:
One of one software authorization method based on block chain based on the above embodiment, the present embodiment provides one kind to be based on The software authorization system of block chain.Fig. 2 is a kind of structural schematic diagram of the software authorization system based on block chain in the present embodiment, Referring to Fig. 2, which includes the block chain module and block catenary system of communication connection, wherein
Block chain module includes:
Input submodule: for inputting the first soft ware authorization information;
Promoter module: for starting block chain module;
Access submodule: for block chain module to be accessed block catenary system;
Verification submodule: for carrying out whether the first execution License Info effectively verifies in soft ware authorization;
Control submodule: for starting software when first executes License Info and verify effective.
Block catenary system includes:
Receiving module: for receiving the first soft ware authorization information;
Execution module: it for executing the first soft ware authorization information, obtains first and executes License Info;
Memory module: License Info is executed for recording first.
Block chain module further include:
Reading submodule: License Info is executed for reading first in block catenary system.
Block chain module further include:
Judging submodule: for judging whether the first soft ware authorization information is in validity period;
Output sub-module: for exporting the prompt information for whether needing to be authorized again;
Identify submodule: the information of user's input whether authorized again for identification;
Handle submodule: the information whether authorized again for being inputted according to user is handled, if so, mentioning Show that user buys the second soft ware authorization information, if it is not, then terminating software license.
Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that The invention is not limited to the specific embodiments described herein, be able to carry out for a person skilled in the art it is various it is apparent variation, It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being carried out by above embodiments to the present invention It is described in further detail, but the present invention is not limited to the above embodiments only, without departing from the inventive concept, also It may include more other equivalent embodiments, and the scope of the invention is determined by the scope of the appended claims.

Claims (9)

1. a kind of software authorization method based on block chain, which is characterized in that described method includes following steps:
To increase block chain module in licensed software;
It presets the first soft ware authorization information and block catenary system is written, obtain first and execute License Info;
Starting is described when licensed software, and the block chain module starts and accesses the block catenary system;
It carries out first and executes License Info verification, if the first execution License Info is effective, runs software;Otherwise refusal fortune Row;
Wherein, the block catenary system is to management software authorization message.
2. the software authorization method according to claim 1 based on block chain, which is characterized in that described to preset first Simultaneously the block catenary system is written in soft ware authorization information, obtains first and executes License Info, includes the following steps:
The block catenary system receives the first soft ware authorization information;
The block catenary system identifies and executes the first soft ware authorization information, obtains first and executes License Info;
The block catenary system records described first and executes License Info.
3. the software authorization method according to claim 2 based on block chain, which is characterized in that carry out first and execute license Information checking, if the first execution License Info is effective, runs software;Otherwise refusal operation, comprising:
The block chain module reads the first execution License Info in the block catenary system;
Judge whether the first execution License Info is effective, if effectively, runs software, if in vain, refusing runs software.
4. the software authorization method according to any one of claims 1 to 3 based on block chain, which is characterized in that the side Method further include:
Judge whether the first execution License Info is in validity period in software use, if described first executes license letter Failure out of date is ceased, then prompts user to be authorized again;
User independently chooses whether to be authorized again, if so, it is prompted to buy the second soft ware authorization information, is awarded again Power.
5. the software authorization method according to claim 4 based on block chain, which is characterized in that described to authorize again, packet Include following steps:
Second soft ware authorization information is set and the block catenary system is written, obtains second and executes License Info;
Starting is described when licensed software, and the block chain module starts and accesses the block catenary system;
It carries out second and executes License Info verification, if the second execution License Info is effective, runs software;Otherwise refusal fortune Row.
6. a kind of execute the software authorization system based on block chain such as any one of claim 1 to 5 the method, feature exists In the software authorization system includes the block chain module and block catenary system of communication connection, wherein
The block chain module includes:
Input submodule: for inputting the first soft ware authorization information;
Promoter module: for starting the block chain module;
Access submodule: for the block chain module to be accessed the block catenary system;
Verification submodule: for carrying out whether the first execution License Info effectively verifies in soft ware authorization:
Control submodule: for starting software when described first executes License Info and verify effective.
7. the software authorization system according to claim 6 based on block chain, which is characterized in that
The block catenary system includes:
Receiving module: for receiving the first soft ware authorization information;
Execution module: it for executing the first soft ware authorization information, obtains described first and executes License Info;
Memory module: License Info is executed for recording described first.
8. the software authorization system according to claim 7 based on block chain, which is characterized in that
The block chain module further include:
Reading submodule: License Info is executed for reading first in the block catenary system;
9. according to the described in any item software authorization systems based on block chain of claim 6 to 8, which is characterized in that
The block chain module further include:
Judging submodule: whether it is in validity period for the first execution License Info described in judging in software use;
Output sub-module: for when the first execution License Info failure out of date, whether output to need to be awarded again The prompt information of power;
Identify submodule: the information of user's input whether authorized again for identification;
Handle submodule: the information whether authorized again for being inputted according to user is handled, if so, prompt is used The second soft ware authorization information is bought at family, if it is not, then terminating software license.
CN201811405865.0A 2018-11-23 2018-11-23 Software authorization method and system based on block chain Active CN109753769B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811405865.0A CN109753769B (en) 2018-11-23 2018-11-23 Software authorization method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811405865.0A CN109753769B (en) 2018-11-23 2018-11-23 Software authorization method and system based on block chain

Publications (2)

Publication Number Publication Date
CN109753769A true CN109753769A (en) 2019-05-14
CN109753769B CN109753769B (en) 2021-03-02

Family

ID=66402554

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811405865.0A Active CN109753769B (en) 2018-11-23 2018-11-23 Software authorization method and system based on block chain

Country Status (1)

Country Link
CN (1) CN109753769B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112241518A (en) * 2020-10-22 2021-01-19 广州市金其利信息科技有限公司 Software authority management method and system based on block chain
CN113868691A (en) * 2021-12-02 2021-12-31 北京溪塔科技有限公司 Authorized operation method and device of block chain based on cloud-native technology

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103186725A (en) * 2011-12-31 2013-07-03 北大方正集团有限公司 Software authorization method and device
CN103258151B (en) * 2012-10-30 2016-01-20 中国科学院沈阳自动化研究所 A kind of software License control method of real-time authorization
US20170132621A1 (en) * 2015-11-06 2017-05-11 SWFL, Inc., d/b/a "Filament" Systems and methods for autonomous device transacting
CN106875254A (en) * 2017-01-20 2017-06-20 暨南大学 A kind of Android malicious application control methods based on block chain technology
US20170359374A1 (en) * 2016-06-11 2017-12-14 Lntel Corporation Blockchain System with Nucleobase Sequencing as Proof of Work
US20180167198A1 (en) * 2016-12-09 2018-06-14 Cisco Technology, Inc. Trust enabled decentralized asset tracking for supply chain and automated inventory management
US20180183687A1 (en) * 2016-12-28 2018-06-28 Acronis International Gmbh System and Method for Managing Services and Licenses Using a Blockchain Network
CN108243182A (en) * 2017-10-26 2018-07-03 招商银行股份有限公司 Management authorization method, sub- management end, root management end and the storage medium of block chain
US20180211059A1 (en) * 2017-01-23 2018-07-26 Health2047, Inc. Trust based access to records via encrypted protocol communications with authentication system
CN108389059A (en) * 2018-02-26 2018-08-10 成都大学 Digital copyrighted work protection, transaction and distributing method based on ownership and system
CN108566374A (en) * 2018-03-09 2018-09-21 深圳市元征科技股份有限公司 A kind of application method for down loading and its system, block chain node device, terminal
CN108573071A (en) * 2018-05-09 2018-09-25 广东工业大学 A kind of file operation method and relevant apparatus
US20180293363A1 (en) * 2017-04-07 2018-10-11 Cisco Technology, Inc. Blockchain based software licensing enforcement
CN108665946A (en) * 2018-05-08 2018-10-16 阿里巴巴集团控股有限公司 A kind of access method and device of business datum
CN108768618A (en) * 2018-06-07 2018-11-06 广东工业大学 A kind of soft core authorization methods of IP based on block chain, device and medium

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103186725A (en) * 2011-12-31 2013-07-03 北大方正集团有限公司 Software authorization method and device
CN103258151B (en) * 2012-10-30 2016-01-20 中国科学院沈阳自动化研究所 A kind of software License control method of real-time authorization
US20170132621A1 (en) * 2015-11-06 2017-05-11 SWFL, Inc., d/b/a "Filament" Systems and methods for autonomous device transacting
US20170359374A1 (en) * 2016-06-11 2017-12-14 Lntel Corporation Blockchain System with Nucleobase Sequencing as Proof of Work
US20180167198A1 (en) * 2016-12-09 2018-06-14 Cisco Technology, Inc. Trust enabled decentralized asset tracking for supply chain and automated inventory management
US20180183687A1 (en) * 2016-12-28 2018-06-28 Acronis International Gmbh System and Method for Managing Services and Licenses Using a Blockchain Network
CN106875254A (en) * 2017-01-20 2017-06-20 暨南大学 A kind of Android malicious application control methods based on block chain technology
US20180211059A1 (en) * 2017-01-23 2018-07-26 Health2047, Inc. Trust based access to records via encrypted protocol communications with authentication system
US20180293363A1 (en) * 2017-04-07 2018-10-11 Cisco Technology, Inc. Blockchain based software licensing enforcement
CN108243182A (en) * 2017-10-26 2018-07-03 招商银行股份有限公司 Management authorization method, sub- management end, root management end and the storage medium of block chain
CN108389059A (en) * 2018-02-26 2018-08-10 成都大学 Digital copyrighted work protection, transaction and distributing method based on ownership and system
CN108566374A (en) * 2018-03-09 2018-09-21 深圳市元征科技股份有限公司 A kind of application method for down loading and its system, block chain node device, terminal
CN108665946A (en) * 2018-05-08 2018-10-16 阿里巴巴集团控股有限公司 A kind of access method and device of business datum
CN108573071A (en) * 2018-05-09 2018-09-25 广东工业大学 A kind of file operation method and relevant apparatus
CN108768618A (en) * 2018-06-07 2018-11-06 广东工业大学 A kind of soft core authorization methods of IP based on block chain, device and medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
MARK RADCLIFFE等: "区块链软件开发者需要注意的几种软件许可", 《HTTPS://WWW.INFOQ.CN/ARTICLE/THE-BIG-LEGAL-ISSUE-BLOCKCHAIN-DEVELOPERS-RARELY-DISCUSS》 *
邹健: "区块链技术在版权保护中的应用实践", 《HTTPS://WWW.INFOQ.CN/ARTICLE/BLOCKCHAIN-IN-COPYRIGHT-PROTECTION》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112241518A (en) * 2020-10-22 2021-01-19 广州市金其利信息科技有限公司 Software authority management method and system based on block chain
CN113868691A (en) * 2021-12-02 2021-12-31 北京溪塔科技有限公司 Authorized operation method and device of block chain based on cloud-native technology

Also Published As

Publication number Publication date
CN109753769B (en) 2021-03-02

Similar Documents

Publication Publication Date Title
CN110096857B (en) Authority management method, device, equipment and medium for block chain system
CN109190410B (en) Log behavior auditing method based on block chain in cloud storage environment
US10771471B2 (en) Method and system for user authentication
US8800003B2 (en) Trusted device-specific authentication
CN101647219B (en) Mechanism for secure rehosting of licenses
US20130144755A1 (en) Application licensing authentication
US20080295174A1 (en) Method and System for Preventing Unauthorized Access and Distribution of Digital Data
US20090300168A1 (en) Device-specific identity
CN112637214A (en) Resource access method and device and electronic equipment
CN102045367A (en) Registration method and authentication server of real-name authentication
CN103189873A (en) Improvements in watermark extraction efficiency
CN103098068A (en) Method and apparatus for an ephemeral trusted device
CN106341234A (en) Authorization method and device
CN109446259B (en) Data processing method and device, processor and storage medium
JP2009015875A (en) Method and apparatus for tracking status of resource in system for managing use of resources
CN110138767B (en) Transaction request processing method, device, equipment and storage medium
CN108875373A (en) Mobile memory medium file management-control method, device, system and electronic equipment
CN110069909A (en) It is a kind of to exempt from the close method and device for logging in third party system
KR101263423B1 (en) Log in confirmation service implementation method for mobile terminal
CN109753769A (en) A kind of software authorization method and system based on block chain
WO2023072817A1 (en) Control of access to computing resources implemented in isolated environments
CN108462671A (en) A kind of authentication protection method and system based on reverse proxy
CN101167296A (en) Renewable and individualizable elements of a protected computing environment
US20130254534A1 (en) Method of and system for authenticating online read digital content
CN113472545B (en) Equipment network access method, device, equipment, storage medium and communication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240306

Address after: Room 1179, W Zone, 11th Floor, Building 1, No. 158 Shuanglian Road, Qingpu District, Shanghai, 201702

Patentee after: Shanghai Zhongan Information Technology Service Co.,Ltd.

Country or region after: China

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Patentee before: ZHONGAN INFORMATION TECHNOLOGY SERVICE Co.,Ltd.

Country or region before: China

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240415

Address after: Room 1179, W Zone, 11th Floor, Building 1, No. 158 Shuanglian Road, Qingpu District, Shanghai, 201702

Patentee after: Shanghai Zhongan Information Technology Service Co.,Ltd.

Country or region after: China

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Patentee before: ZHONGAN INFORMATION TECHNOLOGY SERVICE Co.,Ltd.

Country or region before: China