CN111581607B - License activating method - Google Patents

License activating method Download PDF

Info

Publication number
CN111581607B
CN111581607B CN202010382182.9A CN202010382182A CN111581607B CN 111581607 B CN111581607 B CN 111581607B CN 202010382182 A CN202010382182 A CN 202010382182A CN 111581607 B CN111581607 B CN 111581607B
Authority
CN
China
Prior art keywords
activation
license
time
valid
certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010382182.9A
Other languages
Chinese (zh)
Other versions
CN111581607A (en
Inventor
朱梦灵
甘霖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Cama Biometrics Co ltd
Original Assignee
Shenzhen Cama Biometrics Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Cama Biometrics Co ltd filed Critical Shenzhen Cama Biometrics Co ltd
Priority to CN202010382182.9A priority Critical patent/CN111581607B/en
Publication of CN111581607A publication Critical patent/CN111581607A/en
Application granted granted Critical
Publication of CN111581607B publication Critical patent/CN111581607B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1014Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to tokens
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a method for activating license files, which comprises the following specific steps: when the license file is not activated, judging whether a time period type certificate and a quantity type certificate of the license file are valid or not; if the active administration is continued, otherwise, the activation fails; judging whether the quantity certificate is valid or not, specifically: judging whether the activation request code is valid, and prohibiting the use if the activation request code is invalid, wherein the activation fails; if the verification number is valid, continuing to verify the number; after verifying the quantity, generating an activation code, and obtaining a quantity type certificate and the current time from the license file by the activation code; and judging whether the quantity type certificate and the current time meet the activation condition, if so, giving the activation to use, otherwise, failing to activate. The application is realized based on RSA encryption and decryption algorithm, and can solve the problem that the encryption and decryption algorithm is not universal.

Description

License activating method
Technical Field
The application relates to the technical field of license file activation, in particular to a license activating method.
Background
A software license generally refers to a legal document that governs the use and distribution of a computer software product or program. Typically, a software license grants a user the right to use a copy of a copyrighted software product. The software license may also interpret terms of use and may clarify restrictions on the rights granted to use the software.
The license management may be encrypted and decrypted by an RSA encryption algorithm, which is an asymmetric encryption algorithm. RSA is widely used in public key cryptography and electronic commerce. The RSA algorithm is based on a very simple number theory fact that it is very easy to multiply two large prime numbers, but it is extremely difficult to factorize the product, so the product can be disclosed as an encryption key. The RSA public key cryptosystem uses different encryption keys and decryption keys, and is a cryptosystem in which it is computationally infeasible to derive a decryption key from a known encryption key.
The difficulty of factoring the very large integers determines the reliability of the RSA algorithm. In other words, the more difficult it is to factorize a large integer, the more reliable the RSA algorithm is. If one finds a fast factorization algorithm, the reliability of the information encrypted with RSA must be extremely reduced.
However, the conventional industrial RSA algorithm is not universal in different platforms and heterogeneous systems, and particularly, encryption and decryption methods between a PC system and embedded equipment with low operation capability are not uniform.
Disclosure of Invention
The application aims at overcoming the defects of the prior art and provides a technical tree establishment license activation method. The method is realized based on an RSA encryption and decryption algorithm.
In order to achieve the above object of the present application, the following technical scheme is adopted:
a method for license file activation, comprising the specific steps of:
when the license file is not activated, judging whether a time period type certificate and a quantity type certificate of the license file are valid or not;
if the active administration is continued, otherwise, the activation fails;
judging whether the quantity certificate is valid or not, specifically:
judging whether the activation request code is valid, and prohibiting the use if the activation request code is invalid, wherein the activation fails;
if the verification number is valid, continuing to verify the number;
after verifying the quantity, generating an activation code, and obtaining a quantity type certificate and the current time from the license file by the activation code;
and judging whether the quantity type certificate and the current time meet the activation condition, if so, giving the activation to use, otherwise, failing to activate.
Further, the specific step of judging whether the time period type certificate is valid is as follows:
the time period type certificate is input into a decryption algorithm of the SDK to operate, the decryption algorithm judges whether the time in the time period type certificate is between the starting time and the ending time of the license file, if so, the time is valid, and activation is given; otherwise, the method is invalid and does not give activation;
the decryption algorithm of the SDK is as follows: fx (LicSn) → (start time, end time);
licsn=fx (order number+start time+end time+salt);
wherein LicSn is a time period type certificate, fx is an encryption algorithm, and Fx is a decryption algorithm.
Further, the judgment method of the quantity type license judges whether the activation application code is valid or not through a reverse decryption algorithm;
if the operation of the activation application code through the reverse decryption algorithm fails, the activation application code is considered to be an invalid activation application code;
if the reverse decryption algorithm is successful, the activation application code is considered to be an effective activation application code, and the activation code is regenerated;
wherein, the activation code generates the formula: sn=fx2 (licsn+current time);
SN is an activation code, fx2 is an encryption algorithm, and LicSn is a quantitative license.
Further, after the reverse decryption algorithm is successfully operated, it is also necessary to check whether the number type license is valid in the system and has the usable residual number, if yes, the license is judged to be invalid;
if so, it is valid, e.g., greater than zero, while there will be a usable remaining number minus an available number in the system, resulting in a usable remaining number and writing to the activate code.
Further, judging whether the quantity type certificates and the current time meet the activation conditions or not, decrypting the activation codes through a decryption algorithm to obtain quantity type licenses and time of the activation codes, judging whether the quantity type licenses and time in the obtained activation codes are equal to data when the data are sent out or not, if so, giving activation, and if not, failing to activate;
wherein, the formula of the decryption algorithm is as follows: fx2 (SN) → (LicSn, client time);
SN is the activation code, fx2 is the decryption algorithm, and LicSn is the quantitative license.
Further, before judging whether the time period type certificate and the number type certificate of the license file are valid, judging the type of the license file, specifically, the steps are as follows:
judging whether the test certificate is:
if the test certificate is not used, judging the activation condition;
if the time is the trial certificate, reading the valid starting time and ending time in the license certificate, and judging whether the time is valid or not;
if yes, allowing continued use; otherwise, ending the use.
Further, judging the activation condition, specifically comprising the following steps:
if the license file is of an activated type, allowing continued use;
otherwise, the activation is performed according to the non-activated type.
Further, the method for acquiring the activation application code is that the number type license of the license file calculates and acquires the activation application code through an encryption algorithm;
wherein, the activating application code calculation formula: scode=fx (licsn+current time);
the quantitative license: licsn=md5 (order number+salt);
SCODE is an activation application code, fx is an encryption algorithm, licSn is a quantitative license, and SALT is a confusion factor.
Further, the judging formula of the activation application code is:
fx (SCODE) → (LicSn, client time);
fx is the reverse decryption algorithm and LicSn is the quantitative license.
Compared with the prior art, the application has outstanding substantive characteristics and remarkable progress: the application is centralized, safe, shared and convenient for license management; the key core technology SDK management of most intelligent and semi-intelligent devices on the market is compatible; different resources are protected by using a universal RSA public key and private key unified algorithm.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. Like elements or portions are generally identified by like reference numerals throughout the several figures. In the drawings, elements or portions thereof are not necessarily drawn to scale.
FIG. 1 is a flow chart of the overall architecture of the present application;
FIG. 2 is a flow chart of the key activation of the present application;
Detailed Description
In order to make the technical solution of the present application better understood by those skilled in the art, the technical solution of the present application will be clearly and completely described with reference to the accompanying drawings and examples, and it is apparent that the described examples are only a part of examples of the present application, and all other examples obtained by those skilled in the art without making any inventive effort are intended to be within the scope of the present application.
As shown in fig. 1 to 2, a method for activating a license file includes the following specific steps:
when the license file is not activated, judging whether a time period type certificate and a quantity type certificate of the license file are valid or not;
if the active administration is continued, otherwise, the activation fails;
judging whether the quantity certificate is valid or not, specifically:
judging whether the activation request code is valid, and prohibiting the use if the activation request code is invalid, wherein the activation fails;
if the verification number is valid, continuing to verify the number;
after verifying the quantity, generating an activation code, and obtaining a quantity type certificate and the current time from the license file by the activation code;
and judging whether the quantity type certificate and the current time meet the activation condition, if so, giving the activation to use, otherwise, failing to activate.
The specific step of judging whether the time period type certificate is valid or not:
the time period type certificate is input into a decryption algorithm of the SDK to operate, the decryption algorithm judges whether the time in the time period type certificate is between the starting time and the ending time of the license file, if so, the time is valid, and activation is given; otherwise, the method is invalid and does not give activation;
the decryption algorithm of the SDK is as follows: fx (LicSn) → (start time, end time);
licsn=fx (order number+start time+end time+salt);
wherein LicSn is a time period type certificate, fx is an encryption algorithm, and Fx is a decryption algorithm.
The method for judging the quantity type license judges whether the activation application code is valid or not through a reverse decryption algorithm;
if the operation of the activation application code through the reverse decryption algorithm fails, the activation application code is considered to be an invalid activation application code;
if the reverse decryption algorithm is successful, the activation application code is considered to be an effective activation application code, and the activation code is regenerated;
wherein, the activation code generates the formula: sn=fx2 (licsn+current time);
SN is an activation code, fx2 is an encryption algorithm, and LicSn is a quantitative license.
After the reverse decryption algorithm is successfully operated, checking whether the quantity type license is valid in the system and the usable residual quantity exists, and judging that the license is invalid if the license is zero;
if so, it is valid, e.g., greater than zero, while there will be a usable remaining number minus an available number in the system, resulting in a usable remaining number and writing to the activate code.
Judging whether the quantity type certificates and the current time meet the activation conditions or not, decrypting the activation codes through a decryption algorithm to obtain quantity type licenses and time of the activation codes, judging whether the quantity type licenses and time in the obtained activation codes are equal to data when the data are sent out, if so, giving activation, and if not, failing to activate;
wherein, the formula of the decryption algorithm is as follows: fx2 (SN) → (LicSn, client time);
SN is the activation code, fx2 is the decryption algorithm, and LicSn is the quantitative license.
Before judging whether the time period type certificate and the quantity type certificate of the license file are valid, judging the type of the license file, and specifically, the method comprises the following steps:
judging whether the test certificate is:
if the test certificate is not used, judging the activation condition;
if the time is the trial certificate, reading the valid starting time and ending time in the license certificate, and judging whether the time is valid or not;
if yes, allowing continued use; otherwise, ending the use.
Judging the activation condition, and specifically, the steps are as follows:
if the license file is of an activated type, allowing continued use;
otherwise, the activation is performed according to the non-activated type.
The method for acquiring the activation application code is that the number type license of the license file calculates and acquires the activation application code through an encryption algorithm;
wherein, the activating application code calculation formula: scode=fx (licsn+current time);
the quantitative license: licsn=md5 (order number+salt);
SCODE is an activation application code, fx is an encryption algorithm, licSn is a quantitative license, and SALT is a confusion factor.
MD5 can process any data into HASH values of a fixed length, and if there is little mismatch in the processed data, the HASH values will be different, and SALT is the HASH value unique to each license. Otherwise anyone can obtain a license number from the order number through the disclosed MD5 algorithm.
The judging formula of the activation application code is as follows:
fx (SCODE) → (LicSn, client time);
fx is the reverse decryption algorithm and LicSn is the quantitative license.
The following description is given by taking activation of the face recognition device as an example:
the program starts to run, the license file is put into a corresponding program catalog after the SDK development kit, and the certificate type is read through the SDK so as to judge whether the certificate type is a trial certificate type;
if yes, reading the valid start date and end date of the certificate from the certificate; judging whether the current date is in the valid period or not, and ending the trial if the current date is not in the valid period; continuing to use in the validity period;
if not, judging whether the system is activated by the SDK; if yes, continuing to use; if not, judging the certificate type; judging whether the certificate is valid or not;
the certificate type comprises a time period type certificate and a quantity type certificate;
the specific method for judging whether the quantitative license is valid is as follows:
the quantitative license licsn=md5 (order number+salt).
The license LicSn is issued to the client and written into the device of the client, and when the client runs the encryption algorithm scede=fx (licsn+current time) of the face algorithm SDK, the activation application code scede is obtained. And then filling SCODE into an activated page of the website or sending the activated page to an activated URL website service, wherein the website uses fx (SCODE) → (LicSn, client time), and fx is a reverse decryption algorithm. Judging whether the activation application code is valid or not according to the method, prohibiting use if the activation application code is invalid, and considering abnormal license if the activation application code fails; if so, continuing to judge whether the certificate is valid or not; the number verification is carried out by using the activation application code, if the activation application code does not exist or exceeds the number, the certificate is invalid, and the use is forbidden; if the number of the certificates is consistent with the activation application code, the certificates are valid, then the number of the certificates is increased by one, the activation code is generated, the user provides the activation code for the SDK, the SDK obtains LicSn and the client TIME from the activation code, and whether the LicSn, the client TIME and the sent data are equal is compared; the SDK judges whether the activation codes are valid or not according to the rule, if the activation codes are equal, the activation codes are valid, the activation is successful, and if the activation codes are unequal, the activation codes are invalid, and the activation fails. The sent data is the activation application code sent by the licensed device.
Activation code verification of quantitative license:
the SN of SN=Fx2 (LicSn+current time) is sent to a user or the user himself or herself is filled into an activation input box of the client device, the client calls a decryption algorithm Fx2 (SN) to (LicSn, client time) of the face algorithm library, after the reverse decryption algorithm is successfully operated, whether the number license is valid in the system or not and the available residual number exists is checked, and if the number license is zero, the number license is judged to be invalid; if so, it is valid, e.g., greater than zero, while there will be a usable remaining number minus an available number in the system, resulting in a usable remaining number and writing to the activate code. And then comparing whether the LicSn, the client time and the data sent out are equal or not, if so, activating the device, and if not, failing to activate.
Time period type license
Time slot license licsn=fx (order number+start time+end time+salt), fx being an encryption algorithm. The license LicSn is sent to clients and written into the equipment of the clients, when the decryption algorithm fx (LicSn) to (the starting time and the ending time) of the client operation face algorithm SDK is input into the decryption algorithm of the SDK through the time slot type certificate to operate, the decryption algorithm judges whether the time in the time slot type certificate is between the starting time and the ending time of the license file, judges whether the current date is in the validity period, if so, the license is valid, and the license is activated; otherwise, the method is invalid and does not give activation.
The encryption and decryption algorithm of the application is based on RSA implementation.
RSA encryption and decryption algorithm description:
the encryption and decryption algorithms for Fx, fx may be implemented using the disclosed asymmetric RSA or symmetric DES algorithms. To consider the operation conditions of different embedded devices, the application adopts an asymmetric RSA algorithm to realize the encryption link. The SDK needs to use the public key and the private key fixed by RSA to realize a series of work of decrypting and verifying the license and activating.
The following is an introduction to RSA:
the RSA algorithm is an asymmetric cryptographic algorithm, meaning that the algorithm requires a pair of keys, one of which is used for encryption and the other for decryption.
The algorithm of RSA involves three parameters, n, e1, e2.
Where n is the product of two large prime numbers p, q, the number of bits occupied in binary representation of n is the so-called key length.
e1 and e2 are a pair of related values, e1 can be arbitrarily taken, but requires that e1 and (p-1) × (q-1) be mutually exclusive; and then e2 is selected, and (e2×e1) ≡1 (mod (p-1) × (q-1)) is required.
(n, e 1), (n, e 2) is the key pair. Where (n, e 1) is a public key and (n, e 2) is a private key.
The algorithm of RSA encryption and decryption is identical, and A is plaintext, B is ciphertext, then: A≡Be 2 (mod n); b≡a≡e1 (mod n); (in the public Key cryptosystem, public Key encryption and private Key decryption are generally used)
e1 and e2 may be used interchangeably, namely:
A≡B^e1(mod n);B≡A^e2(mod n)。
it is apparent that the above examples are given by way of illustration only and are not limiting of the embodiments. Other variations or modifications of the above teachings will be apparent to those of ordinary skill in the art. It is not necessary here nor is it exhaustive of all embodiments. While still being within the scope of the application, obvious variations or modifications may be made thereto.

Claims (7)

1. A method for license file activation, comprising the specific steps of:
when the license file is not activated, judging whether a time period type certificate and a quantity type certificate of the license file are valid or not; if the active administration is continued, otherwise, the activation fails;
judging whether the quantity certificate is valid or not, specifically:
judging whether the application code is valid or not, and prohibiting the application code from being used when the application code is invalid and failing to activate; if the verification number is valid, continuing to verify the number;
after verifying the quantity, generating an activation code, and obtaining a quantity type certificate and the current time from the license file by the activation code;
judging whether the quantity type certificates and the current time meet the activation conditions, if so, giving activation, otherwise, failing to activate;
the specific step of judging whether the time period type certificate is valid or not:
the time period type certificate is input into a decryption algorithm of the SDK to operate, the decryption algorithm judges whether the time in the time period type certificate is between the starting time and the ending time of the license file, if so, the time is valid, and activation is given; otherwise, the method is invalid and does not give activation;
the decryption algorithm of the SDK is as follows: fx (LicSn) → (start time, end time);
licsn=fx (order number+start time+end time+salt);
wherein LicSn is a time period type certificate, fx is an encryption algorithm, fx is a decryption algorithm, and SALT is a confusion factor;
the method for acquiring the activation application code is that the number type license of the license file calculates and acquires the activation application code through an encryption algorithm;
wherein, the activating application code calculation formula: score=fx (quantitative license+current time);
the quantitative license: quantitative license=md5 (order number+salt);
SCODE is the activation application code, fx is the encryption algorithm, and SALT is the confusion factor.
2. The method of license file activation of claim 1, wherein the method further comprises the step of,
the method for judging the quantity type license judges whether the activation application code is valid or not through a reverse decryption algorithm;
if the operation of the activation application code through the reverse decryption algorithm fails, the activation application code is considered to be an invalid activation application code;
if the reverse decryption algorithm is successful, the activation application code is considered to be an effective activation application code, and the activation code is regenerated;
wherein, the activation code generates the formula: sn=fx2 (quantitative license+current time);
SN is the activation code and Fx2 is the encryption algorithm.
3. The method for activating license files according to claim 2, wherein after the reverse decryption algorithm is successfully operated, it is also necessary to check whether the number type license is valid in the present system and has a usable remaining number, and if the number type license is zero, the number type license is judged to be invalid;
if so, it is valid, e.g., greater than zero, while there will be a usable remaining number minus an available number in the system, resulting in a usable remaining number and writing to the activate code.
4. The method for activating license files according to claim 1, wherein the judgment of whether the quantity type certificates and the current time meet the activation conditions is to decrypt the activation codes through a decryption algorithm to obtain quantity type licenses and time of the activation codes, and then judge whether the quantity type licenses and time in the obtained activation codes are equal to the data when the data are sent out, if the quantity type licenses and time are equal to the data when the data are given to the activation, and if the quantity type licenses and the current time are not equal to the data are failed to be activated;
wherein, the formula of the decryption algorithm is as follows: fx2 (SN) → (quantitative license, client time);
SN is the activation code and fx2 is the decryption algorithm.
5. The method for license file activation according to claim 1, wherein the step of determining whether the time period type certificate and the number type certificate of the license file are valid is performed before determining the type of the license file, comprises the steps of:
judging whether the test certificate is:
if the test certificate is not used, judging the activation condition;
if the time is the trial certificate, reading the valid starting time and ending time in the license certificate, and judging whether the time is valid or not; if yes, allowing continued use; otherwise, ending the use.
6. The method for activating license file according to claim 5, wherein the activating condition is judged, and the specific steps are as follows:
if the license file is of an activated type, allowing continued use;
otherwise, the activation is performed according to the non-activated type.
7. The method of license file activation of claim 1, wherein the method further comprises the step of,
the judging formula of the activation application code is as follows:
fx (SCODE) → (quantitative license, client time);
fx is the reverse decryption algorithm, the quantitative license.
CN202010382182.9A 2020-05-08 2020-05-08 License activating method Active CN111581607B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010382182.9A CN111581607B (en) 2020-05-08 2020-05-08 License activating method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010382182.9A CN111581607B (en) 2020-05-08 2020-05-08 License activating method

Publications (2)

Publication Number Publication Date
CN111581607A CN111581607A (en) 2020-08-25
CN111581607B true CN111581607B (en) 2023-08-22

Family

ID=72112144

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010382182.9A Active CN111581607B (en) 2020-05-08 2020-05-08 License activating method

Country Status (1)

Country Link
CN (1) CN111581607B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017006058A1 (en) * 2015-07-07 2017-01-12 Universite De Montpellier System and method for authenticating and ip licensing of hardware modules
CN107341368A (en) * 2017-06-06 2017-11-10 广州视源电子科技股份有限公司 Licensing effective time method of calibration and device
CN109902450A (en) * 2019-03-14 2019-06-18 成都安恒信息技术有限公司 A kind of offline method for permitting to sign and issue management
WO2019214614A1 (en) * 2018-05-10 2019-11-14 鸿合科技股份有限公司 Automatic software activation verification method, apparatus and system, and computer readable storage medium
CN110807206A (en) * 2019-10-07 2020-02-18 复旦大学 College certificate storage management system based on block chain and attribute password

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017006058A1 (en) * 2015-07-07 2017-01-12 Universite De Montpellier System and method for authenticating and ip licensing of hardware modules
CN107341368A (en) * 2017-06-06 2017-11-10 广州视源电子科技股份有限公司 Licensing effective time method of calibration and device
WO2019214614A1 (en) * 2018-05-10 2019-11-14 鸿合科技股份有限公司 Automatic software activation verification method, apparatus and system, and computer readable storage medium
CN109902450A (en) * 2019-03-14 2019-06-18 成都安恒信息技术有限公司 A kind of offline method for permitting to sign and issue management
CN110807206A (en) * 2019-10-07 2020-02-18 复旦大学 College certificate storage management system based on block chain and attribute password

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
非对称加密算法在身份认证中的应用研究;王煜等;《计算机技术与发展》;20200130(第01期);全文 *

Also Published As

Publication number Publication date
CN111581607A (en) 2020-08-25

Similar Documents

Publication Publication Date Title
EP2965254B1 (en) Systems and methods for maintaining integrity and secrecy in untrusted computing platforms
US9847880B2 (en) Techniques for ensuring authentication and integrity of communications
JP4501349B2 (en) System module execution device
US7730315B2 (en) Cryptosystem based on a Jacobian of a curve
CN110912920A (en) Data processing method, apparatus and medium
CN111294203B (en) Information transmission method
JP3980145B2 (en) Cryptographic key authentication method and certificate for chip card
CN110995720B (en) Encryption method, device, host terminal and encryption chip
CN112491549A (en) Data information encryption verification method, system and computer readable storage medium
CN114692218A (en) Electronic signature method, equipment and system for individual user
CN112241527B (en) Secret key generation method and system of terminal equipment of Internet of things and electronic equipment
US20040086113A1 (en) Methods for point compression for jacobians of hyperelliptic curves
CN111404892B (en) Data supervision method and device and server
CN110737725A (en) Electronic information inspection method, device, equipment, medium and system
CN110990814A (en) Trusted digital identity authentication method, system, equipment and medium
CN111581607B (en) License activating method
CN115442046A (en) Signature method, signature device, electronic equipment and storage medium
CN114747173A (en) Data integrity verification via degenerate keys
JP2011013428A (en) Information processing apparatus, code generation method, code verifying method, and program
CN113190862B (en) SM 2-based certificateless key generation method and device, electronic equipment and medium
CN115134093B (en) Digital signature method and computing device
CN116886317B (en) Method, system and equipment for distributing secret key between server and terminal equipment
CN115694818A (en) Data consistency checking method and device
CN112328974A (en) Software authorization method and verification system of multi-module system
CN114764503A (en) Data distribution method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant