CN110096852A - A kind of offline industrial control software authentication method close based on state - Google Patents

A kind of offline industrial control software authentication method close based on state Download PDF

Info

Publication number
CN110096852A
CN110096852A CN201910396746.1A CN201910396746A CN110096852A CN 110096852 A CN110096852 A CN 110096852A CN 201910396746 A CN201910396746 A CN 201910396746A CN 110096852 A CN110096852 A CN 110096852A
Authority
CN
China
Prior art keywords
registration
code
software
sequence
sequence code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910396746.1A
Other languages
Chinese (zh)
Inventor
王小东
王玉涛
杨小帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Tiandihexing Technology Co Ltd
Original Assignee
Beijing Tiandihexing Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Tiandihexing Technology Co Ltd filed Critical Beijing Tiandihexing Technology Co Ltd
Priority to CN201910396746.1A priority Critical patent/CN110096852A/en
Publication of CN110096852A publication Critical patent/CN110096852A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of offline industrial control software authentication method close based on state, steps are as follows: the hardware information of S1, software collection installation equipment generate unique registration sequence code;Then the close SM4 symmetric cryptography of state is done, encrypting registration sequence code is generated, encrypting registration sequence code is then supplied to software vendor;S2, SM4 decryption is done to the encrypting registration sequence code received, and checks and accepts the legitimacy of registration sequence code after decryption;Version configuration information is added in the registration sequence code after decryption, registration code information is reconfigured;S3, the HASH operation that SM3 is to the registration code information reconfigured do SM2 signature using private key to the result after HASH, submit to user for signature result as registration code;S4, client receive registration code, and the registration code of generation is recombinated registration sequence by stipulated form, then does SM3 operation by system;Public key sign test is finally used, is verified, starts the software version of corresponding configuration.

Description

A kind of offline industrial control software authentication method close based on state
Technical field
The present invention relates to technical field of network security more particularly to a kind of offline industrial control software authenticating parties close based on state Method.
Background technique
Currently, the active mode of business software generally uses on-line authentication, and software after installation is complete, is sent out by internet Relevant authentication information is sent to carry out software activation.Authentication techniques based on online mode are needed through internet, by software installation Host on hardware information, such as CPU, hardware guidance disk information or MAC Address of Network Card information be transferred to software vendor Authentication center carries out business confirming.After software vendor's business confirming is completed, software installation license information is passed by network The host for passing installation software, completes the certification registration process of software.But in industry control network, general host is all offline Or operation in local area network, software can not be caused to be unable to complete certification activation, be also just unable to run with internet connection.
Traditional offline software activation technology identifies the sequence of fixed format by checking routine cured built in software Number, to complete to authenticate, or certain algorithm is applied, the registration code provided user does simple calculations.These technologies are easy By hacker by reverse, the technological means such as deception, which crack, activates checking routine, so as to cause the use of software pirate version.
Summary of the invention
Object of the present invention is to prevent in view of the above-mentioned problems, provide a kind of offline industrial control software authentication method close based on state Software pirate version uses.
To achieve the goals above, the technical scheme is that
A kind of offline industrial control software authentication method close based on state, includes the following steps:
S1, registration sequence code is generated
System receives user and applies for the registration of, and when software registration, the hardware information of software collection installation equipment to be registered is pressed The unique registration sequence code of sequence combination producing as agreed;Then it is directed to the close SM4 symmetric cryptography of registration sequence Ma Zuo state, generates and adds Close registration sequence code, is then supplied to software vendor for encrypting registration sequence code;
S2, registration code is generated
After software vendor receives encrypting registration sequence code, SM4 decryption is done to the encrypting registration sequence code received, and test Receive the legitimacy of registration sequence code after decrypting;If registration sequence code is legal, after version configuration information is added to decryption In registration sequence code, registration code information is reconfigured;
S3, the HASH operation that SM3 is to the registration code information reconfigured are SM2 using private key to the result after HASH Signature, submits to user for signature result as registration code;
S4, client receive registration code, and after then importing registration code, the registration code of generation is pressed stipulated form weight by system Group, reconfigures registration sequence, then does SM3 operation;Public key sign test is finally used, is verified, starts the soft of corresponding configuration Part version.
As further improvement to above-mentioned technical proposal, the hardware information is MAC Address of Network Card, CPU sequence number, hard Disk sequence number but not only limit MAC Address of Network Card, CPU sequence number, hard disk serial number.
As further improvement to above-mentioned technical proposal, the software version type include height match, it is low match, in version Originally, the validity period of software.
As further improvement to above-mentioned technical proposal, the limited period of version, the functional module of feature be all can serve as One factor is added in registration sequence.
Compared with prior art, the advantages and positive effects of the present invention are:
Software authentication is done the present invention is based on national secret algorithm, when generating registration sequence code, based on the hardware information of installation equipment, It ensure that the uniqueness of sequence;When software supplier is that user generates registration code, it can be generated according to the software version that user buys Different registration codes, such software supplier only need a version that can meet all requirements, reduce multiple versions Expense.The above feature has agreed with the requirement of industry spot well.The present invention has following features: 1, having unique registration sequence Code;2, when generating registration, it can be reversed the legitimacy of verification registration sequence code;3, registration code process is being generated, it can be according to reality Demand generates different registration codes.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention without any creative labor, may be used also for those of ordinary skill in the art To obtain other drawings based on these drawings.
Fig. 1 is the flow diagram that the present invention generates registration sequence code;
Fig. 2 is the flow diagram that the present invention generates registration code;
Fig. 3 is invention software checking procedure schematic diagram.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment, any modification, equivalent replacement, improvement and so on should all be included in the protection scope of the present invention.
As shown in Figure 1 to Figure 3, a kind of offline industrial control software authentication method close based on state, includes the following steps:
S1, registration sequence code is generated
System receives user and applies for the registration of, and when software registration, the hardware information of software collection installation equipment to be registered is pressed The unique registration sequence code of sequence combination producing as agreed;Then it is directed to the close SM4 symmetric cryptography of registration sequence Ma Zuo state, generates and adds Close registration sequence code, is then supplied to software vendor for encrypting registration sequence code;
S2, registration code is generated
After software vendor receives encrypting registration sequence code, SM4 decryption is done to the encrypting registration sequence code received, and test Receive the legitimacy of registration sequence code after decrypting;If registration sequence code is legal, after version configuration information is added to decryption In registration sequence code, registration code information is reconfigured;
S3, the HASH operation that SM3 is to the registration code information reconfigured are SM2 using private key to the result after HASH Signature, submits to user for signature result as registration code;
S4, client receive registration code, and after then importing registration code, the registration code of generation is pressed stipulated form weight by system Group, reconfigures registration sequence, then does SM3 operation;Public key sign test is finally used, is verified, starts the soft of corresponding configuration Part version.
As further improvement to above-mentioned technical proposal, the hardware information is MAC Address of Network Card, CPU sequence number, hard Disk sequence number but not only limit MAC Address of Network Card, CPU sequence number, hard disk serial number.
As further improvement to above-mentioned technical proposal, the software version type include height match, it is low match, in version Originally, the validity period of software.
As further improvement to above-mentioned technical proposal, the limited period of version, the functional module of feature be all can serve as One factor is added in registration sequence.
Software authentication is done the present invention is based on national secret algorithm, when generating registration sequence code, based on the hardware information of installation equipment, It ensure that the uniqueness of sequence;When software supplier is that user generates registration code, it can be generated according to the software version that user buys Different registration codes, such software supplier only need a version that can meet all requirements, reduce multiple versions Expense.The above feature has agreed with the requirement of industry spot well.The present invention has following features: 1, having unique registration sequence Code;2, when generating registration, it can be reversed the legitimacy of verification registration sequence code;3, registration code process is being generated, it can be according to reality Demand generates different registration codes.

Claims (4)

1. a kind of offline industrial control software authentication method close based on state, characterized by the following steps:
S1, registration sequence code is generated
System receives user and applies for the registration of, when software registration, the hardware information of software collection installation equipment to be registered, according to about Determine the unique registration sequence code of sequence combination producing;Then it is directed to the close SM4 symmetric cryptography of registration sequence Ma Zuo state, generates encryption note Volume sequence code, is then supplied to software vendor for encrypting registration sequence code;
S2, registration code is generated
After software vendor receives encrypting registration sequence code, SM4 decryption is done to the encrypting registration sequence code received, and check and accept solution The legitimacy of registration sequence code after close;If registration sequence code is legal, version configuration information is added to the registration after decryption In sequence code, registration code information is reconfigured;
S3, the HASH operation that SM3 is to the registration code information reconfigured do SM2 signature using private key to the result after HASH, User is submitted to using signature result as registration code;
S4, client receive registration code, and after then importing registration code, system is recombinated the registration code of generation by stipulated form, weight Then Combination nova registration sequence does SM3 operation;Public key sign test is finally used, is verified, starts the software version of corresponding configuration This.
2. the offline industrial control software authentication method close based on state as described in claim 1, it is characterised in that: stating hardware information is MAC Address of Network Card, CPU sequence number, hard disk serial number but not only limit MAC Address of Network Card, CPU sequence number, hard disk serial number.
3. the offline industrial control software authentication method close based on state as described in claim 1, it is characterised in that: the software version Type include it is high match, it is low match, in the validity period with version, software.
4. the offline industrial control software authentication method close based on state as described in claim 1, it is characterised in that: version it is limited Phase, feature functional module all can serve as a factor and be added in registration sequence.
CN201910396746.1A 2019-05-14 2019-05-14 A kind of offline industrial control software authentication method close based on state Pending CN110096852A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910396746.1A CN110096852A (en) 2019-05-14 2019-05-14 A kind of offline industrial control software authentication method close based on state

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910396746.1A CN110096852A (en) 2019-05-14 2019-05-14 A kind of offline industrial control software authentication method close based on state

Publications (1)

Publication Number Publication Date
CN110096852A true CN110096852A (en) 2019-08-06

Family

ID=67447864

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910396746.1A Pending CN110096852A (en) 2019-05-14 2019-05-14 A kind of offline industrial control software authentication method close based on state

Country Status (1)

Country Link
CN (1) CN110096852A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111125781A (en) * 2019-12-24 2020-05-08 腾讯科技(深圳)有限公司 File signature method and device and file signature verification method and device
CN112685699A (en) * 2020-12-31 2021-04-20 南方电网科学研究院有限责任公司 Software registration method and device and software registration code generation method and device
CN114912080A (en) * 2022-04-21 2022-08-16 健帆生物科技集团股份有限公司 Method for generating registration code, control method, terminal device and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
施峰等: "《信息安全保密基础教程》", 31 May 2008, 北京理工大学出版社 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111125781A (en) * 2019-12-24 2020-05-08 腾讯科技(深圳)有限公司 File signature method and device and file signature verification method and device
CN111125781B (en) * 2019-12-24 2020-12-01 腾讯科技(深圳)有限公司 File signature method and device and file signature verification method and device
CN112685699A (en) * 2020-12-31 2021-04-20 南方电网科学研究院有限责任公司 Software registration method and device and software registration code generation method and device
CN114912080A (en) * 2022-04-21 2022-08-16 健帆生物科技集团股份有限公司 Method for generating registration code, control method, terminal device and storage medium

Similar Documents

Publication Publication Date Title
CN109040067B (en) Physical unclonable technology PUF-based user authentication device and authentication method
CN101521569B (en) Method, equipment and system for realizing service access
US7793340B2 (en) Cryptographic binding of authentication schemes
US7069440B2 (en) Technique for obtaining a single sign-on certificate from a foreign PKI system using an existing strong authentication PKI system
CN110677376B (en) Authentication method, related device and system and computer readable storage medium
WO2009079916A1 (en) A method for generating a key pair and transmitting a public key or a certificate application document securely
WO2018103166A1 (en) Method and device for downloading key of pos terminal
CN102932149A (en) Integrated identity based encryption (IBE) data encryption system
CN110096852A (en) A kind of offline industrial control software authentication method close based on state
CN105049434B (en) Identity identifying method and encryption communication method under a kind of peer to peer environment
CN103532966A (en) Device and method supporting USB-KEY-based SSO (single sign on) of virtual desktop
JP2001249899A (en) Service providing system via communication means, its method, service mediating device and program providing medium
CN112989309B (en) Login method, authentication method and system based on multi-party authorization and computing equipment
CN108494559B (en) Electronic contract signing method based on semi-trusted third party
CN109241701A (en) A kind of application program Activiation method, correlation technique and relevant apparatus
US20200169410A1 (en) Method for digital signing with multiple devices operating multiparty computation with a split key
CN111651745B (en) Application authorization signature method based on password equipment
WO2019178762A1 (en) Method, server, and system for verifying validity of terminal
CN110321682A (en) A kind of unified identity authentication method and device based on UAF and IBC
US9038143B2 (en) Method and system for network access control
CN106533681A (en) Attribute attestation method and system supporting partial presentation
WO2014187208A1 (en) Method and system for backing up private key in electronic signature token
CN102769606B (en) A kind of network digital identity identifying method based on gene certificate
CN105187213B (en) A kind of method of computer information safe
TWI482480B (en) System and method for updating digital certificates automatically

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190806

RJ01 Rejection of invention patent application after publication