CN113748657A - 用于许可认证的方法、节点、系统和计算机可读存储介质 - Google Patents
用于许可认证的方法、节点、系统和计算机可读存储介质 Download PDFInfo
- Publication number
- CN113748657A CN113748657A CN202080000461.2A CN202080000461A CN113748657A CN 113748657 A CN113748657 A CN 113748657A CN 202080000461 A CN202080000461 A CN 202080000461A CN 113748657 A CN113748657 A CN 113748657A
- Authority
- CN
- China
- Prior art keywords
- authentication
- license
- node
- information
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 83
- 230000004044 response Effects 0.000 claims abstract description 44
- 238000013475 authorization Methods 0.000 claims description 40
- 230000006870 function Effects 0.000 claims description 15
- 230000008520 organization Effects 0.000 claims description 11
- 238000012546 transfer Methods 0.000 claims description 4
- 238000007619 statistical method Methods 0.000 claims description 3
- 239000000047 product Substances 0.000 description 48
- 238000004590 computer program Methods 0.000 description 21
- 238000004891 communication Methods 0.000 description 19
- 238000010586 diagram Methods 0.000 description 12
- 239000003795 chemical substances by application Substances 0.000 description 11
- 230000008569 process Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 230000007246 mechanism Effects 0.000 description 5
- 238000013459 approach Methods 0.000 description 4
- 239000007795 chemical reaction product Substances 0.000 description 4
- 230000003993 interaction Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000007639 printing Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000007935 neutral effect Effects 0.000 description 2
- 238000007792 addition Methods 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000002155 anti-virotic effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 235000014510 cooky Nutrition 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 235000019580 granularity Nutrition 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/105—Arrangements for software license management or administration, e.g. for managing licenses at corporate level
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Abstract
根据本公开的实施例,提供了用于认证许可的边缘认证节点、中心认证节点、在这些节点处执行的方法、包括各节点在内的系统和相应的计算机可读存储介质。在边缘认证节点处执行的方法包括:从客户端节点接收认证许可请求,所述认证许可请求包括与所述客户端节点相关联的客户端指纹信息;基于所述客户端指纹信息对由中心认证节点生成的与所述客户端节点相关联的许可证书进行解密,以获得与所述客户端节点相关联的许可信息;以及至少部分基于所获得的许可信息向所述客户端节点发送认证许可响应。
Description
PCT国内申请,说明书已公开。
Claims (29)
- PCT国内申请,权利要求书已公开。
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/082497 WO2021195985A1 (zh) | 2020-03-31 | 2020-03-31 | 用于许可认证的方法、节点、系统和计算机可读存储介质 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113748657A true CN113748657A (zh) | 2021-12-03 |
CN113748657B CN113748657B (zh) | 2023-07-07 |
Family
ID=77926936
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202080000461.2A Active CN113748657B (zh) | 2020-03-31 | 2020-03-31 | 用于许可认证的方法、节点、系统和计算机可读存储介质 |
Country Status (4)
Country | Link |
---|---|
US (1) | US11790054B2 (zh) |
EP (1) | EP4131879A4 (zh) |
CN (1) | CN113748657B (zh) |
WO (1) | WO2021195985A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114726630A (zh) * | 2022-04-13 | 2022-07-08 | 辽宁华盾安全技术有限责任公司 | 基于License的信息安全授权方法、装置、电子设备及介质 |
CN115955361A (zh) * | 2023-03-09 | 2023-04-11 | 北京智芯微电子科技有限公司 | 配电物联网端侧设备接入方法及私钥和许可证书生成方法 |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2022020143A (ja) * | 2020-07-20 | 2022-02-01 | 富士通株式会社 | 通信プログラム、通信装置、及び通信方法 |
CN115037547B (zh) * | 2022-06-22 | 2024-04-05 | 北京天拓四方科技有限公司 | 软件授权方法及系统 |
CN115146252B (zh) * | 2022-09-05 | 2023-02-21 | 深圳高灯计算机科技有限公司 | 授权认证方法、系统、计算机设备和存储介质 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108833114A (zh) * | 2018-06-13 | 2018-11-16 | 上海交通大学 | 一种基于区块链的去中心化身份认证系统及方法 |
CN109003083A (zh) * | 2018-07-27 | 2018-12-14 | 山东渔翁信息技术股份有限公司 | 一种基于区块链的ca认证方法、装置及电子设备 |
CN110061851A (zh) * | 2019-04-28 | 2019-07-26 | 广州大学 | 一种去中心化的跨信任域认证方法及系统 |
US20190306157A1 (en) * | 2018-03-30 | 2019-10-03 | Lendingclub Corporation | Authenticating and authorizing users with jwt and tokenization |
CN110569638A (zh) * | 2018-06-06 | 2019-12-13 | 中移(苏州)软件技术有限公司 | 一种api认证的方法、装置、存储介质及计算设备 |
CN110832479A (zh) * | 2017-05-22 | 2020-02-21 | Macpaw软件开发公司 | 用于软件激活和许可证跟踪的系统和方法 |
Family Cites Families (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU659652B2 (en) | 1991-05-08 | 1995-05-25 | Digital Equipment Corporation | Management interface and format for license management system |
DE69638018D1 (de) | 1995-02-13 | 2009-10-15 | Intertrust Tech Corp | Systeme und Verfahren zur Verwaltung von gesicherten Transaktionen und zum Schutz von elektronischen Rechten |
US7171662B1 (en) * | 1998-03-18 | 2007-01-30 | Microsoft Corporation | System and method for software licensing |
US7136838B1 (en) * | 1999-03-27 | 2006-11-14 | Microsoft Corporation | Digital license and method for obtaining/providing a digital license |
AU2001249831A1 (en) * | 2000-04-03 | 2001-10-15 | Wireless Knowledge | Software licensing system |
JP4039923B2 (ja) * | 2002-09-20 | 2008-01-30 | 富士通株式会社 | ソフトウェア実行管理装置、ソフトウェア実行管理方法、およびソフトウェア実行管理プログラム |
US20080262968A1 (en) * | 2007-03-26 | 2008-10-23 | Infosys Technologies Ltd. | Software licensing control via mobile devices |
CN101541002A (zh) * | 2008-03-21 | 2009-09-23 | 展讯通信(上海)有限公司 | 一种基于Web服务器的移动终端的软件许可证下载方法 |
US8301879B2 (en) * | 2009-01-26 | 2012-10-30 | Microsoft Corporation | Conversation rights management |
US8869289B2 (en) * | 2009-01-28 | 2014-10-21 | Microsoft Corporation | Software application verification |
CN101546366B (zh) * | 2009-02-11 | 2011-11-30 | 广州杰赛科技股份有限公司 | 数字版权管理系统及管理方法 |
US9325680B2 (en) * | 2009-05-15 | 2016-04-26 | Adobe Systems Incorporated | Digital rights management retrieval system |
US9633183B2 (en) | 2009-06-19 | 2017-04-25 | Uniloc Luxembourg S.A. | Modular software protection |
US20120216269A1 (en) * | 2011-02-18 | 2012-08-23 | Mitel Networks Corporation | Software licensing in a virtualization environment |
WO2013074795A1 (en) | 2011-11-16 | 2013-05-23 | Nl Systems, Llc | System and method for secure software license distribution |
US20140165209A1 (en) * | 2012-12-11 | 2014-06-12 | Verizon Patent And Licensing Inc. | Digital content delivery platform for multiple retailers |
CN103237235B (zh) * | 2013-03-18 | 2016-01-20 | 中国科学院信息工程研究所 | 一种面向云电视终端身份认证实现方法及系统 |
US9436807B2 (en) * | 2013-07-03 | 2016-09-06 | Adobe Systems Incorporated | Method and apparatus for providing digital rights management service in the cloud |
EP3062255A1 (de) * | 2015-02-25 | 2016-08-31 | Siemens Aktiengesellschaft | Lizensierung von Softwareprodukten |
US20170357784A1 (en) * | 2016-06-14 | 2017-12-14 | Arista Networks, Inc. | Method and system for license management |
CN109347888A (zh) * | 2018-12-21 | 2019-02-15 | 北京博明信德科技有限公司 | 基于RESTful的鉴权方法、网关及鉴权设备 |
EP3973422A4 (en) * | 2019-05-21 | 2022-11-23 | Agilent Technologies, Inc. | MANAGEMENT AND AUTHENTICATION OF SOFTWARE LICENSING |
CN111625778A (zh) * | 2020-04-14 | 2020-09-04 | 华帝股份有限公司 | 一种软件许可分发和回收的方法及系统 |
-
2020
- 2020-03-31 EP EP20900708.7A patent/EP4131879A4/en active Pending
- 2020-03-31 US US17/259,990 patent/US11790054B2/en active Active
- 2020-03-31 WO PCT/CN2020/082497 patent/WO2021195985A1/zh unknown
- 2020-03-31 CN CN202080000461.2A patent/CN113748657B/zh active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110832479A (zh) * | 2017-05-22 | 2020-02-21 | Macpaw软件开发公司 | 用于软件激活和许可证跟踪的系统和方法 |
US20190306157A1 (en) * | 2018-03-30 | 2019-10-03 | Lendingclub Corporation | Authenticating and authorizing users with jwt and tokenization |
CN110569638A (zh) * | 2018-06-06 | 2019-12-13 | 中移(苏州)软件技术有限公司 | 一种api认证的方法、装置、存储介质及计算设备 |
CN108833114A (zh) * | 2018-06-13 | 2018-11-16 | 上海交通大学 | 一种基于区块链的去中心化身份认证系统及方法 |
CN109003083A (zh) * | 2018-07-27 | 2018-12-14 | 山东渔翁信息技术股份有限公司 | 一种基于区块链的ca认证方法、装置及电子设备 |
CN110061851A (zh) * | 2019-04-28 | 2019-07-26 | 广州大学 | 一种去中心化的跨信任域认证方法及系统 |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114726630A (zh) * | 2022-04-13 | 2022-07-08 | 辽宁华盾安全技术有限责任公司 | 基于License的信息安全授权方法、装置、电子设备及介质 |
CN114726630B (zh) * | 2022-04-13 | 2023-06-16 | 辽宁华盾安全技术有限责任公司 | 基于License的信息安全授权方法、装置、电子设备及介质 |
CN115955361A (zh) * | 2023-03-09 | 2023-04-11 | 北京智芯微电子科技有限公司 | 配电物联网端侧设备接入方法及私钥和许可证书生成方法 |
CN115955361B (zh) * | 2023-03-09 | 2023-05-23 | 北京智芯微电子科技有限公司 | 配电物联网端侧设备接入方法及私钥和许可证书生成方法 |
Also Published As
Publication number | Publication date |
---|---|
US11790054B2 (en) | 2023-10-17 |
EP4131879A1 (en) | 2023-02-08 |
CN113748657B (zh) | 2023-07-07 |
WO2021195985A1 (zh) | 2021-10-07 |
EP4131879A4 (en) | 2023-05-24 |
US20220012310A1 (en) | 2022-01-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113748657B (zh) | 用于许可认证的方法、节点、系统和计算机可读存储介质 | |
KR102117584B1 (ko) | 로컬 디바이스 인증 | |
CN109088889B (zh) | 一种ssl加解密方法、系统及计算机可读存储介质 | |
US11095635B2 (en) | Server authentication using multiple authentication chains | |
RU2434340C2 (ru) | Инфраструктура верификации биометрических учетных данных | |
EP2328107B1 (en) | Identity controlled data center | |
US20130086381A1 (en) | Multi-server authentication token data exchange | |
US11184336B2 (en) | Public key pinning for private networks | |
WO2018064881A1 (zh) | 一种用于ios客户端的用户登录状态保存方法及系统 | |
CN100514333C (zh) | 一种数据库安全访问方法和系统 | |
CN107347073B (zh) | 一种资源信息处理方法 | |
JP7189856B2 (ja) | モバイルデバイスを有するユーザがスタンドアロンコンピューティングデバイスの能力にアクセスすることをセキュアに可能にするためのシステム及び方法 | |
Abdelrazig Abubakar et al. | Blockchain-based identity and authentication scheme for MQTT protocol | |
CN114282267A (zh) | 令牌生成方法、令牌验签方法、装置、设备及存储介质 | |
Durán et al. | An architecture for easy onboarding and key life-cycle management in blockchain applications | |
Alsaid et al. | Preventing phishing attacks using trusted computing technology | |
JP6045018B2 (ja) | 電子署名代行サーバ、電子署名代行システム及び電子署名代行方法 | |
US11611541B2 (en) | Secure method to replicate on-premise secrets in a cloud environment | |
AU2021235526B2 (en) | Secure private key distribution between endpoint instances | |
WO2023160632A1 (zh) | 针对飞地实例的云服务访问权限设置方法和云管理平台 | |
US20220311616A1 (en) | Connection resilient multi-factor authentication | |
CN115134144A (zh) | 企业级业务系统认证方法、装置和系统 | |
Ismail et al. | Key distribution framework for a mobile agent platform | |
JP2023132934A (ja) | 認証情報署名システム、認証装置、認証情報署名プログラム及び認証情報署名方法 | |
Liu | Using Security Proxy Based Trusted Computing Enhanced Grid Security Infrastructure |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |