CN111581607A - Method for activating license - Google Patents

Method for activating license Download PDF

Info

Publication number
CN111581607A
CN111581607A CN202010382182.9A CN202010382182A CN111581607A CN 111581607 A CN111581607 A CN 111581607A CN 202010382182 A CN202010382182 A CN 202010382182A CN 111581607 A CN111581607 A CN 111581607A
Authority
CN
China
Prior art keywords
activation
license
time
code
certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010382182.9A
Other languages
Chinese (zh)
Other versions
CN111581607B (en
Inventor
朱梦灵
甘霖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Cama Biometrics Co ltd
Original Assignee
Shenzhen Cama Biometrics Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Cama Biometrics Co ltd filed Critical Shenzhen Cama Biometrics Co ltd
Priority to CN202010382182.9A priority Critical patent/CN111581607B/en
Publication of CN111581607A publication Critical patent/CN111581607A/en
Application granted granted Critical
Publication of CN111581607B publication Critical patent/CN111581607B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1014Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to tokens
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method for activating license files, which comprises the following specific steps: when the license file is not activated, judging whether the time slot type certificate and the quantity type certificate of the license file are valid or not; if all the active components are effectively used, the active components are failed; wherein, judge whether quantity type certificate is valid, it is specific: judging whether the code is a valid activation request code, if the code is invalid, prohibiting use, and failing to activate; if the number is valid, the number is continuously verified; generating an activation code after the quantity is verified, and obtaining a quantity type certificate and the current time from the license file by the activation code; and judging whether the quantity type certificate and the current time accord with the activation condition, if so, giving activation use, and otherwise, failing to activate. The invention is realized by applying an RSA-based encryption and decryption algorithm, and can solve the problem that the encryption and decryption algorithm is not universal.

Description

Method for activating license
Technical Field
The invention relates to the technical field of license file activation, in particular to a license activation method.
Background
A software license generally refers to a legal instrument that manages the use and distribution of computer software products or programs. Typically, a software license grants a user the right to use a copy of a copyrighted software product. The software license may also interpret terms of use and may set forth restrictions on the rights granted to use the software.
The management of the license can be encrypted and decrypted by the RSA encryption algorithm, which is an asymmetric encryption algorithm. RSA is widely used in public key cryptography and electronic commerce. The RSA algorithm is based on the very simple number theory fact that it is easy to multiply two large prime numbers, but it is extremely difficult to factorize its product, so the product can be disclosed as a cryptographic key. The RSA public key cryptosystem uses different encryption and decryption keys, and is a cryptosystem in which it is computationally infeasible to derive a decryption key from a known encryption key.
The difficulty of factoring very large integers determines the reliability of the RSA algorithm. In other words, the more difficult factoring a very large integer, the more reliable the RSA algorithm is. If one finds a fast factorization algorithm, the reliability of the information encrypted with RSA is certainly extremely degraded.
However, the traditional industrial-level RSA algorithm is not common in different platforms and heterogeneous systems, and especially the encryption and decryption methods are not uniform between the PC system and the embedded device with low computing power.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a technical tree establishment license activation method. The method is realized by applying an RSA-based encryption and decryption algorithm.
In order to achieve the purpose of the invention, the technical scheme is as follows:
a method for activating license files comprises the following specific steps:
when the license file is not activated, judging whether the time slot type certificate and the quantity type certificate of the license file are valid or not;
if all the active components are effectively used, the active components are failed;
wherein, judge whether quantity type certificate is valid, it is specific:
judging whether the code is a valid activation request code, if the code is invalid, prohibiting use, and failing to activate;
if the number is valid, the number is continuously verified;
generating an activation code after the quantity is verified, and obtaining a quantity type certificate and the current time from the license file by the activation code;
and judging whether the quantity type certificate and the current time accord with the activation condition, if so, giving activation use, and otherwise, failing to activate.
Further, the specific step of judging whether the time period type certificate is valid:
inputting the time slot type certificate into a decryption algorithm of the SDK for operation, judging whether the time in the time slot type certificate is between the starting time and the ending time of the license file by the decryption algorithm, if so, judging that the time is valid, and activating; otherwise, the activation is not given;
the decryption algorithm of the SDK is as follows: fx (licsn) → (start time, end time);
LicSn ═ Fx (order number + start time + end time + SALT);
and LicSn is a time period type certificate, Fx is an encryption algorithm, and Fx is a decryption algorithm.
Further, the judgment method of the quantity type license judges whether the activation application code is valid or not through a reverse decryption algorithm;
if the operation of the activation application code fails through the reverse decryption algorithm, the activation application code is considered as an invalid activation application code;
if the operation of the reverse decryption algorithm is successful, the activation application code is considered as an effective activation application code, and then the activation code is generated;
the activation code generation formula is as follows: SN ═ Fx2(LicSn + current time);
SN is the activate code, Fx2 is the encryption algorithm, and LicSn is the numeric license.
Furthermore, after the operation of the reverse decryption algorithm is successful, whether the quantitative license is valid in the system and has available residual quantity needs to be checked, and if the quantitative license is zero, the quantitative license is judged to be invalid;
if so, it is valid, e.g., greater than zero, and there is a remaining amount available in the system minus an available amount, resulting in an available remaining amount and written to the activate code.
Further, whether the quantity type certificate and the current time meet the activation condition is judged, the activation code is decrypted through a decryption algorithm to obtain the quantity type license and the time of the activation code, whether the obtained quantity type license and the time in the activation code are equal to the data when the obtained quantity type license and the time are sent is judged, if the obtained quantity type license and the time are equal to the data when the obtained quantity type license and the time are sent, activation is given, and if the obtained quantity type license and the time are not equal to the;
wherein, the decryption algorithm formula is as follows: fx2(SN) → (LicSn, client time);
SN is the activate code, fx2 is the decryption algorithm, and LicSn is the numeric license.
Further, before determining whether the time period type certificate and the number type certificate of the license file are valid, the type of the license file is determined, and the specific steps are as follows:
judging whether the certificate is a trial certificate:
if the certificate is not a trial certificate, judging the activation condition;
if the certificate is a trial certificate, reading the valid start time and the valid end time in the license certificate, and judging whether the time is valid;
if yes, the user is allowed to continue using; otherwise, the use is finished.
Further, judging the activation condition, specifically comprising the following steps:
if the license file is of the activated type, the license file is allowed to be continuously used;
otherwise, activating according to the inactive type.
Furthermore, the method for acquiring the activation application code is that the activation application code is acquired by calculating the number type license of the license file through an encryption algorithm;
wherein, the activation application code calculation formula is as follows: SCODE ═ Fx (LicSn + current time);
the number type license: LicSn ═ MD5 (order number + SALT);
SCODE is an activation application code, Fx is an encryption algorithm, LicSn is a number type license, and SALT is a confusion factor.
Further, the judgment formula of the activation application code is as follows:
fx (scode) → (LicSn, client time);
fx is the reverse decryption algorithm and LicSn is a quantitative license.
Compared with the prior art, the invention has prominent substantive features and remarkable progress: the invention has the advantages of centralization, safety, sharing and convenient license management; the management of the key core technology SDK of most intelligent and semi-intelligent equipment in the market is compatible; and protecting different resources by using a universal RSA public key and private key unified algorithm.
Drawings
In order to more clearly illustrate the detailed description of the invention or the technical solutions in the prior art, the drawings that are needed in the detailed description of the invention or the prior art will be briefly described below. Throughout the drawings, like elements or portions are generally identified by like reference numerals. In the drawings, elements or portions are not necessarily drawn to scale.
FIG. 1 is a flow chart of the overall architecture of the present invention;
FIG. 2 is a flow chart of key activation of the present invention;
Detailed Description
In order to make the technical solutions in the present application better understood, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings and embodiments, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and all other embodiments obtained by a person of ordinary skill in the art without making creative efforts based on the embodiments in the present application shall fall within the protection scope of the present application.
As shown in fig. 1 to 2, a method for activating a license file includes the following specific steps:
when the license file is not activated, judging whether the time slot type certificate and the quantity type certificate of the license file are valid or not;
if all the active components are effectively used, the active components are failed;
wherein, judge whether quantity type certificate is valid, it is specific:
judging whether the code is a valid activation request code, if the code is invalid, prohibiting use, and failing to activate;
if the number is valid, the number is continuously verified;
generating an activation code after the quantity is verified, and obtaining a quantity type certificate and the current time from the license file by the activation code;
and judging whether the quantity type certificate and the current time accord with the activation condition, if so, giving activation use, and otherwise, failing to activate.
The specific step of judging whether the time period type certificate is valid is as follows:
inputting the time slot type certificate into a decryption algorithm of the SDK for operation, judging whether the time in the time slot type certificate is between the starting time and the ending time of the license file by the decryption algorithm, if so, judging that the time is valid, and activating; otherwise, the activation is not given;
the decryption algorithm of the SDK is as follows: fx (licsn) → (start time, end time);
LicSn ═ Fx (order number + start time + end time + SALT);
and LicSn is a time period type certificate, Fx is an encryption algorithm, and Fx is a decryption algorithm.
The judgment method of the quantity type license judges whether the activation application code is valid or not through a reverse decryption algorithm;
if the operation of the activation application code fails through the reverse decryption algorithm, the activation application code is considered as an invalid activation application code;
if the operation of the reverse decryption algorithm is successful, the activation application code is considered as an effective activation application code, and then the activation code is generated;
the activation code generation formula is as follows: SN ═ Fx2(LicSn + current time);
SN is the activate code, Fx2 is the encryption algorithm, and LicSn is the numeric license.
After the operation of the reverse decryption algorithm is successful, whether the quantitative license is valid in the system and available residual quantity is checked, and if the quantitative license is zero, the quantitative license is judged to be invalid;
if so, it is valid, e.g., greater than zero, and there is a remaining amount available in the system minus an available amount, resulting in an available remaining amount and written to the activate code.
Judging whether the quantity type certificate and the current time meet the activation condition, decrypting the activation code through a decryption algorithm to obtain the quantity type license and the time of the activation code, judging whether the obtained quantity type license and the time in the activation code are equal to the data sent out, if so, giving activation, and if not, failing the activation;
wherein, the decryption algorithm formula is as follows: fx2(SN) → (LicSn, client time);
SN is the activate code, fx2 is the decryption algorithm, and LicSn is the numeric license.
Before judging whether the time section type certificate and the quantity type certificate of the license file are valid, judging the type of the license file, and specifically comprising the following steps of:
judging whether the certificate is a trial certificate:
if the certificate is not a trial certificate, judging the activation condition;
if the certificate is a trial certificate, reading the valid start time and the valid end time in the license certificate, and judging whether the time is valid;
if yes, the user is allowed to continue using; otherwise, the use is finished.
Judging the activation condition, and specifically comprising the following steps:
if the license file is of the activated type, the license file is allowed to be continuously used;
otherwise, activating according to the inactive type.
The method for acquiring the activation application code is to calculate the number type license of the license file through an encryption algorithm to acquire the activation application code;
wherein, the activation application code calculation formula is as follows: SCODE ═ Fx (LicSn + current time);
the number type license: LicSn ═ MD5 (order number + SALT);
SCODE is an activation application code, Fx is an encryption algorithm, LicSn is a number type license, and SALT is a confusion factor.
MD5 may process any data into a HASH value of fixed length, the HASH value will be different if the processed data is not identical at all, and SALT is to generate a HASH value unique to each license. Anyone can obtain the license number from the order number through the published MD5 algorithm.
The judgment formula of the activation application code is as follows:
fx (scode) → (LicSn, client time);
fx is the reverse decryption algorithm and LicSn is a quantitative license.
The following is explained by taking the activation of the face recognition device as an example:
starting the program to run, putting the license file into a corresponding program directory after the SDK development kit, and reading the certificate type through the SDK so as to judge whether the certificate type is a trial certificate type;
if yes, reading the valid start date and the valid end date of the certificate from the certificate; judging whether the current date is in the valid period or not, and ending the trial if the current date is not in the valid period; the use is continued in the valid period;
if not, the SDK judges whether the system is activated; if the activation is already carried out, the use is continued; if not, judging the certificate type; judging whether the certificate is valid;
the certificate type comprises a time period type certificate and a quantity type certificate;
judging whether the quantitative license is valid or not, wherein the specific method comprises the following steps:
the quantity license LicSn ═ MD5 (order number + SALT).
And the license LicSn is sent to the client and written into the client device, and when the client runs the encryption algorithm SCODE of the face algorithm SDK (Fx (LicSn + current time), the activation application code SCODE is obtained. Then, filling the SCODE into an activation page of the website or sending the SCODE to an activation URL website service, where the website uses fx (SCODE) → (LicSn, client time), where fx is a reverse decryption algorithm. Judging whether the activation application code is valid or not, if the activation application code is invalid, prohibiting use, and if the activation fails, considering the license as abnormal; if the certificate is valid, continuously judging whether the certificate is valid; the number verification is carried out by using the activation application codes, and if the activation application codes do not exist or exceed the number, the certificate is invalid and is forbidden to be used; if the number of the certificates is consistent with the activation application code, the certificates are valid, then the activation number of the certificates is increased by one, the activation code is generated, the user provides the activation code for the SDK, the SDK obtains LicSn and the client TIME from the activation code, and the LicSn, the client TIME and the sent data are compared to determine whether the LicSn, the client TIME and the sent data are equal; and the SDK judges whether the activation code is valid or not, if the activation code is equal, the activation code is valid, the activation is successful, and if the activation code is unequal, the activation code is invalid, and the activation fails. Wherein the sent data is the activation application code sent by the licensed device.
Activation code verification for a quantity license:
sending the SN of the SN (Fx 2(LicSn + current time) to the user or filling the SN into an activation input box of the client device by the user, calling a decryption algorithm Fx2(SN) → (LicSn, client time) of a face algorithm library by the client, after the operation of the reverse decryption algorithm is successful, simultaneously checking whether the quantitative license is valid and has available residual quantity in the system, and if the SN is zero, judging that the license is invalid; if so, it is valid, e.g., greater than zero, and there is a remaining amount available in the system minus an available amount, resulting in an available remaining amount and written to the activate code. And then comparing whether LicSn, the client time and the sent data are equal or not, if the LicSn and the client time are equal, activating the equipment, and if the LicSn and the client time are not equal, failing to activate the equipment.
Time period type license
The session license LicSn is Fx (order number + start time + end time + SALT), and Fx is an encryption algorithm. The license LicSn is sent to the client and written into the client, when the client runs a decryption algorithm fx (LicSn) → (start time and end time) of a face algorithm SDK, the face algorithm SDK is input into the decryption algorithm of the SDK for operation through a time slot type certificate, the decryption algorithm judges whether the time in the time slot type certificate is between the start time and the end time of the license file, judges whether the current date is in the valid period, if so, the current date is valid, and activation is given; otherwise, it is invalid and is not activated.
The encryption and decryption algorithm of the invention is realized based on RSA.
Description of RSA encryption and decryption algorithm:
the encryption and decryption algorithms for Fx, Fx may be implemented using the public asymmetric RSA or symmetric DES algorithms. In order to consider the operation conditions of different embedded devices, the invention adopts an asymmetric RSA algorithm to realize an encryption link. The SDK needs to use a public key and a private key fixed by RSA to realize the decryption and verification of the license and activate a series of work.
The following is an introduction to RSA:
the RSA algorithm is an asymmetric cryptographic algorithm, which means that the algorithm requires a pair of keys, one of which is used for encryption and the other is used for decryption.
The algorithm of RSA involves three parameters, n, e1, e 2.
Where n is the product of two large prime numbers p, q, and the number of bits occupied by n in binary representation is the so-called key length.
e1 and e2 are a pair of related values, e1 can be arbitrarily chosen, but e1 is required to be relatively prime to (p-1) × (q-1); e2 was selected, requiring (e2 × e1) ≡ 1(mod (p-1) × (q-1)).
(n, e1), (n, e2) are key pairs. Where (n, e1) is the public key and (n, e2) is the private key.
The RSA encryption and decryption algorithms are completely the same, and if a is a plaintext and B is a ciphertext, then: a ≡ B ^ e2(mod n); b ≡ A ^ e1(mod n); (in the public key cryptosystem, encryption is generally performed by using a public key and decryption is performed by using a private key)
e1 and e2 may be used interchangeably, i.e.:
A≡B^e1(mod n);B≡A^e2(mod n)。
it should be understood that the above examples are only for clarity of illustration and are not intended to limit the embodiments. Other variations and modifications will be apparent to persons skilled in the art in light of the above description. And are neither required nor exhaustive of all embodiments. And obvious variations or modifications therefrom are intended to be within the scope of the invention.

Claims (9)

1. A method for activating license files is characterized by comprising the following specific steps:
when the license file is not activated, judging whether the time slot type certificate and the quantity type certificate of the license file are valid or not;
if all the active components are effectively used, the active components are failed;
wherein, judge whether quantity type certificate is valid, it is specific:
judging whether the code is a valid activation request code, if the code is invalid, prohibiting use, and failing to activate;
if the number is valid, the number is continuously verified;
generating an activation code after the quantity is verified, and obtaining a quantity type certificate and the current time from the license file by the activation code;
and judging whether the quantity type certificate and the current time accord with the activation condition, if so, giving activation use, and otherwise, failing to activate.
2. The method for license file activation according to claim 1, wherein the specific step of determining whether the time period type certificate is valid is:
inputting the time slot type certificate into a decryption algorithm of the SDK for operation, judging whether the time in the time slot type certificate is between the starting time and the ending time of the license file by the decryption algorithm, if so, judging that the time is valid, and activating; otherwise, the activation is not given;
the decryption algorithm of the SDK is as follows: fx (licsn) → (start time, end time);
LicSn ═ Fx (order number + start time + end time + SALT);
and LicSn is a time period type certificate, Fx is an encryption algorithm, and Fx is a decryption algorithm.
3. The method of license file activation according to claim 1,
the judgment method of the quantity type license judges whether the activation application code is valid or not through a reverse decryption algorithm;
if the operation of the activation application code fails through the reverse decryption algorithm, the activation application code is considered as an invalid activation application code;
if the operation of the reverse decryption algorithm is successful, the activation application code is considered as an effective activation application code, and then the activation code is generated;
the activation code generation formula is as follows: SN ═ Fx2(LicSn + current time);
SN is the activate code, Fx2 is the encryption algorithm, and LicSn is the numeric license.
4. The method for activating license file according to claim 3, wherein after the operation of the reverse decryption algorithm is successful, it is also required to check whether the number-type license is valid in the system and has a usable remaining number, and if it is zero, it is determined as invalid;
if so, it is valid, e.g., greater than zero, and there is a remaining amount available in the system minus an available amount, resulting in an available remaining amount and written to the activate code.
5. The method of claim 1, wherein the determining whether the quantity-type certificate and the current time meet the activation condition is performed by decrypting the activation code using a decryption algorithm to obtain the quantity-type license and the time of the activation code, and determining whether the obtained quantity-type license and the time of the activation code are equal to the data when the obtained quantity-type license and the time are issued, where if the obtained quantity-type license and the time are equal to the data when the obtained activation code is issued, the activation is performed, and if the obtained quantity-type license and the time are not equal to the data, the;
wherein, the decryption algorithm formula is as follows: fx2(SN) → (LicSn, client time);
SN is the activate code, fx2 is the decryption algorithm, and LicSn is the numeric license.
6. The method for activating the license file according to claim 1, wherein the type of the license file is determined before determining whether the time period type certificate and the number type certificate of the license file are valid, and the specific steps are as follows:
judging whether the certificate is a trial certificate:
if the certificate is not a trial certificate, judging the activation condition;
if the certificate is a trial certificate, reading the valid start time and the valid end time in the license certificate, and judging whether the time is valid;
if yes, the user is allowed to continue using; otherwise, the use is finished.
7. The method for activating the license file according to claim 6, wherein the step of judging the activation status includes the following specific steps:
if the license file is of the activated type, the license file is allowed to be continuously used;
otherwise, activating according to the inactive type.
8. The method of license file activation according to claim 1,
the method for acquiring the activation application code is to calculate the number type license of the license file through an encryption algorithm to acquire the activation application code;
wherein, the activation application code calculation formula is as follows: SCODE ═ Fx (LicSn + current time);
the number type license: LicSn ═ MD5 (order number + SALT);
SCODE is an activation application code, Fx is an encryption algorithm, LicSn is a number type license, and SALT is a confusion factor.
9. The method of license file activation according to claim 1,
the judgment formula of the activation application code is as follows:
fx (scode) → (LicSn, client time);
fx is the reverse decryption algorithm and LicSn is a quantitative license.
CN202010382182.9A 2020-05-08 2020-05-08 License activating method Active CN111581607B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010382182.9A CN111581607B (en) 2020-05-08 2020-05-08 License activating method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010382182.9A CN111581607B (en) 2020-05-08 2020-05-08 License activating method

Publications (2)

Publication Number Publication Date
CN111581607A true CN111581607A (en) 2020-08-25
CN111581607B CN111581607B (en) 2023-08-22

Family

ID=72112144

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010382182.9A Active CN111581607B (en) 2020-05-08 2020-05-08 License activating method

Country Status (1)

Country Link
CN (1) CN111581607B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017006058A1 (en) * 2015-07-07 2017-01-12 Universite De Montpellier System and method for authenticating and ip licensing of hardware modules
CN107341368A (en) * 2017-06-06 2017-11-10 广州视源电子科技股份有限公司 Licensing effective time method of calibration and device
CN109902450A (en) * 2019-03-14 2019-06-18 成都安恒信息技术有限公司 A kind of offline method for permitting to sign and issue management
WO2019214614A1 (en) * 2018-05-10 2019-11-14 鸿合科技股份有限公司 Automatic software activation verification method, apparatus and system, and computer readable storage medium
CN110807206A (en) * 2019-10-07 2020-02-18 复旦大学 College certificate storage management system based on block chain and attribute password

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017006058A1 (en) * 2015-07-07 2017-01-12 Universite De Montpellier System and method for authenticating and ip licensing of hardware modules
CN107341368A (en) * 2017-06-06 2017-11-10 广州视源电子科技股份有限公司 Licensing effective time method of calibration and device
WO2019214614A1 (en) * 2018-05-10 2019-11-14 鸿合科技股份有限公司 Automatic software activation verification method, apparatus and system, and computer readable storage medium
CN109902450A (en) * 2019-03-14 2019-06-18 成都安恒信息技术有限公司 A kind of offline method for permitting to sign and issue management
CN110807206A (en) * 2019-10-07 2020-02-18 复旦大学 College certificate storage management system based on block chain and attribute password

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
王煜等: "非对称加密算法在身份认证中的应用研究", 《计算机技术与发展》 *
王煜等: "非对称加密算法在身份认证中的应用研究", 《计算机技术与发展》, no. 01, 30 January 2020 (2020-01-30) *

Also Published As

Publication number Publication date
CN111581607B (en) 2023-08-22

Similar Documents

Publication Publication Date Title
CN111628868B (en) Digital signature generation method and device, computer equipment and storage medium
Zhou et al. Research and implementation of RSA algorithm for encryption and decryption
US6871276B1 (en) Controlled-content recoverable blinded certificates
EP2965254B1 (en) Systems and methods for maintaining integrity and secrecy in untrusted computing platforms
CN102427449B (en) Trusted mobile storage method based on security chips
CN110149209B (en) Internet of things equipment and method and device for improving data transmission safety of Internet of things equipment
CN111989891A (en) Data processing method, related device and block chain system
US7020776B2 (en) Cryptosystem based on a Jacobian of a curve
WO2006019614A2 (en) Method of delivering direct proof private keys in signed groups to devices using a distribution cd
CN110912920A (en) Data processing method, apparatus and medium
CN111343164B (en) Data encryption method and device applied to electric energy meter and storage medium
CN112491549A (en) Data information encryption verification method, system and computer readable storage medium
CN114692218A (en) Electronic signature method, equipment and system for individual user
CN108446539B (en) Software authorization method and software authorization file generation system
CN110995720A (en) Encryption method, device, host terminal and encryption chip
CN111404892B (en) Data supervision method and device and server
KR101579696B1 (en) System and method for obfuscating initiation values of a cryptography protocol
CN111581607B (en) License activating method
WO2023103316A1 (en) Application management method and related product
WO2024060244A1 (en) Method, device and system for managing carbon data and related apparatus
CN113784342B (en) Encryption communication method and system based on Internet of things terminal
CN115426107A (en) Identity authentication method and device
CN202276360U (en) Trusted mobile storage system based on security chips
CN115442046A (en) Signature method, signature device, electronic equipment and storage medium
CN114139177A (en) Token generation method, system and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant