CN112685698A - Software authorization method and system based on USB Key - Google Patents

Software authorization method and system based on USB Key Download PDF

Info

Publication number
CN112685698A
CN112685698A CN202011417455.5A CN202011417455A CN112685698A CN 112685698 A CN112685698 A CN 112685698A CN 202011417455 A CN202011417455 A CN 202011417455A CN 112685698 A CN112685698 A CN 112685698A
Authority
CN
China
Prior art keywords
usb key
authorization
code
computer
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011417455.5A
Other languages
Chinese (zh)
Inventor
叶峰
石勇
罗求
周强
孙利杰
陈松政
刘文清
杨涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Qilin Xin'an Technology Co Ltd
Original Assignee
Hunan Qilin Xin'an Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Qilin Xin'an Technology Co Ltd filed Critical Hunan Qilin Xin'an Technology Co Ltd
Priority to CN202011417455.5A priority Critical patent/CN112685698A/en
Publication of CN112685698A publication Critical patent/CN112685698A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a software authorization method and a system based on a USB Key, and the method comprises the following steps of registering an authorized computer through a registration program: calling a number calculation program inserted into USB Key equipment of an authorized computer, and generating an authorization code based on a machine code of the authorized computer through the number calculation program; and writing the generated authorization code into the authorized computer. The invention is convenient and quick to complete registration, does not need to manually input a long string of authorization codes, can avoid the problem that manual input is easy to make mistakes, and is particularly suitable for authorization of large-batch computer equipment including large-batch virtual machines; the invention greatly improves the cracking difficulty, and the part of generating the authorization code by encryption is completed by the USB Key equipment hardware, thereby having good confidentiality and greatly improving the cracking difficulty.

Description

Software authorization method and system based on USB Key
Technical Field
The invention relates to an authorization technology of commercial software, in particular to a software authorization method and a system based on a USB Key.
Background
The authorization license is a commonly used right-maintaining means for software release, namely an identity card of the legal software, and is essentially to prevent piracy, charge per function and the like. At present, most of commercial software and shared software adopt an authorized license mode to ensure that the software is not stolen so as to ensure the benefits of the software. The authorization permission has a plurality of different mechanisms and modes, is concise and easy to use, but is easy to copy, abuse and crack; some are relatively secure and reliable, but are complex to design and implement. Different products need to select an effective scheme according to their own characteristics and positioning. The common software authorization method generally completes authorization by extracting hardware feature codes on a system and a complex encryption and decryption mechanism, if no hardware related characteristics exist, the authorization codes cannot be prevented from being reused, the issued authorization codes are basically not controlled, and serious loss can be caused to companies; the authorization code license is one of the common ways for software authorization, and usually adopts an authorization mode of adding an authorization code to a machine code, wherein the machine code is generated by specific hardware information and is bound with hardware, the authorization code is generated according to the machine code and is input into a target machine for authorization, the authorization adopts a single machine offline mode, and each device needs to be manually authorized. The authorization mode is easy to make mistakes and is slow, the number cardinality of the virtual machines is large in the virtualization environment, and the adoption of the authorization mode is obviously unreasonable.
Disclosure of Invention
The technical problems to be solved by the invention are as follows: aiming at the problems that the base number of virtual machines in a virtualization environment is large, the traditional authorization method cannot carry out batch authorization on the virtual machine system, and the traditional authorization method cannot prevent an authorization code from being reused, the invention provides the software authorization method and the software authorization system based on the USB Key, the invention has the advantages that the registration is convenient and quick to complete, a long string of authorization codes is not needed to be manually input, the problem that the manual input is easy to make mistakes can be avoided, and the software authorization method and the software authorization system are particularly suitable for the authorization of large-batch computer equipment including large-batch virtual machines; the invention greatly improves the cracking difficulty, the part of generating the authorization code by encryption is completed by the USB Key equipment hardware, the problem that the authorization code is reused can be prevented, and the invention has good confidentiality, thereby greatly improving the cracking difficulty.
In order to solve the technical problems, the invention adopts the technical scheme that:
a software authorization method based on USB Key includes the steps of registering authorized computer through registration program:
1) calling a number calculation program inserted into USB Key equipment of an authorized computer, and generating an authorization code based on a machine code of the authorized computer through the number calculation program;
2) and writing the generated authorization code into the authorized computer.
Optionally, after the number calculating program inserted into the USB Key device of the authorized computer is called in step 1), the executing step of the number calculating program includes:
s1) reading the machine code of the authorized computer;
s2) detecting whether the machine code has been registered, if so, directly reading the corresponding authorization code, and jumping to execute the step S5); otherwise, jumping to execute step S3);
s3) reading the authorization point number in the USB Key equipment, and if the authorization point number is larger than a set value, skipping to execute the next step; otherwise, outputting an error code, ending and exiting;
s4) generating an authorization code based on the machine code, and subtracting 1 from the authorization point in the USB Key device;
s5) outputs the generated authorization code.
Optionally, the step S4) of generating the authorization code based on the machine code includes: and reading the expiration time in the USB Key equipment, and generating the authorization code by adopting the expiration time and the machine code through a preset encryption algorithm.
Optionally, the step S2) of detecting whether the machine code of the authorized computer has been registered specifically is to compare the machine code of the authorized computer with the registered machine code stored in the USB Key device to determine whether the machine code of the authorized computer has been registered; step S4) further includes a step of writing the machine code and the authorization code of the authorized computer into the USB Key device.
Optionally, step 1) is preceded by the step of performing security authentication on a USB Key device inserted into an authorized computer: acquiring a hardware serial number of the USB Key equipment through an API (application program interface) of the USB Key equipment, comparing the acquired hardware serial number with a hardware serial number stored in the USB Key equipment, judging that the authentication is passed if the acquired hardware serial number and the hardware serial number are consistent, converting the hardware serial number of the USB Key equipment into a verification code, comparing the verification code obtained by conversion with the verification code input by a user, and skipping to execute the step 1 if the verification code obtained by conversion and the verification code input by the user are consistent; otherwise, judging that the authentication is not passed, reporting an error and exiting.
Optionally, step 1) is preceded by the step of initializing the USB Key device in advance: aiming at USB Key equipment inserted into a local computer, acquiring a hardware serial number of the USB Key equipment through an API (application program interface) of the USB Key equipment, and writing the acquired hardware serial number into the USB Key equipment; writing the authorization points and the expiration time into USB Key equipment; and writing the number counting program into the USB Key equipment.
Optionally, the USB Key device includes a high-level storage area and a low-level storage area, where the high-level storage area is a partition that can perform write operation only after verifying a developer password, the low-level storage area is a partition that can perform write operation without verifying a developer password, the writing of the obtained hardware serial number into the USB Key device specifically refers to the high-level storage area written into the USB Key device, and the writing of the authorization point number and the expiration time into the USB Key device specifically refers to the high-level storage area written into the USB Key device; the writing of the number calculation program into the USB Key equipment specifically means writing the number calculation program into a high-level storage area of the USB Key equipment; the low-level storage area is used for storing machine codes of the registered computers.
Optionally, step 2) is followed by a step of closing the USB Key device.
In addition, the invention also provides a software authorization system based on the USB Key, which comprises a computer device, wherein the computer device comprises a microprocessor and a memory, the microprocessor is programmed or configured to execute the steps of the software authorization method based on the USB Key, or the memory is stored with a computer program which is programmed or configured to execute the software authorization method based on the USB Key.
Furthermore, the present invention also provides a computer-readable storage medium having stored therein a computer program programmed or configured to execute the USB Key-based software authorization method.
Compared with the prior art, the invention has the following advantages:
1. the invention is convenient and quick to complete registration, does not need to manually input a long string of authorization codes, can avoid the problem that manual input is easy to make mistakes, and is particularly suitable for authorization of large-batch computer equipment including large-batch virtual machines;
2. the invention calls the number counting program inserted into the USB Key device of the authorized computer, and generates the authorization code based on the machine code of the authorized computer through the number counting program.
3. The invention calls the number counting program inserted into the USB Key device of the authorized computer, and generates the authorization code based on the machine code of the authorized computer through the number counting program.
Drawings
FIG. 1 is a basic flow diagram of a method according to an embodiment of the present invention.
Fig. 2 is a detailed flowchart of the registration of the kylin-about procedure in the embodiment of the present invention.
Fig. 3 is a schematic flow chart illustrating an execution flow of the kysn numbering program according to an embodiment of the present invention.
Fig. 4 is a schematic diagram of the call return of the kysn arithmetic program in the embodiment of the present invention.
Fig. 5 is a schematic flow chart of initializing a USB Key device by a keyinit program in the embodiment of the present invention.
FIG. 6 is a block diagram of a USB Key device according to an embodiment of the present invention.
Detailed Description
The following will take the kylin operating system as an example to perform software authorization, and further describe the software authorization method and system based on USB Key of the present invention in detail. Needless to say, the software authorization method and system based on the USB Key of the invention are not limited to a specific operating system or software.
As shown in fig. 1, the software authorization method based on USB Key of the present embodiment includes the steps of registering an authorized computer through a registration program:
1) calling a number calculation program inserted into USB Key equipment of an authorized computer, and generating an authorization code based on a machine code of the authorized computer through the number calculation program;
2) and writing the generated authorization code into the authorized computer.
As a specific implementation manner, the registration program in this embodiment is named as kylin-about program, and the current registration state of the kylin operating system can be seen by opening the kylin-about program, for example, the unregistered kylin operating system can be seen to indicate that the system is unregistered. After inserting USB Key equipment into a USB interface of the computer, clicking to register, namely executing the steps 1) to 2), and popping up a prompt box for successful registration after the execution is finished to show that the computer registration is finished; then, the USB Key device can be used for registering the rest of the unregistered computers continuously. The software authorization method based on the USB Key is convenient and quick to complete registration, a long string of authorization codes does not need to be manually input, the problem that manual input is prone to error can be solved, and the software authorization method is particularly suitable for authorization of large-batch computer equipment including large-batch virtual machines; in the software authorization method based on the USB Key, a number calculation program inserted into USB Key equipment of an authorized computer is called, and an authorization code is generated through the number calculation program based on a machine code of the authorized computer.
Fig. 2 is a detailed flowchart of the kylin-about program registering on the authorized computer, and as shown in fig. 2, the specific steps of the kylin-about program registering on the authorized computer include: reading a configuration file required by the operation of the kylin-about program; checking whether a USB Key device is inserted, and prompting to insert the USB Key device if the USB Key device is not inserted; if the USB Key equipment is inserted, the USB Key equipment is opened, the safety certification is carried out on the USB Key equipment inserted into the authorized computer, and if the certification is passed, the step 1 is skipped to be executed); otherwise, judging that the authentication is not passed, reporting an error and quitting; after the step 1) is executed, the USB Key device can be closed and the registration is completed after the generated authorization code is written into the authorized computer (registration authorization) in the step 2).
In order to prevent hardware copy of the USB Key device and improve the security of the USB Key device, referring to fig. 2, step 1) in this embodiment further includes a step of performing security authentication on the USB Key device inserted into an authorized computer: acquiring a hardware serial number of the USB Key equipment through an API (application program interface) of the USB Key equipment, comparing the acquired hardware serial number with the hardware serial number stored in the USB Key equipment (preventing hardware copy of the USB Key equipment), judging that the hardware serial number passes authentication if the hardware serial number and the hardware serial number are consistent, converting the hardware serial number of the USB Key equipment into a verification code, comparing the verification code obtained by conversion with the verification code input by a user, and skipping to execute the step 1 if the verification code obtained by conversion and the verification code input by the user are consistent (placing unauthorized operation); otherwise, judging that the authentication is not passed, reporting an error and exiting.
Referring to fig. 2, step 2) in this embodiment further includes a step of closing the USB Key device, by which the USB Key device can be easily and quickly pulled out to perform registration of other computers.
As a specific implementation manner, in this embodiment, the number calculation program in the USB Key device is named as a kysn number calculation program, the kysn number calculation program is a binary program written in the user space of the USB Key device, and its main implementation function is to calculate an authorization code according to a machine code and an expiration time, the program is written in C51 language, and after compiling, it is written in the Key3 user space by a tool. As shown in fig. 3, after calling the number calculating program inserted into the USB Key device of the authorized computer in step 1), the executing step of the number calculating program includes:
s1) reading the machine code of the authorized computer;
s2) detecting whether the machine code has been registered, if so, directly reading the corresponding authorization code, and jumping to execute the step S5); otherwise, jumping to execute step S3);
s3) reading the authorization point number in the USB Key equipment, and if the authorization point number is larger than a set value, skipping to execute the next step; otherwise, outputting an error code, ending and exiting;
s4) generating an authorization code based on the machine code, and subtracting 1 from the authorization point in the USB Key device;
s5) outputs the generated authorization code.
It should be noted that whether the machine code has been registered or not may be verified through a network or offline as needed. As an optional offline verification implementation, the step S2) of detecting whether the machine code of the authorized computer has been registered specifically refers to comparing the machine code of the authorized computer with the registered machine code stored in the USB Key device to determine whether the machine code of the authorized computer has been registered; step S4) further includes a step of writing the machine code and the authorization code of the authorized computer into the USB Key device, so that S2) can directly read the corresponding authorization code.
It should be noted that the preset encryption algorithm may adopt various standard encryption algorithms as required, or may also adopt a custom encryption algorithm, and the present embodiment does not involve improvement of the encryption algorithm, so the description of the encryption algorithm is not repeated.
The authorization code may of course be a permanent authorization or a time-limited authorization. As a time-limited authorization manner, as shown in fig. 4, in this embodiment, the step S4) of generating the authorization code based on the machine code includes: and reading the expiration time in the USB Key equipment, and generating the authorization code by adopting the expiration time and the machine code through a preset encryption algorithm. Referring to fig. 4, it can be seen that the expiration time and the machine code are transmitted to a kysn number calculation program in the USB Key device, and then the corresponding authorization code can be obtained by using a preset encryption algorithm. The kylin-verify in fig. 4 is a program for verifying the kysn number calculation program in the USB Key device, and is used for debugging the kysn number calculation program in the verification USB Key device.
In this embodiment, before step 1), a step of initializing a USB Key device in advance is further included: aiming at USB Key equipment inserted into a local computer, acquiring a hardware serial number of the USB Key equipment through an API (application program interface) of the USB Key equipment, and writing the acquired hardware serial number into the USB Key equipment; and writing the authorization points and the expiration time into the USB Key equipment. As an optional implementation manner, the USB Key device further stores customer code information, and in this embodiment, the hardware serial number, authorization point number, expiration time, customer code, and other information stored in the USB Key device are all written and read through a specific offset address.
In this embodiment, pre-initializing the USB Key device is implemented by a keyinit program, and as shown in fig. 5, the step of executing the initialization of the USB Key device by the keyinit program includes: checking whether the USB Key equipment is found, and prompting to insert the USB Key equipment if the USB Key equipment is not found; if the USB Key equipment is found, the USB Key equipment is opened to carry out security authentication on the USB Key equipment inserted into an authorized computer, and after the security authentication is passed, the hardware serial number of the USB Key equipment is acquired through an API (application program interface) of the USB Key equipment, and the acquired hardware serial number is written into the USB Key equipment; writing the authorization points and the expiration time into USB Key equipment; and writing the number counting program into the USB Key equipment, and then closing the USB Key equipment to complete initialization.
As shown in fig. 6, in this embodiment, the USB Key device includes a high-level storage area and a low-level storage area, where the high-level storage area is a partition that can perform write operation only after verifying a password of a developer, the low-level storage area is a partition that can perform write operation without verifying a password of a developer, the writing of the obtained hardware serial number into the USB Key device specifically refers to writing into the high-level storage area of the USB Key device, and the writing of the authorization point number and the expiration time into the USB Key device specifically refers to writing into the high-level storage area of the USB Key device; the writing of the number calculation program into the USB Key equipment specifically means writing the number calculation program into a high-level storage area of the USB Key equipment; the low-level storage area is used for storing machine codes of the registered computers.
In this embodiment, the USB Key device specifically uses the rock 3 Key, and the rock 3 Key provides an 8K data storage area. Wherein bytes 0-7167 are low level data area, and bytes 7168 and 8191 (1024 bytes) are high level data storage area. The low-level storage area can be read and written in both a developer mode and a user mode. The high-level data area can be written only after the password of the developer is verified. Inserting the USB Key equipment into a machine needing authorization for authentication (opening the USB Key equipment, reading a hardware serial number, calling a conversion function, and obtaining a result after conversion as a Pin code), after the authentication is passed, when a registration button of a kylin-about program is clicked, searching a low-level storage area of the USB Key equipment first, confirming whether the machine needing registration is previously registered, if not, reading and operating the residual points of a user space in the USB Key equipment by the kylin-about program through a kysn arithmetic program, if the points are more than or equal to 1, calculating the authorization code by calling the kysn arithmetic program, and then writing license information such as the authorization code into the authorized machine.
In summary, in the software authorization method based on the USB Key of this embodiment, a USB Key device that has completed initialization is adopted, and when the USB Key device is initialized (the initialization of the USB Key device is completed by using a keyinit program), information such as a client code, an authorization point number, an expiration time, a hardware serial number, etc. is written into an advanced storage area of the USB Key device. Inserting the USB Key equipment into a machine needing authorization for authentication, after the authentication is passed, when a registration button of a kylin-about program interface is clicked, reading and operating the remaining points of a user space in the USB Key equipment by a kylin algorithm program written by C51, if the points are more than or equal to 1, calling the kylin algorithm program to calculate an authorization code, and then writing information such as the authorization code into the authorized machine by the kylin-about to finish system authorization. By analogy, when another machine needs to be registered, the registration can be completed only by inserting the USB Key equipment and then clicking the registration on the kylin-about program.
In addition, the present embodiment also provides a software authorization system based on USB Key, which includes a computer device, where the computer device includes a microprocessor and a memory, where the microprocessor is programmed or configured to execute the steps of the aforementioned software authorization method based on USB Key, or the memory stores therein a computer program programmed or configured to execute the aforementioned software authorization method based on USB Key.
Furthermore, the present embodiment also provides a computer-readable storage medium, in which a computer program programmed or configured to execute the aforementioned software authorization method based on the USB Key is stored.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-readable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein. The present application is directed to methods, apparatus (systems), and computer program products according to embodiments of the application wherein instructions, which execute via a flowchart and/or a processor of the computer program product, create means for implementing functions specified in the flowchart and/or block diagram block or blocks. These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks. These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and the protection scope of the present invention is not limited to the above embodiments, and all technical solutions belonging to the idea of the present invention belong to the protection scope of the present invention. It should be noted that modifications and embellishments within the scope of the invention may occur to those skilled in the art without departing from the principle of the invention, and are considered to be within the scope of the invention.

Claims (10)

1. A software authorization method based on USB Key is characterized in that the method comprises the following steps of registering an authorized computer through a registration program:
1) calling a number calculation program inserted into USB Key equipment of an authorized computer, and generating an authorization code based on a machine code of the authorized computer through the number calculation program;
2) and writing the generated authorization code into the authorized computer.
2. The method for software authorization based on the USB Key according to claim 1, characterized in that, after calling the number calculating program inserted into the USB Key device of the authorized computer in step 1), the executing step of the number calculating program includes:
s1) reading the machine code of the authorized computer;
s2) detecting whether the machine code has been registered, if so, directly reading the corresponding authorization code, and jumping to execute the step S5); otherwise, jumping to execute step S3);
s3) reading the authorization point number in the USB Key equipment, and if the authorization point number is larger than a set value, skipping to execute the next step; otherwise, outputting an error code, ending and exiting;
s4) generating an authorization code based on the machine code, and subtracting 1 from the authorization point in the USB Key device;
s5) outputs the generated authorization code.
3. The USB Key-based software authorization method according to claim 2, wherein the step S4) of generating the authorization code based on the machine code includes: and reading the expiration time in the USB Key equipment, and generating the authorization code by adopting the expiration time and the machine code through a preset encryption algorithm.
4. The method for software authorization based on the USB Key according to claim 2, wherein the step S2) of detecting whether the machine code of the authorized computer has been registered specifically means comparing the machine code of the authorized computer with the registered machine code stored in the USB Key device to determine whether the machine code of the authorized computer has been registered; step S4) further includes a step of writing the machine code and the authorization code of the authorized computer into the USB Key device.
5. The USB Key-based software authorization method according to claim 4, characterized in that step 1) is preceded by the step of performing security authentication on the USB Key device inserted into the authorized computer: acquiring a hardware serial number of the USB Key equipment through an API (application program interface) of the USB Key equipment, comparing the acquired hardware serial number with a hardware serial number stored in the USB Key equipment, judging that the authentication is passed if the acquired hardware serial number and the hardware serial number are consistent, converting the hardware serial number of the USB Key equipment into a verification code, comparing the verification code obtained by conversion with the verification code input by a user, and skipping to execute the step 1 if the verification code obtained by conversion and the verification code input by the user are consistent; otherwise, judging that the authentication is not passed, reporting an error and exiting.
6. The USB Key-based software authorization method according to claim 5, characterized in that step 1) is preceded by the step of pre-initializing the USB Key device: aiming at USB Key equipment inserted into a local computer, acquiring a hardware serial number of the USB Key equipment through an API (application program interface) of the USB Key equipment, and writing the acquired hardware serial number into the USB Key equipment; writing the authorization points and the expiration time into USB Key equipment; and writing the number counting program into the USB Key equipment.
7. The software authorization method based on the USB Key according to claim 6, characterized in that the USB Key device includes a high-level storage area and a low-level storage area, the high-level storage area is a partition that can be written after the password of the developer is verified, the low-level storage area is a partition that can be written without verifying the password of the developer, the writing of the obtained hardware serial number into the USB Key device specifically means writing into the high-level storage area of the USB Key device, and the writing of the authorization point number and the expiration time into the USB Key device specifically means writing into the high-level storage area of the USB Key device; the writing of the number calculation program into the USB Key equipment specifically means writing the number calculation program into a high-level storage area of the USB Key equipment; the low-level storage area is used for storing machine codes of the registered computers.
8. The USB Key-based software authorization method according to claim 1, characterized in that step 2) is followed by the step of shutting down the USB Key device.
9. A software authorization system based on USB Key, comprising a computer device, the computer device comprising a microprocessor and a memory, wherein the microprocessor is programmed or configured to execute the steps of the software authorization method based on USB Key according to any one of claims 1 to 8, or the memory stores therein a computer program programmed or configured to execute the software authorization method based on USB Key according to any one of claims 1 to 8.
10. A computer-readable storage medium, wherein a computer program programmed or configured to execute the USB Key-based software authorization method according to any one of claims 1 to 8 is stored in the computer-readable storage medium.
CN202011417455.5A 2020-12-07 2020-12-07 Software authorization method and system based on USB Key Pending CN112685698A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011417455.5A CN112685698A (en) 2020-12-07 2020-12-07 Software authorization method and system based on USB Key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011417455.5A CN112685698A (en) 2020-12-07 2020-12-07 Software authorization method and system based on USB Key

Publications (1)

Publication Number Publication Date
CN112685698A true CN112685698A (en) 2021-04-20

Family

ID=75446311

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011417455.5A Pending CN112685698A (en) 2020-12-07 2020-12-07 Software authorization method and system based on USB Key

Country Status (1)

Country Link
CN (1) CN112685698A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113536241A (en) * 2021-06-01 2021-10-22 上海赫千电子科技有限公司 Countable software authorization method for vehicle-mounted system
CN113536241B (en) * 2021-06-01 2024-05-28 上海赫千电子科技有限公司 Countable software authorization method for vehicle-mounted system

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101067839A (en) * 2007-04-27 2007-11-07 哈尔滨工业大学 Interconnection network working software system antipirating method
CN202058159U (en) * 2010-11-30 2011-11-30 方正国际软件有限公司 USB key
CN102271042A (en) * 2011-08-25 2011-12-07 北京神州绿盟信息安全科技股份有限公司 Certificate authorization method, system, universal serial bus (USB) Key equipment and server
CN102427459A (en) * 2011-12-23 2012-04-25 杭州数盾信息技术有限公司 Offline authorization method based on Usbkeys
US20130007465A1 (en) * 2011-06-30 2013-01-03 Advance Green Technology Group, Inc. Apparatus, Systems and Method for Virtual Desktop Access and Management
CN103929307A (en) * 2014-04-02 2014-07-16 天地融科技股份有限公司 Password input method, intelligent secret key device and client device
CN106529261A (en) * 2016-10-25 2017-03-22 公安部第三研究所 UKey and method used for synchronization of offline business data
CN109960900A (en) * 2019-03-29 2019-07-02 富士施乐实业发展(中国)有限公司 A kind of registration code generating method and system
CN110096849A (en) * 2019-04-02 2019-08-06 深圳市中博科创信息技术有限公司 A kind of License authorization and authentication method, device, equipment and readable storage medium storing program for executing
CN110110505A (en) * 2019-05-08 2019-08-09 上海航天电子有限公司 Equipment is encrypted based on USBkey and registration sequence number remote control bound
CN111164593A (en) * 2019-12-27 2020-05-15 威创集团股份有限公司 Registration authorization method and system
CN111859315A (en) * 2020-07-21 2020-10-30 中科方德软件有限公司 Authorization activation device
CN111914224A (en) * 2020-08-17 2020-11-10 苏州思必驰信息科技有限公司 Pre-registration and peripheral accessory authorization activation method and device

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101067839A (en) * 2007-04-27 2007-11-07 哈尔滨工业大学 Interconnection network working software system antipirating method
CN202058159U (en) * 2010-11-30 2011-11-30 方正国际软件有限公司 USB key
US20130007465A1 (en) * 2011-06-30 2013-01-03 Advance Green Technology Group, Inc. Apparatus, Systems and Method for Virtual Desktop Access and Management
CN102271042A (en) * 2011-08-25 2011-12-07 北京神州绿盟信息安全科技股份有限公司 Certificate authorization method, system, universal serial bus (USB) Key equipment and server
CN102427459A (en) * 2011-12-23 2012-04-25 杭州数盾信息技术有限公司 Offline authorization method based on Usbkeys
CN103929307A (en) * 2014-04-02 2014-07-16 天地融科技股份有限公司 Password input method, intelligent secret key device and client device
CN106529261A (en) * 2016-10-25 2017-03-22 公安部第三研究所 UKey and method used for synchronization of offline business data
CN109960900A (en) * 2019-03-29 2019-07-02 富士施乐实业发展(中国)有限公司 A kind of registration code generating method and system
CN110096849A (en) * 2019-04-02 2019-08-06 深圳市中博科创信息技术有限公司 A kind of License authorization and authentication method, device, equipment and readable storage medium storing program for executing
CN110110505A (en) * 2019-05-08 2019-08-09 上海航天电子有限公司 Equipment is encrypted based on USBkey and registration sequence number remote control bound
CN111164593A (en) * 2019-12-27 2020-05-15 威创集团股份有限公司 Registration authorization method and system
CN111859315A (en) * 2020-07-21 2020-10-30 中科方德软件有限公司 Authorization activation device
CN111914224A (en) * 2020-08-17 2020-11-10 苏州思必驰信息科技有限公司 Pre-registration and peripheral accessory authorization activation method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
黄宁等: "由机器码动态生成矩阵实现的软件版权保护方案", 《赣南师范学院学报》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113536241A (en) * 2021-06-01 2021-10-22 上海赫千电子科技有限公司 Countable software authorization method for vehicle-mounted system
CN113536241B (en) * 2021-06-01 2024-05-28 上海赫千电子科技有限公司 Countable software authorization method for vehicle-mounted system

Similar Documents

Publication Publication Date Title
US7779478B2 (en) System and method for distributed module authentication
JP6227772B2 (en) Method and apparatus for protecting a dynamic library
US20050021968A1 (en) Method for performing a trusted firmware/bios update
CN104318135B (en) A kind of Java code Safety actuality loading method based on credible performing environment
CN112231647A (en) Software authorization verification method
CN1969500B (en) Securing software
EA012921B1 (en) Method and device for protecting software from unauthorized use
TW201635186A (en) System and method for computing device with improved firmware service security using credential-derived encryption key
US20110271350A1 (en) method for protecting software
JP7154365B2 (en) Methods for securing software code
CN114186199B (en) License authorization method and device
CN112486607B (en) Virtual desktop authorization permission method based on combination of software and hardware
US6651169B1 (en) Protection of software using a challenge-response protocol embedded in the software
US9047448B2 (en) Branch auditing in a computer program
CN109190335B (en) Software copyright protection method and system
US11836254B2 (en) System and method for securing a series of firmware function calls using session tokens
CN108959980B (en) Public key protection method and public key protection system of security chip
US20140245005A1 (en) Cryptographic processing method and system using a sensitive data item
CN112685698A (en) Software authorization method and system based on USB Key
Gkaniatsou et al. Getting to know your card: reverse-engineering the smart-card application protocol data unit
CN111191194A (en) Off-line use permission system for multi-core processor software integrated development environment
US20210133299A1 (en) Method to secure a software code
CN115688120A (en) Secure chip firmware importing method, secure chip and computer readable storage medium
US7392523B1 (en) Systems and methods for distributing objects
CN102256176A (en) Method for achieving card-free certificate authority (CA) information security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210420

RJ01 Rejection of invention patent application after publication