CN110096852A - A kind of offline industrial control software authentication method close based on state - Google Patents
A kind of offline industrial control software authentication method close based on state Download PDFInfo
- Publication number
- CN110096852A CN110096852A CN201910396746.1A CN201910396746A CN110096852A CN 110096852 A CN110096852 A CN 110096852A CN 201910396746 A CN201910396746 A CN 201910396746A CN 110096852 A CN110096852 A CN 110096852A
- Authority
- CN
- China
- Prior art keywords
- registration
- code
- software
- sequence
- sequence code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 17
- 238000009434 installation Methods 0.000 claims abstract description 7
- 238000001629 sign test Methods 0.000 claims abstract description 4
- 230000006872 improvement Effects 0.000 description 7
- 230000004913 activation Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000012360 testing method Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000008092 positive effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of offline industrial control software authentication method close based on state, steps are as follows: the hardware information of S1, software collection installation equipment generate unique registration sequence code;Then the close SM4 symmetric cryptography of state is done, encrypting registration sequence code is generated, encrypting registration sequence code is then supplied to software vendor;S2, SM4 decryption is done to the encrypting registration sequence code received, and checks and accepts the legitimacy of registration sequence code after decryption;Version configuration information is added in the registration sequence code after decryption, registration code information is reconfigured;S3, the HASH operation that SM3 is to the registration code information reconfigured do SM2 signature using private key to the result after HASH, submit to user for signature result as registration code;S4, client receive registration code, and the registration code of generation is recombinated registration sequence by stipulated form, then does SM3 operation by system;Public key sign test is finally used, is verified, starts the software version of corresponding configuration.
Description
Technical field
The present invention relates to technical field of network security more particularly to a kind of offline industrial control software authenticating parties close based on state
Method.
Background technique
Currently, the active mode of business software generally uses on-line authentication, and software after installation is complete, is sent out by internet
Relevant authentication information is sent to carry out software activation.Authentication techniques based on online mode are needed through internet, by software installation
Host on hardware information, such as CPU, hardware guidance disk information or MAC Address of Network Card information be transferred to software vendor
Authentication center carries out business confirming.After software vendor's business confirming is completed, software installation license information is passed by network
The host for passing installation software, completes the certification registration process of software.But in industry control network, general host is all offline
Or operation in local area network, software can not be caused to be unable to complete certification activation, be also just unable to run with internet connection.
Traditional offline software activation technology identifies the sequence of fixed format by checking routine cured built in software
Number, to complete to authenticate, or certain algorithm is applied, the registration code provided user does simple calculations.These technologies are easy
By hacker by reverse, the technological means such as deception, which crack, activates checking routine, so as to cause the use of software pirate version.
Summary of the invention
Object of the present invention is to prevent in view of the above-mentioned problems, provide a kind of offline industrial control software authentication method close based on state
Software pirate version uses.
To achieve the goals above, the technical scheme is that
A kind of offline industrial control software authentication method close based on state, includes the following steps:
S1, registration sequence code is generated
System receives user and applies for the registration of, and when software registration, the hardware information of software collection installation equipment to be registered is pressed
The unique registration sequence code of sequence combination producing as agreed;Then it is directed to the close SM4 symmetric cryptography of registration sequence Ma Zuo state, generates and adds
Close registration sequence code, is then supplied to software vendor for encrypting registration sequence code;
S2, registration code is generated
After software vendor receives encrypting registration sequence code, SM4 decryption is done to the encrypting registration sequence code received, and test
Receive the legitimacy of registration sequence code after decrypting;If registration sequence code is legal, after version configuration information is added to decryption
In registration sequence code, registration code information is reconfigured;
S3, the HASH operation that SM3 is to the registration code information reconfigured are SM2 using private key to the result after HASH
Signature, submits to user for signature result as registration code;
S4, client receive registration code, and after then importing registration code, the registration code of generation is pressed stipulated form weight by system
Group, reconfigures registration sequence, then does SM3 operation;Public key sign test is finally used, is verified, starts the soft of corresponding configuration
Part version.
As further improvement to above-mentioned technical proposal, the hardware information is MAC Address of Network Card, CPU sequence number, hard
Disk sequence number but not only limit MAC Address of Network Card, CPU sequence number, hard disk serial number.
As further improvement to above-mentioned technical proposal, the software version type include height match, it is low match, in version
Originally, the validity period of software.
As further improvement to above-mentioned technical proposal, the limited period of version, the functional module of feature be all can serve as
One factor is added in registration sequence.
Compared with prior art, the advantages and positive effects of the present invention are:
Software authentication is done the present invention is based on national secret algorithm, when generating registration sequence code, based on the hardware information of installation equipment,
It ensure that the uniqueness of sequence;When software supplier is that user generates registration code, it can be generated according to the software version that user buys
Different registration codes, such software supplier only need a version that can meet all requirements, reduce multiple versions
Expense.The above feature has agreed with the requirement of industry spot well.The present invention has following features: 1, having unique registration sequence
Code;2, when generating registration, it can be reversed the legitimacy of verification registration sequence code;3, registration code process is being generated, it can be according to reality
Demand generates different registration codes.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention without any creative labor, may be used also for those of ordinary skill in the art
To obtain other drawings based on these drawings.
Fig. 1 is the flow diagram that the present invention generates registration sequence code;
Fig. 2 is the flow diagram that the present invention generates registration code;
Fig. 3 is invention software checking procedure schematic diagram.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment, any modification, equivalent replacement, improvement and so on should all be included in the protection scope of the present invention.
As shown in Figure 1 to Figure 3, a kind of offline industrial control software authentication method close based on state, includes the following steps:
S1, registration sequence code is generated
System receives user and applies for the registration of, and when software registration, the hardware information of software collection installation equipment to be registered is pressed
The unique registration sequence code of sequence combination producing as agreed;Then it is directed to the close SM4 symmetric cryptography of registration sequence Ma Zuo state, generates and adds
Close registration sequence code, is then supplied to software vendor for encrypting registration sequence code;
S2, registration code is generated
After software vendor receives encrypting registration sequence code, SM4 decryption is done to the encrypting registration sequence code received, and test
Receive the legitimacy of registration sequence code after decrypting;If registration sequence code is legal, after version configuration information is added to decryption
In registration sequence code, registration code information is reconfigured;
S3, the HASH operation that SM3 is to the registration code information reconfigured are SM2 using private key to the result after HASH
Signature, submits to user for signature result as registration code;
S4, client receive registration code, and after then importing registration code, the registration code of generation is pressed stipulated form weight by system
Group, reconfigures registration sequence, then does SM3 operation;Public key sign test is finally used, is verified, starts the soft of corresponding configuration
Part version.
As further improvement to above-mentioned technical proposal, the hardware information is MAC Address of Network Card, CPU sequence number, hard
Disk sequence number but not only limit MAC Address of Network Card, CPU sequence number, hard disk serial number.
As further improvement to above-mentioned technical proposal, the software version type include height match, it is low match, in version
Originally, the validity period of software.
As further improvement to above-mentioned technical proposal, the limited period of version, the functional module of feature be all can serve as
One factor is added in registration sequence.
Software authentication is done the present invention is based on national secret algorithm, when generating registration sequence code, based on the hardware information of installation equipment,
It ensure that the uniqueness of sequence;When software supplier is that user generates registration code, it can be generated according to the software version that user buys
Different registration codes, such software supplier only need a version that can meet all requirements, reduce multiple versions
Expense.The above feature has agreed with the requirement of industry spot well.The present invention has following features: 1, having unique registration sequence
Code;2, when generating registration, it can be reversed the legitimacy of verification registration sequence code;3, registration code process is being generated, it can be according to reality
Demand generates different registration codes.
Claims (4)
1. a kind of offline industrial control software authentication method close based on state, characterized by the following steps:
S1, registration sequence code is generated
System receives user and applies for the registration of, when software registration, the hardware information of software collection installation equipment to be registered, according to about
Determine the unique registration sequence code of sequence combination producing;Then it is directed to the close SM4 symmetric cryptography of registration sequence Ma Zuo state, generates encryption note
Volume sequence code, is then supplied to software vendor for encrypting registration sequence code;
S2, registration code is generated
After software vendor receives encrypting registration sequence code, SM4 decryption is done to the encrypting registration sequence code received, and check and accept solution
The legitimacy of registration sequence code after close;If registration sequence code is legal, version configuration information is added to the registration after decryption
In sequence code, registration code information is reconfigured;
S3, the HASH operation that SM3 is to the registration code information reconfigured do SM2 signature using private key to the result after HASH,
User is submitted to using signature result as registration code;
S4, client receive registration code, and after then importing registration code, system is recombinated the registration code of generation by stipulated form, weight
Then Combination nova registration sequence does SM3 operation;Public key sign test is finally used, is verified, starts the software version of corresponding configuration
This.
2. the offline industrial control software authentication method close based on state as described in claim 1, it is characterised in that: stating hardware information is
MAC Address of Network Card, CPU sequence number, hard disk serial number but not only limit MAC Address of Network Card, CPU sequence number, hard disk serial number.
3. the offline industrial control software authentication method close based on state as described in claim 1, it is characterised in that: the software version
Type include it is high match, it is low match, in the validity period with version, software.
4. the offline industrial control software authentication method close based on state as described in claim 1, it is characterised in that: version it is limited
Phase, feature functional module all can serve as a factor and be added in registration sequence.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910396746.1A CN110096852A (en) | 2019-05-14 | 2019-05-14 | A kind of offline industrial control software authentication method close based on state |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910396746.1A CN110096852A (en) | 2019-05-14 | 2019-05-14 | A kind of offline industrial control software authentication method close based on state |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110096852A true CN110096852A (en) | 2019-08-06 |
Family
ID=67447864
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910396746.1A Pending CN110096852A (en) | 2019-05-14 | 2019-05-14 | A kind of offline industrial control software authentication method close based on state |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110096852A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111125781A (en) * | 2019-12-24 | 2020-05-08 | 腾讯科技(深圳)有限公司 | File signature method and device and file signature verification method and device |
CN112685699A (en) * | 2020-12-31 | 2021-04-20 | 南方电网科学研究院有限责任公司 | Software registration method and device and software registration code generation method and device |
CN114912080A (en) * | 2022-04-21 | 2022-08-16 | 健帆生物科技集团股份有限公司 | Method for generating registration code, control method, terminal device and storage medium |
-
2019
- 2019-05-14 CN CN201910396746.1A patent/CN110096852A/en active Pending
Non-Patent Citations (1)
Title |
---|
施峰等: "《信息安全保密基础教程》", 31 May 2008, 北京理工大学出版社 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111125781A (en) * | 2019-12-24 | 2020-05-08 | 腾讯科技(深圳)有限公司 | File signature method and device and file signature verification method and device |
CN111125781B (en) * | 2019-12-24 | 2020-12-01 | 腾讯科技(深圳)有限公司 | File signature method and device and file signature verification method and device |
CN112685699A (en) * | 2020-12-31 | 2021-04-20 | 南方电网科学研究院有限责任公司 | Software registration method and device and software registration code generation method and device |
CN114912080A (en) * | 2022-04-21 | 2022-08-16 | 健帆生物科技集团股份有限公司 | Method for generating registration code, control method, terminal device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109040067B (en) | Physical unclonable technology PUF-based user authentication device and authentication method | |
CN101521569B (en) | Method, equipment and system for realizing service access | |
US7793340B2 (en) | Cryptographic binding of authentication schemes | |
US7069440B2 (en) | Technique for obtaining a single sign-on certificate from a foreign PKI system using an existing strong authentication PKI system | |
CN110677376B (en) | Authentication method, related device and system and computer readable storage medium | |
WO2009079916A1 (en) | A method for generating a key pair and transmitting a public key or a certificate application document securely | |
WO2018103166A1 (en) | Method and device for downloading key of pos terminal | |
CN102932149A (en) | Integrated identity based encryption (IBE) data encryption system | |
CN110096852A (en) | A kind of offline industrial control software authentication method close based on state | |
CN105049434B (en) | Identity identifying method and encryption communication method under a kind of peer to peer environment | |
CN103532966A (en) | Device and method supporting USB-KEY-based SSO (single sign on) of virtual desktop | |
JP2001249899A (en) | Service providing system via communication means, its method, service mediating device and program providing medium | |
CN112989309B (en) | Login method, authentication method and system based on multi-party authorization and computing equipment | |
CN108494559B (en) | Electronic contract signing method based on semi-trusted third party | |
CN109241701A (en) | A kind of application program Activiation method, correlation technique and relevant apparatus | |
US20200169410A1 (en) | Method for digital signing with multiple devices operating multiparty computation with a split key | |
CN111651745B (en) | Application authorization signature method based on password equipment | |
WO2019178762A1 (en) | Method, server, and system for verifying validity of terminal | |
CN110321682A (en) | A kind of unified identity authentication method and device based on UAF and IBC | |
US9038143B2 (en) | Method and system for network access control | |
CN106533681A (en) | Attribute attestation method and system supporting partial presentation | |
WO2014187208A1 (en) | Method and system for backing up private key in electronic signature token | |
CN102769606B (en) | A kind of network digital identity identifying method based on gene certificate | |
CN105187213B (en) | A kind of method of computer information safe | |
TWI482480B (en) | System and method for updating digital certificates automatically |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190806 |
|
RJ01 | Rejection of invention patent application after publication |