CN111581607A - Method for activating license - Google Patents
Method for activating license Download PDFInfo
- Publication number
- CN111581607A CN111581607A CN202010382182.9A CN202010382182A CN111581607A CN 111581607 A CN111581607 A CN 111581607A CN 202010382182 A CN202010382182 A CN 202010382182A CN 111581607 A CN111581607 A CN 111581607A
- Authority
- CN
- China
- Prior art keywords
- activation
- license
- time
- code
- certificate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 230000003213 activating effect Effects 0.000 title claims abstract description 16
- 230000004913 activation Effects 0.000 claims abstract description 119
- 150000003839 salts Chemical class 0.000 claims description 12
- 238000004364 calculation method Methods 0.000 claims description 3
- 238000012795 verification Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
- G06F21/1014—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to tokens
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a method for activating license files, which comprises the following specific steps: when the license file is not activated, judging whether the time slot type certificate and the quantity type certificate of the license file are valid or not; if all the active components are effectively used, the active components are failed; wherein, judge whether quantity type certificate is valid, it is specific: judging whether the code is a valid activation request code, if the code is invalid, prohibiting use, and failing to activate; if the number is valid, the number is continuously verified; generating an activation code after the quantity is verified, and obtaining a quantity type certificate and the current time from the license file by the activation code; and judging whether the quantity type certificate and the current time accord with the activation condition, if so, giving activation use, and otherwise, failing to activate. The invention is realized by applying an RSA-based encryption and decryption algorithm, and can solve the problem that the encryption and decryption algorithm is not universal.
Description
Technical Field
The invention relates to the technical field of license file activation, in particular to a license activation method.
Background
A software license generally refers to a legal instrument that manages the use and distribution of computer software products or programs. Typically, a software license grants a user the right to use a copy of a copyrighted software product. The software license may also interpret terms of use and may set forth restrictions on the rights granted to use the software.
The management of the license can be encrypted and decrypted by the RSA encryption algorithm, which is an asymmetric encryption algorithm. RSA is widely used in public key cryptography and electronic commerce. The RSA algorithm is based on the very simple number theory fact that it is easy to multiply two large prime numbers, but it is extremely difficult to factorize its product, so the product can be disclosed as a cryptographic key. The RSA public key cryptosystem uses different encryption and decryption keys, and is a cryptosystem in which it is computationally infeasible to derive a decryption key from a known encryption key.
The difficulty of factoring very large integers determines the reliability of the RSA algorithm. In other words, the more difficult factoring a very large integer, the more reliable the RSA algorithm is. If one finds a fast factorization algorithm, the reliability of the information encrypted with RSA is certainly extremely degraded.
However, the traditional industrial-level RSA algorithm is not common in different platforms and heterogeneous systems, and especially the encryption and decryption methods are not uniform between the PC system and the embedded device with low computing power.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a technical tree establishment license activation method. The method is realized by applying an RSA-based encryption and decryption algorithm.
In order to achieve the purpose of the invention, the technical scheme is as follows:
a method for activating license files comprises the following specific steps:
when the license file is not activated, judging whether the time slot type certificate and the quantity type certificate of the license file are valid or not;
if all the active components are effectively used, the active components are failed;
wherein, judge whether quantity type certificate is valid, it is specific:
judging whether the code is a valid activation request code, if the code is invalid, prohibiting use, and failing to activate;
if the number is valid, the number is continuously verified;
generating an activation code after the quantity is verified, and obtaining a quantity type certificate and the current time from the license file by the activation code;
and judging whether the quantity type certificate and the current time accord with the activation condition, if so, giving activation use, and otherwise, failing to activate.
Further, the specific step of judging whether the time period type certificate is valid:
inputting the time slot type certificate into a decryption algorithm of the SDK for operation, judging whether the time in the time slot type certificate is between the starting time and the ending time of the license file by the decryption algorithm, if so, judging that the time is valid, and activating; otherwise, the activation is not given;
the decryption algorithm of the SDK is as follows: fx (licsn) → (start time, end time);
LicSn ═ Fx (order number + start time + end time + SALT);
and LicSn is a time period type certificate, Fx is an encryption algorithm, and Fx is a decryption algorithm.
Further, the judgment method of the quantity type license judges whether the activation application code is valid or not through a reverse decryption algorithm;
if the operation of the activation application code fails through the reverse decryption algorithm, the activation application code is considered as an invalid activation application code;
if the operation of the reverse decryption algorithm is successful, the activation application code is considered as an effective activation application code, and then the activation code is generated;
the activation code generation formula is as follows: SN ═ Fx2(LicSn + current time);
SN is the activate code, Fx2 is the encryption algorithm, and LicSn is the numeric license.
Furthermore, after the operation of the reverse decryption algorithm is successful, whether the quantitative license is valid in the system and has available residual quantity needs to be checked, and if the quantitative license is zero, the quantitative license is judged to be invalid;
if so, it is valid, e.g., greater than zero, and there is a remaining amount available in the system minus an available amount, resulting in an available remaining amount and written to the activate code.
Further, whether the quantity type certificate and the current time meet the activation condition is judged, the activation code is decrypted through a decryption algorithm to obtain the quantity type license and the time of the activation code, whether the obtained quantity type license and the time in the activation code are equal to the data when the obtained quantity type license and the time are sent is judged, if the obtained quantity type license and the time are equal to the data when the obtained quantity type license and the time are sent, activation is given, and if the obtained quantity type license and the time are not equal to the;
wherein, the decryption algorithm formula is as follows: fx2(SN) → (LicSn, client time);
SN is the activate code, fx2 is the decryption algorithm, and LicSn is the numeric license.
Further, before determining whether the time period type certificate and the number type certificate of the license file are valid, the type of the license file is determined, and the specific steps are as follows:
judging whether the certificate is a trial certificate:
if the certificate is not a trial certificate, judging the activation condition;
if the certificate is a trial certificate, reading the valid start time and the valid end time in the license certificate, and judging whether the time is valid;
if yes, the user is allowed to continue using; otherwise, the use is finished.
Further, judging the activation condition, specifically comprising the following steps:
if the license file is of the activated type, the license file is allowed to be continuously used;
otherwise, activating according to the inactive type.
Furthermore, the method for acquiring the activation application code is that the activation application code is acquired by calculating the number type license of the license file through an encryption algorithm;
wherein, the activation application code calculation formula is as follows: SCODE ═ Fx (LicSn + current time);
the number type license: LicSn ═ MD5 (order number + SALT);
SCODE is an activation application code, Fx is an encryption algorithm, LicSn is a number type license, and SALT is a confusion factor.
Further, the judgment formula of the activation application code is as follows:
fx (scode) → (LicSn, client time);
fx is the reverse decryption algorithm and LicSn is a quantitative license.
Compared with the prior art, the invention has prominent substantive features and remarkable progress: the invention has the advantages of centralization, safety, sharing and convenient license management; the management of the key core technology SDK of most intelligent and semi-intelligent equipment in the market is compatible; and protecting different resources by using a universal RSA public key and private key unified algorithm.
Drawings
In order to more clearly illustrate the detailed description of the invention or the technical solutions in the prior art, the drawings that are needed in the detailed description of the invention or the prior art will be briefly described below. Throughout the drawings, like elements or portions are generally identified by like reference numerals. In the drawings, elements or portions are not necessarily drawn to scale.
FIG. 1 is a flow chart of the overall architecture of the present invention;
FIG. 2 is a flow chart of key activation of the present invention;
Detailed Description
In order to make the technical solutions in the present application better understood, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings and embodiments, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and all other embodiments obtained by a person of ordinary skill in the art without making creative efforts based on the embodiments in the present application shall fall within the protection scope of the present application.
As shown in fig. 1 to 2, a method for activating a license file includes the following specific steps:
when the license file is not activated, judging whether the time slot type certificate and the quantity type certificate of the license file are valid or not;
if all the active components are effectively used, the active components are failed;
wherein, judge whether quantity type certificate is valid, it is specific:
judging whether the code is a valid activation request code, if the code is invalid, prohibiting use, and failing to activate;
if the number is valid, the number is continuously verified;
generating an activation code after the quantity is verified, and obtaining a quantity type certificate and the current time from the license file by the activation code;
and judging whether the quantity type certificate and the current time accord with the activation condition, if so, giving activation use, and otherwise, failing to activate.
The specific step of judging whether the time period type certificate is valid is as follows:
inputting the time slot type certificate into a decryption algorithm of the SDK for operation, judging whether the time in the time slot type certificate is between the starting time and the ending time of the license file by the decryption algorithm, if so, judging that the time is valid, and activating; otherwise, the activation is not given;
the decryption algorithm of the SDK is as follows: fx (licsn) → (start time, end time);
LicSn ═ Fx (order number + start time + end time + SALT);
and LicSn is a time period type certificate, Fx is an encryption algorithm, and Fx is a decryption algorithm.
The judgment method of the quantity type license judges whether the activation application code is valid or not through a reverse decryption algorithm;
if the operation of the activation application code fails through the reverse decryption algorithm, the activation application code is considered as an invalid activation application code;
if the operation of the reverse decryption algorithm is successful, the activation application code is considered as an effective activation application code, and then the activation code is generated;
the activation code generation formula is as follows: SN ═ Fx2(LicSn + current time);
SN is the activate code, Fx2 is the encryption algorithm, and LicSn is the numeric license.
After the operation of the reverse decryption algorithm is successful, whether the quantitative license is valid in the system and available residual quantity is checked, and if the quantitative license is zero, the quantitative license is judged to be invalid;
if so, it is valid, e.g., greater than zero, and there is a remaining amount available in the system minus an available amount, resulting in an available remaining amount and written to the activate code.
Judging whether the quantity type certificate and the current time meet the activation condition, decrypting the activation code through a decryption algorithm to obtain the quantity type license and the time of the activation code, judging whether the obtained quantity type license and the time in the activation code are equal to the data sent out, if so, giving activation, and if not, failing the activation;
wherein, the decryption algorithm formula is as follows: fx2(SN) → (LicSn, client time);
SN is the activate code, fx2 is the decryption algorithm, and LicSn is the numeric license.
Before judging whether the time section type certificate and the quantity type certificate of the license file are valid, judging the type of the license file, and specifically comprising the following steps of:
judging whether the certificate is a trial certificate:
if the certificate is not a trial certificate, judging the activation condition;
if the certificate is a trial certificate, reading the valid start time and the valid end time in the license certificate, and judging whether the time is valid;
if yes, the user is allowed to continue using; otherwise, the use is finished.
Judging the activation condition, and specifically comprising the following steps:
if the license file is of the activated type, the license file is allowed to be continuously used;
otherwise, activating according to the inactive type.
The method for acquiring the activation application code is to calculate the number type license of the license file through an encryption algorithm to acquire the activation application code;
wherein, the activation application code calculation formula is as follows: SCODE ═ Fx (LicSn + current time);
the number type license: LicSn ═ MD5 (order number + SALT);
SCODE is an activation application code, Fx is an encryption algorithm, LicSn is a number type license, and SALT is a confusion factor.
MD5 may process any data into a HASH value of fixed length, the HASH value will be different if the processed data is not identical at all, and SALT is to generate a HASH value unique to each license. Anyone can obtain the license number from the order number through the published MD5 algorithm.
The judgment formula of the activation application code is as follows:
fx (scode) → (LicSn, client time);
fx is the reverse decryption algorithm and LicSn is a quantitative license.
The following is explained by taking the activation of the face recognition device as an example:
starting the program to run, putting the license file into a corresponding program directory after the SDK development kit, and reading the certificate type through the SDK so as to judge whether the certificate type is a trial certificate type;
if yes, reading the valid start date and the valid end date of the certificate from the certificate; judging whether the current date is in the valid period or not, and ending the trial if the current date is not in the valid period; the use is continued in the valid period;
if not, the SDK judges whether the system is activated; if the activation is already carried out, the use is continued; if not, judging the certificate type; judging whether the certificate is valid;
the certificate type comprises a time period type certificate and a quantity type certificate;
judging whether the quantitative license is valid or not, wherein the specific method comprises the following steps:
the quantity license LicSn ═ MD5 (order number + SALT).
And the license LicSn is sent to the client and written into the client device, and when the client runs the encryption algorithm SCODE of the face algorithm SDK (Fx (LicSn + current time), the activation application code SCODE is obtained. Then, filling the SCODE into an activation page of the website or sending the SCODE to an activation URL website service, where the website uses fx (SCODE) → (LicSn, client time), where fx is a reverse decryption algorithm. Judging whether the activation application code is valid or not, if the activation application code is invalid, prohibiting use, and if the activation fails, considering the license as abnormal; if the certificate is valid, continuously judging whether the certificate is valid; the number verification is carried out by using the activation application codes, and if the activation application codes do not exist or exceed the number, the certificate is invalid and is forbidden to be used; if the number of the certificates is consistent with the activation application code, the certificates are valid, then the activation number of the certificates is increased by one, the activation code is generated, the user provides the activation code for the SDK, the SDK obtains LicSn and the client TIME from the activation code, and the LicSn, the client TIME and the sent data are compared to determine whether the LicSn, the client TIME and the sent data are equal; and the SDK judges whether the activation code is valid or not, if the activation code is equal, the activation code is valid, the activation is successful, and if the activation code is unequal, the activation code is invalid, and the activation fails. Wherein the sent data is the activation application code sent by the licensed device.
Activation code verification for a quantity license:
sending the SN of the SN (Fx 2(LicSn + current time) to the user or filling the SN into an activation input box of the client device by the user, calling a decryption algorithm Fx2(SN) → (LicSn, client time) of a face algorithm library by the client, after the operation of the reverse decryption algorithm is successful, simultaneously checking whether the quantitative license is valid and has available residual quantity in the system, and if the SN is zero, judging that the license is invalid; if so, it is valid, e.g., greater than zero, and there is a remaining amount available in the system minus an available amount, resulting in an available remaining amount and written to the activate code. And then comparing whether LicSn, the client time and the sent data are equal or not, if the LicSn and the client time are equal, activating the equipment, and if the LicSn and the client time are not equal, failing to activate the equipment.
Time period type license
The session license LicSn is Fx (order number + start time + end time + SALT), and Fx is an encryption algorithm. The license LicSn is sent to the client and written into the client, when the client runs a decryption algorithm fx (LicSn) → (start time and end time) of a face algorithm SDK, the face algorithm SDK is input into the decryption algorithm of the SDK for operation through a time slot type certificate, the decryption algorithm judges whether the time in the time slot type certificate is between the start time and the end time of the license file, judges whether the current date is in the valid period, if so, the current date is valid, and activation is given; otherwise, it is invalid and is not activated.
The encryption and decryption algorithm of the invention is realized based on RSA.
Description of RSA encryption and decryption algorithm:
the encryption and decryption algorithms for Fx, Fx may be implemented using the public asymmetric RSA or symmetric DES algorithms. In order to consider the operation conditions of different embedded devices, the invention adopts an asymmetric RSA algorithm to realize an encryption link. The SDK needs to use a public key and a private key fixed by RSA to realize the decryption and verification of the license and activate a series of work.
The following is an introduction to RSA:
the RSA algorithm is an asymmetric cryptographic algorithm, which means that the algorithm requires a pair of keys, one of which is used for encryption and the other is used for decryption.
The algorithm of RSA involves three parameters, n, e1, e 2.
Where n is the product of two large prime numbers p, q, and the number of bits occupied by n in binary representation is the so-called key length.
e1 and e2 are a pair of related values, e1 can be arbitrarily chosen, but e1 is required to be relatively prime to (p-1) × (q-1); e2 was selected, requiring (e2 × e1) ≡ 1(mod (p-1) × (q-1)).
(n, e1), (n, e2) are key pairs. Where (n, e1) is the public key and (n, e2) is the private key.
The RSA encryption and decryption algorithms are completely the same, and if a is a plaintext and B is a ciphertext, then: a ≡ B ^ e2(mod n); b ≡ A ^ e1(mod n); (in the public key cryptosystem, encryption is generally performed by using a public key and decryption is performed by using a private key)
e1 and e2 may be used interchangeably, i.e.:
A≡B^e1(mod n);B≡A^e2(mod n)。
it should be understood that the above examples are only for clarity of illustration and are not intended to limit the embodiments. Other variations and modifications will be apparent to persons skilled in the art in light of the above description. And are neither required nor exhaustive of all embodiments. And obvious variations or modifications therefrom are intended to be within the scope of the invention.
Claims (9)
1. A method for activating license files is characterized by comprising the following specific steps:
when the license file is not activated, judging whether the time slot type certificate and the quantity type certificate of the license file are valid or not;
if all the active components are effectively used, the active components are failed;
wherein, judge whether quantity type certificate is valid, it is specific:
judging whether the code is a valid activation request code, if the code is invalid, prohibiting use, and failing to activate;
if the number is valid, the number is continuously verified;
generating an activation code after the quantity is verified, and obtaining a quantity type certificate and the current time from the license file by the activation code;
and judging whether the quantity type certificate and the current time accord with the activation condition, if so, giving activation use, and otherwise, failing to activate.
2. The method for license file activation according to claim 1, wherein the specific step of determining whether the time period type certificate is valid is:
inputting the time slot type certificate into a decryption algorithm of the SDK for operation, judging whether the time in the time slot type certificate is between the starting time and the ending time of the license file by the decryption algorithm, if so, judging that the time is valid, and activating; otherwise, the activation is not given;
the decryption algorithm of the SDK is as follows: fx (licsn) → (start time, end time);
LicSn ═ Fx (order number + start time + end time + SALT);
and LicSn is a time period type certificate, Fx is an encryption algorithm, and Fx is a decryption algorithm.
3. The method of license file activation according to claim 1,
the judgment method of the quantity type license judges whether the activation application code is valid or not through a reverse decryption algorithm;
if the operation of the activation application code fails through the reverse decryption algorithm, the activation application code is considered as an invalid activation application code;
if the operation of the reverse decryption algorithm is successful, the activation application code is considered as an effective activation application code, and then the activation code is generated;
the activation code generation formula is as follows: SN ═ Fx2(LicSn + current time);
SN is the activate code, Fx2 is the encryption algorithm, and LicSn is the numeric license.
4. The method for activating license file according to claim 3, wherein after the operation of the reverse decryption algorithm is successful, it is also required to check whether the number-type license is valid in the system and has a usable remaining number, and if it is zero, it is determined as invalid;
if so, it is valid, e.g., greater than zero, and there is a remaining amount available in the system minus an available amount, resulting in an available remaining amount and written to the activate code.
5. The method of claim 1, wherein the determining whether the quantity-type certificate and the current time meet the activation condition is performed by decrypting the activation code using a decryption algorithm to obtain the quantity-type license and the time of the activation code, and determining whether the obtained quantity-type license and the time of the activation code are equal to the data when the obtained quantity-type license and the time are issued, where if the obtained quantity-type license and the time are equal to the data when the obtained activation code is issued, the activation is performed, and if the obtained quantity-type license and the time are not equal to the data, the;
wherein, the decryption algorithm formula is as follows: fx2(SN) → (LicSn, client time);
SN is the activate code, fx2 is the decryption algorithm, and LicSn is the numeric license.
6. The method for activating the license file according to claim 1, wherein the type of the license file is determined before determining whether the time period type certificate and the number type certificate of the license file are valid, and the specific steps are as follows:
judging whether the certificate is a trial certificate:
if the certificate is not a trial certificate, judging the activation condition;
if the certificate is a trial certificate, reading the valid start time and the valid end time in the license certificate, and judging whether the time is valid;
if yes, the user is allowed to continue using; otherwise, the use is finished.
7. The method for activating the license file according to claim 6, wherein the step of judging the activation status includes the following specific steps:
if the license file is of the activated type, the license file is allowed to be continuously used;
otherwise, activating according to the inactive type.
8. The method of license file activation according to claim 1,
the method for acquiring the activation application code is to calculate the number type license of the license file through an encryption algorithm to acquire the activation application code;
wherein, the activation application code calculation formula is as follows: SCODE ═ Fx (LicSn + current time);
the number type license: LicSn ═ MD5 (order number + SALT);
SCODE is an activation application code, Fx is an encryption algorithm, LicSn is a number type license, and SALT is a confusion factor.
9. The method of license file activation according to claim 1,
the judgment formula of the activation application code is as follows:
fx (scode) → (LicSn, client time);
fx is the reverse decryption algorithm and LicSn is a quantitative license.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010382182.9A CN111581607B (en) | 2020-05-08 | 2020-05-08 | License activating method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010382182.9A CN111581607B (en) | 2020-05-08 | 2020-05-08 | License activating method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111581607A true CN111581607A (en) | 2020-08-25 |
CN111581607B CN111581607B (en) | 2023-08-22 |
Family
ID=72112144
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010382182.9A Active CN111581607B (en) | 2020-05-08 | 2020-05-08 | License activating method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111581607B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017006058A1 (en) * | 2015-07-07 | 2017-01-12 | Universite De Montpellier | System and method for authenticating and ip licensing of hardware modules |
CN107341368A (en) * | 2017-06-06 | 2017-11-10 | 广州视源电子科技股份有限公司 | Licensing effective time method of calibration and device |
CN109902450A (en) * | 2019-03-14 | 2019-06-18 | 成都安恒信息技术有限公司 | A kind of offline method for permitting to sign and issue management |
WO2019214614A1 (en) * | 2018-05-10 | 2019-11-14 | 鸿合科技股份有限公司 | Automatic software activation verification method, apparatus and system, and computer readable storage medium |
CN110807206A (en) * | 2019-10-07 | 2020-02-18 | 复旦大学 | College certificate storage management system based on block chain and attribute password |
-
2020
- 2020-05-08 CN CN202010382182.9A patent/CN111581607B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017006058A1 (en) * | 2015-07-07 | 2017-01-12 | Universite De Montpellier | System and method for authenticating and ip licensing of hardware modules |
CN107341368A (en) * | 2017-06-06 | 2017-11-10 | 广州视源电子科技股份有限公司 | Licensing effective time method of calibration and device |
WO2019214614A1 (en) * | 2018-05-10 | 2019-11-14 | 鸿合科技股份有限公司 | Automatic software activation verification method, apparatus and system, and computer readable storage medium |
CN109902450A (en) * | 2019-03-14 | 2019-06-18 | 成都安恒信息技术有限公司 | A kind of offline method for permitting to sign and issue management |
CN110807206A (en) * | 2019-10-07 | 2020-02-18 | 复旦大学 | College certificate storage management system based on block chain and attribute password |
Non-Patent Citations (2)
Title |
---|
王煜等: "非对称加密算法在身份认证中的应用研究", 《计算机技术与发展》 * |
王煜等: "非对称加密算法在身份认证中的应用研究", 《计算机技术与发展》, no. 01, 30 January 2020 (2020-01-30) * |
Also Published As
Publication number | Publication date |
---|---|
CN111581607B (en) | 2023-08-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111628868B (en) | Digital signature generation method and device, computer equipment and storage medium | |
Zhou et al. | Research and implementation of RSA algorithm for encryption and decryption | |
US6871276B1 (en) | Controlled-content recoverable blinded certificates | |
EP2965254B1 (en) | Systems and methods for maintaining integrity and secrecy in untrusted computing platforms | |
CN102427449B (en) | Trusted mobile storage method based on security chips | |
CN110149209B (en) | Internet of things equipment and method and device for improving data transmission safety of Internet of things equipment | |
CN111989891A (en) | Data processing method, related device and block chain system | |
US7020776B2 (en) | Cryptosystem based on a Jacobian of a curve | |
WO2006019614A2 (en) | Method of delivering direct proof private keys in signed groups to devices using a distribution cd | |
CN110912920A (en) | Data processing method, apparatus and medium | |
CN111343164B (en) | Data encryption method and device applied to electric energy meter and storage medium | |
CN112491549A (en) | Data information encryption verification method, system and computer readable storage medium | |
CN114692218A (en) | Electronic signature method, equipment and system for individual user | |
CN108446539B (en) | Software authorization method and software authorization file generation system | |
CN110995720A (en) | Encryption method, device, host terminal and encryption chip | |
CN111404892B (en) | Data supervision method and device and server | |
KR101579696B1 (en) | System and method for obfuscating initiation values of a cryptography protocol | |
CN111581607B (en) | License activating method | |
WO2023103316A1 (en) | Application management method and related product | |
WO2024060244A1 (en) | Method, device and system for managing carbon data and related apparatus | |
CN113784342B (en) | Encryption communication method and system based on Internet of things terminal | |
CN115426107A (en) | Identity authentication method and device | |
CN202276360U (en) | Trusted mobile storage system based on security chips | |
CN115442046A (en) | Signature method, signature device, electronic equipment and storage medium | |
CN114139177A (en) | Token generation method, system and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |