[go: up one dir, main page]

CN109753769B - Software authorization method and system based on block chain - Google Patents

Software authorization method and system based on block chain Download PDF

Info

Publication number
CN109753769B
CN109753769B CN201811405865.0A CN201811405865A CN109753769B CN 109753769 B CN109753769 B CN 109753769B CN 201811405865 A CN201811405865 A CN 201811405865A CN 109753769 B CN109753769 B CN 109753769B
Authority
CN
China
Prior art keywords
software
information
blockchain
module
authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811405865.0A
Other languages
Chinese (zh)
Other versions
CN109753769A (en
Inventor
曹京奇
唐正超
瞿争
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhong'an Xinke Shenzhen Co ltd
Original Assignee
Zhongan Information Technology Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongan Information Technology Service Co Ltd filed Critical Zhongan Information Technology Service Co Ltd
Priority to CN201811405865.0A priority Critical patent/CN109753769B/en
Publication of CN109753769A publication Critical patent/CN109753769A/en
Application granted granted Critical
Publication of CN109753769B publication Critical patent/CN109753769B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本发明公开了一种基于区块链的软件授权方法及系统,该方法包括:在待授权软件中增加区块链模块;预先设置第一软件授权信息并写入区块链系统获得第一执行许可信息;启动待授权软件时,区块链模块启动并接入区块链系统;进行第一执行许可信息校验,若第一执行许可信息有效,则运行软件,否则拒绝启动;区块链系统用以管理软件授权信息。本发明中软件通过区块链进行授权,利用区块链的特性,使得该软件授权方法通用性强,授权后的软件安全性高,任何通过私自拷贝、重置授权信息等非法行为进行软件盗版的,都将导致软件无法通过在区块链的授权验证而无法运行,由于区块链的特性,使得妄图以通过破解区块链的方式对软件进行破解,几乎是不可能的。

Figure 201811405865

The invention discloses a block chain-based software authorization method and system. The method includes: adding a block chain module to the software to be authorized; presetting first software authorization information and writing it into the block chain system to obtain the first execution License information; when starting the software to be authorized, the blockchain module starts and accesses the blockchain system; the first execution permission information is verified, if the first execution permission information is valid, the software is run, otherwise it refuses to start; blockchain The system is used to manage software authorization information. In the present invention, the software is authorized through the block chain, and the characteristics of the block chain are used, so that the software authorization method has strong versatility, and the authorized software has high security. It will cause the software to fail to pass the authorization verification in the blockchain and cannot run. Due to the characteristics of the blockchain, it is almost impossible to attempt to crack the software by cracking the blockchain.

Figure 201811405865

Description

Software authorization method and system based on block chain
Technical Field
The invention relates to the technical field of software protection, in particular to a software authorization method and system based on a block chain.
Background
The Block Chain (Block Chain) technology is based on a decentralized peer-to-peer network, combines a cryptography principle with a recognition mechanism to guarantee data consistency and persistence of distributed nodes, and realizes the characteristics of instant information verification, traceability, difficult tampering and the like, thereby creating a set of private, efficient and safe distributed trust system.
Software authorization is an extension and development of the concept of software protection. The software authorization aims to make a software user use the software according to a purchase license, and relates to the installation number of the software, the use time, the application range, the functional sub-modules and the like. For software protection, the core idea is to prevent software from being pirated.
Software piracy is a variety of methods, and typically involves modifying system time, resetting authorization information, redirecting authentication servers, disassembling assemblies, and the like. Except for the extremely high difficulty of the pirating mode of disassembling the assembly, the difficulties of other methods are common, namely the cost of software pirating is not high. Software authorization has been a problem affecting the interests of software developers.
Current software authorization techniques are generally divided into hardware authorization and software authorization. The former is a code segment added to access an external device during writing of software, when the software runs, the software can be normally executed only by relying on externally pluggable authorized hardware (such as a dongle), and if the hardware is lost, the software refuses to execute. The latter is usually implemented using encrypted authorization codes that are bound one-to-one with unique identification information extracted from the host running the software, and when the software is copied or the authorization information is misused, the software will prevent this by verifying the binding relationship.
The prior art has the following defects: for hardware authorization, external encryption equipment needs to be purchased additionally, which not only causes waste, but also causes a plurality of use scenes that the external equipment cannot be accessed, such as software use cloud deployment; for software authorization, once one piece of software is cracked, the cracked software can be copied infinitely, and measures are difficult to take to regulate the behavior, so that the rights and interests of software developers are greatly violated.
Therefore, a software authorization method with strong universality and higher safety needs to be found.
Disclosure of Invention
In view of this, embodiments of the present invention provide a software authorization method and system based on a block chain, where the software authorization method is strong in universality and high in security of authorized software.
The technical scheme provided by the embodiment of the invention is as follows:
adding a block chain module in software to be authorized;
presetting first software authorization information and writing the first software authorization information into a block chain system to obtain first execution permission information;
when the software to be authorized is started, the block chain module is started and accessed to the block chain system;
checking first execution permission information, and running the software if the first execution permission information is valid; otherwise, operation is refused;
the blockchain system is used for managing software authorization information.
As a preferred implementation method, the presetting of the first software authorization information and the writing of the first software authorization information into the blockchain system to obtain the first execution permission information includes the following steps:
the blockchain system receives the first software authorization information;
the block chain system identifies and executes the first software authorization information to acquire first execution permission information;
the blockchain system records the first execution permission information.
As a preferred implementation method, checking first execution permission information, and if the first execution permission information is valid, running the software; otherwise, operation is refused, including:
the block chain module reads first execution permission information in the block chain system;
and judging whether the first execution permission information is valid or not, if so, operating the software, and if not, refusing to operate the software.
As a preferred implementation method, the method further includes:
judging whether the first execution permission information is in the validity period or not when the software is used, and prompting a user to re-authorize if the first execution permission information is expired and invalid;
and the user autonomously selects whether to re-authorize, and if so, prompts the user to purchase second software authorization information for re-authorization.
As a preferred implementation method, the re-authorization includes the following steps:
setting second software authorization information and writing the second software authorization information into the block chain system to obtain second execution permission information;
when the software to be authorized is started, the block chain module is started and accessed to the block chain system;
checking second execution permission information, and running the software if the second execution permission information is valid; otherwise, operation is refused.
In another aspect, a software authorization system for performing a blockchain of the above method is provided, the software authorization system comprising communicatively coupled blockchain modules and a blockchain system, wherein,
the blockchain module includes:
inputting a submodule: for inputting the first software authorization information;
a promoter module: for starting the blockchain module;
an access sub-module: for accessing the blockchain module to the blockchain system;
a checking submodule: for checking the first execution permission information;
a control sub-module: for starting the software when said first execution permission information is verified to be valid.
As a preferred implementation, the block chain system comprises:
a receiving module: for receiving the first software authorization information;
an execution module: the first software authorization information is used for executing the first software, and the first execution permission information is obtained;
a storage module: for recording the first execution permission information.
As a preferred implementation, the block chain module further includes:
reading the sub-modules: the system comprises a first execution permission information reading unit, a second execution permission information reading unit and a third execution permission information reading unit, wherein the first execution permission information is used for reading first execution permission information in the blockchain system;
as a preferred implementation, the block chain module further includes:
a judgment submodule: for judging whether the first execution permission information is within a validity period at the time of software use;
an output submodule: when the first execution permission information is expired and expired, outputting prompt information for judging whether re-authorization is needed or not;
an identification submodule: information for identifying whether a user inputs re-authorization or not;
a processing submodule: and processing the information which is input by the user and used for re-authorization, prompting the user to purchase second software authorization information if the information is input by the user, and terminating the software use right if the information is not input by the user.
Compared with the prior art, the embodiment of the invention has the beneficial effects that the embodiment of the invention provides a software authorization method and a system based on a block chain, and the method comprises the following steps: adding a block chain module in software to be authorized; presetting first software authorization information and writing the first software authorization information into a block chain system to obtain first execution permission information; when the software to be authorized is started, the block chain module is started and accessed to the block chain system; checking first execution permission information, and running the software if the first execution permission information is valid; otherwise, operation is refused; the blockchain system is used for managing software authorization information. In the invention, software is authorized through the block chain, and the characteristics of high efficiency, safety, traceability and difficult tampering of the block chain are utilized, so that the software authorization method is strong in universality, the software after authorization is high in safety, software piracy can be carried out through illegal behaviors such as private copy, system time modification, authorization information resetting and the like, the software cannot run through authorization verification on the block chain, and due to the characteristics of the block chain, software can be cracked in a mode of cracking the block chain, and the software is almost impossible.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a flowchart of a block chain-based software authorization method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a software authorization system based on a block chain in the second embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
The embodiment provides a software authorization method based on a block chain, which is strong in universality and high in software security after authorization.
In this embodiment, the protected software authorization method is implemented based on the blockchain, so that a blockchain system with a corresponding size for managing authorization information needs to be maintained before authorization. When the blockchain system is selected, different blockchain systems can be selected according to the specific authorized scene of the software. If the authorization scenario is software batch authorization inside an enterprise, a private chain system running inside the enterprise can be adopted; if the authorization scene is software batch authorization facing a plurality of enterprises, a alliance connection system running among the plurality of enterprises can be adopted; if the authorization scenario is software authorization for individual users of the internet, a public link system running on the internet may be employed.
Under the specific scene of software authorization, the requirements on the performance and the storage of the block chain are not high, so that the requirement on an authorization function can be met by adopting an extremely light-weight block chain system, and the execution of the software cannot be greatly influenced.
Fig. 1 is a flowchart of a software authorization method based on a block chain according to an embodiment of the present invention, and referring to fig. 1, the method specifically includes the following steps:
and S1, adding a block chain module in the software to be authorized.
Since the blockchain system is also a software system, the blockchain system and the software to be authorized are seamless products. The addition of the blockchain module in the software to be authorized does not affect the software. The configuration information required by the blockchain module may be incorporated into the configuration information of the software itself.
Since the software may be written in various programming languages, the blockchain system selected by us needs to be able to solve the problem of information compatibility caused by various programming languages. Therefore, some information encoding modes with good compatibility can be adopted, such as: json, protobuf, etc.
S2, presetting first software authorization information and writing the first software authorization information into the blockchain system to obtain first execution permission information.
When a software user purchases software from a software developer, the software user can obtain first software authorization information, and the software is authorized and can be started through verification of the blockchain system.
When the software is deployed, setting first software authorization information which can be identified by the blockchain system is carried out. The software user purchases first software authorization information from a software developer, the software developer writes the first software authorization information into the blockchain system, the first software authorization information is identified and executed by the blockchain system, then first execution license information is obtained, the blockchain records the first execution license information of corresponding software, and the first execution license information is used when the software is started.
Specifically, the software developer writes first software authorization information into the blockchain system, which includes the following sub-steps:
s21, the blockchain system receives the first software authorization information;
s22, identifying and executing the first software authorization information by the blockchain system, and acquiring first execution permission information;
s23, the blockchain system records the first execution permission information.
Of course, before the blockchain system accepts the first software authorization information, the software developer needs to send the first software authorization information to the blockchain system through the corresponding node.
S3, when the software to be authorized is started, the blockchain module is started and accesses the blockchain system.
When the software to be authorized is started, the blockchain module is started first. After the blockchain module is started, the blockchain system can be accessed, and information in the blockchain system is read for communication transmission.
S4, checking the first execution permission information, and running the software if the first execution permission information is valid; otherwise, operation is refused, which comprises the following sub-steps:
s41, the blockchain module reads the first execution permission information in the blockchain system.
Specifically, after the blockchain module accesses the blockchain system, the information in the blockchain can be read, so as to find the pre-recorded first execution permission information of the software to be authorized.
And S42, judging whether the first execution permission information is valid, if so, operating the software, and if not, refusing to operate the software.
So far, the software is authorized and can be normally used.
After the software is authorized, the software has a certain use validity period, and after the authorization is expired, the software stops running, and a software user can re-authorize the software as required.
Therefore, in this embodiment, a software authorization method based on a blockchain further includes:
judging whether the first execution permission information is in the validity period or not when the software is used, and prompting a user to re-authorize if the first execution permission information is expired and invalid;
and the user autonomously selects whether to re-authorize, and if so, prompts the user to purchase second software authorization information for re-authorization.
Wherein the re-authorization comprises the steps of:
setting second software authorization information and writing the second software authorization information into the block chain system to obtain second software execution information;
when the software to be authorized is started, the block chain module is started and connected to the block chain system;
checking second software execution information, and running the software if the second software execution information is valid; otherwise, operation is refused.
According to the software authorization method based on the block chain, software is authorized through the block chain, and the characteristics of high efficiency, safety, traceability and difficult tampering of the block chain are utilized, so that the software authorization method is high in universality, the safety of the software after authorization is high, software piracy through illegal behaviors such as private copy, system time modification, authorization information resetting and the like can cause that the software cannot run through authorization verification on the block chain, and due to the characteristics of the block chain, software can be cracked through a delusional image in a manner of breaking the block chain, and the software is almost impossible.
Example two:
based on the software authorization method based on the block chain in the first embodiment, the present embodiment provides a software authorization system based on the block chain. Fig. 2 is a schematic structural diagram of a software authorization system based on a blockchain in this embodiment, referring to fig. 2, the software authorization system includes a blockchain module and a blockchain system that are communicatively connected, wherein,
the block chain module comprises:
inputting a submodule: for inputting first software authorization information;
a promoter module: for starting a blockchain module;
an access sub-module: for connecting the block chain module to the block chain system;
a checking submodule: for checking whether the first execution permission information is valid or not at the time of software authorization;
a control sub-module: for starting the software when the first execution permission information is verified to be valid.
The blockchain system includes:
a receiving module: for receiving first software authorization information;
an execution module: the software authorization information acquisition module is used for executing the first software authorization information and acquiring first execution permission information;
a storage module: for recording the first execution permission information.
The blockchain module further comprises:
reading the sub-modules: for reading the first execution permission information in the blockchain system.
The blockchain module further comprises:
a judgment submodule: the first software authorization information is used for judging whether the first software authorization information is in the validity period or not;
an output submodule: the prompt message is used for outputting whether re-authorization is needed;
an identification submodule: information for identifying whether a user inputs re-authorization or not;
a processing submodule: and processing the information which is input by the user and used for re-authorization, prompting the user to purchase second software authorization information if the information is input by the user, and terminating the software use right if the information is not input by the user.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (7)

1.一种基于区块链的软件授权方法,其特征在于,所述方法包括如下步骤:1. a software authorization method based on block chain, is characterized in that, described method comprises the steps: 在待授权软件中增加区块链模块;Add a blockchain module to the software to be authorized; 预先设置第一软件授权信息并写入区块链系统,获得第一执行许可信息;Pre-set the first software authorization information and write it into the blockchain system to obtain the first execution license information; 启动所述待授权软件时,所述区块链模块启动并接入所述区块链系统;When starting the software to be authorized, the blockchain module starts and accesses the blockchain system; 进行第一执行许可信息校验,若所述第一执行许可信息有效,则运行软件;否则拒绝运行;Verifying the first execution permission information, if the first execution permission information is valid, run the software; otherwise, refuse to run; 其中,所述区块链系统用以管理软件授权信息;Wherein, the blockchain system is used to manage software authorization information; 其中,所述预先设置第一软件授权信息并写入区块链系统,获得第一执行许可信息,包括如下子步骤:Wherein, presetting the first software authorization information and writing it into the blockchain system to obtain the first execution license information includes the following sub-steps: 所述区块链系统接收所述第一软件授权信息;the blockchain system receives the first software authorization information; 所述区块链系统识别并执行所述第一软件授权信息,获取第一执行许可信息;The blockchain system identifies and executes the first software authorization information, and obtains the first execution license information; 所述区块链系统记录所述第一执行许可信息。The blockchain system records the first execution permission information. 2.根据权利要求1所述的基于区块链的软件授权方法,其特征在于,进行第一执行许可信息校验,若所述第一执行许可信息有效,则运行软件;否则拒绝运行,包括:2. The blockchain-based software authorization method according to claim 1, wherein the first execution permission information is verified, and if the first execution permission information is valid, the software is run; otherwise, the execution is refused, including : 所述区块链模块读取所述区块链系统中的第一执行许可信息;The blockchain module reads the first execution permission information in the blockchain system; 判断所述第一执行许可信息是否有效,若有效,则运行软件,若无效,则拒绝运行软件。It is judged whether the first execution permission information is valid, and if it is valid, the software is run, and if it is invalid, the software is refused to run. 3.根据权利要求1或2所述的基于区块链的软件授权方法,其特征在于,所述方法还包括:3. The blockchain-based software authorization method according to claim 1 or 2, wherein the method further comprises: 在软件使用时判断所述第一执行许可信息是否处于有效期内,若所述第一执行许可信息已过期失效,则提示用户进行重新授权;When the software is used, determine whether the first execution license information is within the validity period, and if the first execution license information has expired, prompt the user to re-authorize; 用户自主选择是否进行重新授权,若是,则提示其购买第二软件授权信息,进行重新授权。The user can independently choose whether to perform re-authorization, and if so, the user is prompted to purchase the second software authorization information for re-authorization. 4.根据权利要求3所述的基于区块链的软件授权方法,其特征在于,所述重新授权,包括如下步骤:4. The block chain-based software authorization method according to claim 3, wherein the reauthorization comprises the following steps: 设置第二软件授权信息并写入所述区块链系统,获得第二执行许可信息;Setting the second software authorization information and writing it into the blockchain system to obtain the second execution permission information; 启动所述待授权软件时,所述区块链模块启动并接入所述区块链系统;When starting the software to be authorized, the blockchain module starts and accesses the blockchain system; 进行第二执行许可信息校验,若所述第二执行许可信息有效,则运行软件;否则拒绝运行。The second execution permission information is verified, and if the second execution permission information is valid, the software is executed; otherwise, the execution is refused. 5.一种执行如权利要求1至4任一项所述方法的基于区块链的软件授权系统,其特征在于,所述软件授权系统包括通信连接的区块链模块及区块链系统,其中,5. A blockchain-based software authorization system for performing the method according to any one of claims 1 to 4, wherein the software authorization system comprises a communication-connected blockchain module and a blockchain system, in, 所述区块链模块包括:The blockchain module includes: 输入子模块:用于输入所述第一软件授权信息;Input submodule: used to input the first software authorization information; 启动子模块:用于启动所述区块链模块;Starter module: used to start the blockchain module; 接入子模块:用于将所述区块链模块接入所述区块链系统;Access sub-module: used to connect the blockchain module to the blockchain system; 校验子模块:用于在软件授权时进行所述第一执行许可信息是否有效的校验;Check sub-module: used to check whether the first execution permission information is valid when the software is authorized; 控制子模块:用于当所述第一执行许可信息校验有效时,启动软件;Control submodule: used to start the software when the first execution permission information is verified to be valid; 所述区块链系统包括:The blockchain system includes: 接收模块:用于接收所述第一软件授权信息;Receiving module: used to receive the first software authorization information; 执行模块:用于执行所述第一软件授权信息,获取所述第一执行许可信息;Execution module: used to execute the first software authorization information, and obtain the first execution license information; 存储模块:用于记录所述第一执行许可信息。Storage module: used to record the first execution permission information. 6.根据权利要求5所述的基于区块链的软件授权系统,其特征在于,6. The blockchain-based software authorization system according to claim 5, characterized in that, 所述区块链模块还包括:The blockchain module also includes: 读取子模块:用于读取所述区块链系统中的第一执行许可信息。Reading sub-module: used to read the first execution permission information in the blockchain system. 7.根据权利要求5或6所述的基于区块链的软件授权系统,其特征在于,7. The blockchain-based software authorization system according to claim 5 or 6, characterized in that, 所述区块链模块还包括:The blockchain module also includes: 判断子模块:用于判断在软件使用时所述第一执行许可信息是否处于有效期内;Judging sub-module: for judging whether the first execution license information is within the validity period when the software is used; 输出子模块:用于当所述第一执行许可信息已过期失效时,输出是否需要进行重新授权的提示信息;Output sub-module: used to output prompt information whether re-authorization is required when the first execution permission information has expired; 识别子模块:用于识别用户输入的是否进行重新授权的信息;Identification sub-module: used to identify the information entered by the user for re-authorization; 处理子模块:用于根据用户输入的是否进行重新授权的信息进行处理,若是,则提示用户购买第二软件授权信息,若否,则终止软件使用权。Processing sub-module: used for processing according to the information input by the user whether to re-authorize, if so, prompt the user to purchase the second software authorization information, if not, terminate the software use right.
CN201811405865.0A 2018-11-23 2018-11-23 Software authorization method and system based on block chain Active CN109753769B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811405865.0A CN109753769B (en) 2018-11-23 2018-11-23 Software authorization method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811405865.0A CN109753769B (en) 2018-11-23 2018-11-23 Software authorization method and system based on block chain

Publications (2)

Publication Number Publication Date
CN109753769A CN109753769A (en) 2019-05-14
CN109753769B true CN109753769B (en) 2021-03-02

Family

ID=66402554

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811405865.0A Active CN109753769B (en) 2018-11-23 2018-11-23 Software authorization method and system based on block chain

Country Status (1)

Country Link
CN (1) CN109753769B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112241518A (en) * 2020-10-22 2021-01-19 广州市金其利信息科技有限公司 Software authority management method and system based on block chain
CN113868691B (en) * 2021-12-02 2022-05-24 北京溪塔科技有限公司 Authorized operation method and device of block chain based on cloud-native technology

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103258151B (en) * 2012-10-30 2016-01-20 中国科学院沈阳自动化研究所 A kind of software License control method of real-time authorization
US20170132621A1 (en) * 2015-11-06 2017-05-11 SWFL, Inc., d/b/a "Filament" Systems and methods for autonomous device transacting
CN106875254A (en) * 2017-01-20 2017-06-20 暨南大学 A kind of Android malicious application control methods based on block chain technology
US20170359374A1 (en) * 2016-06-11 2017-12-14 Lntel Corporation Blockchain System with Nucleobase Sequencing as Proof of Work
US20180167198A1 (en) * 2016-12-09 2018-06-14 Cisco Technology, Inc. Trust enabled decentralized asset tracking for supply chain and automated inventory management
US20180183687A1 (en) * 2016-12-28 2018-06-28 Acronis International Gmbh System and Method for Managing Services and Licenses Using a Blockchain Network
CN108243182A (en) * 2017-10-26 2018-07-03 招商银行股份有限公司 Management authorization method, sub- management end, root management end and the storage medium of block chain
US20180211059A1 (en) * 2017-01-23 2018-07-26 Health2047, Inc. Trust based access to records via encrypted protocol communications with authentication system
CN108389059A (en) * 2018-02-26 2018-08-10 成都大学 Digital copyrighted work protection, transaction and distributing method based on ownership and system
CN108573071A (en) * 2018-05-09 2018-09-25 广东工业大学 A file operation method and related device
US20180293363A1 (en) * 2017-04-07 2018-10-11 Cisco Technology, Inc. Blockchain based software licensing enforcement
CN108665946A (en) * 2018-05-08 2018-10-16 阿里巴巴集团控股有限公司 A kind of access method and device of business datum

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103186725B (en) * 2011-12-31 2016-10-05 北大方正集团有限公司 software authorization method and device
CN108566374A (en) * 2018-03-09 2018-09-21 深圳市元征科技股份有限公司 A kind of application method for down loading and its system, block chain node device, terminal
CN108768618B (en) * 2018-06-07 2021-05-11 广东工业大学 A blockchain-based IP soft core authorization method, device and medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103258151B (en) * 2012-10-30 2016-01-20 中国科学院沈阳自动化研究所 A kind of software License control method of real-time authorization
US20170132621A1 (en) * 2015-11-06 2017-05-11 SWFL, Inc., d/b/a "Filament" Systems and methods for autonomous device transacting
US20170359374A1 (en) * 2016-06-11 2017-12-14 Lntel Corporation Blockchain System with Nucleobase Sequencing as Proof of Work
US20180167198A1 (en) * 2016-12-09 2018-06-14 Cisco Technology, Inc. Trust enabled decentralized asset tracking for supply chain and automated inventory management
US20180183687A1 (en) * 2016-12-28 2018-06-28 Acronis International Gmbh System and Method for Managing Services and Licenses Using a Blockchain Network
CN106875254A (en) * 2017-01-20 2017-06-20 暨南大学 A kind of Android malicious application control methods based on block chain technology
US20180211059A1 (en) * 2017-01-23 2018-07-26 Health2047, Inc. Trust based access to records via encrypted protocol communications with authentication system
US20180293363A1 (en) * 2017-04-07 2018-10-11 Cisco Technology, Inc. Blockchain based software licensing enforcement
CN108243182A (en) * 2017-10-26 2018-07-03 招商银行股份有限公司 Management authorization method, sub- management end, root management end and the storage medium of block chain
CN108389059A (en) * 2018-02-26 2018-08-10 成都大学 Digital copyrighted work protection, transaction and distributing method based on ownership and system
CN108665946A (en) * 2018-05-08 2018-10-16 阿里巴巴集团控股有限公司 A kind of access method and device of business datum
CN108573071A (en) * 2018-05-09 2018-09-25 广东工业大学 A file operation method and related device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
区块链技术在版权保护中的应用实践;邹健;《https://www.infoq.cn/article/blockchain-in-copyright-protection》;20180418;正文全文 *
区块链软件开发者需要注意的几种软件许可;Mark Radcliffe等;《https://www.infoq.cn/article/the-big-legal-issue-blockchain-developers-rarely-discuss》;20180922;正文全文 *

Also Published As

Publication number Publication date
CN109753769A (en) 2019-05-14

Similar Documents

Publication Publication Date Title
US20250356343A1 (en) Non Fungible Token (NFT) Based Licensing and Digital Rights Management (DRM) for Software and Other Digital Assets
US11218478B1 (en) Security platform
CN112861191B (en) Application program monitoring method and device
US8074287B2 (en) Renewable and individualizable elements of a protected environment
KR101537027B1 (en) How to install security software and devices
US20080295174A1 (en) Method and System for Preventing Unauthorized Access and Distribution of Digital Data
US9460272B2 (en) Method and apparatus for group licensing of device features
JP2003500722A (en) Information protection method and device
KR20200000448A (en) Systems and methods for software activation and license tracking
CN109446259B (en) Data processing method and device, processor and storage medium
KR20120051662A (en) A method for controlling unauthorized software application usage
CN113297595A (en) Method and device for processing right-offering, storage medium and electronic equipment
CN109753769B (en) Software authorization method and system based on block chain
CN108881132B (en) Application authorization method, client, server and computer readable medium
US7890756B2 (en) Verification system and method for accessing resources in a computing environment
CN112699344B (en) Software authorization method based on block chain
CN111143832A (en) Mobile terminal SDK (software development kit) suitable for multiple scenes and hybrid authorization method thereof
CN118041628A (en) Access checking method and system of domain controller
CN101167296B (en) Updatable and Personalizable Elements of a Protected Computing Environment
KR102317863B1 (en) Methodology to protect copyright for images using blockchain technology
KR101012054B1 (en) Copyright management method of copyrighted works and its system
CN117675317B (en) Single sign-on method, system, electronic equipment and storage medium
US20250131427A1 (en) Bot prevention techniques
KR101440234B1 (en) The method and system for managing program integrity, and computer-radable recording medium storing program integrity management program recored theron
HK40044561B (en) An application program monitoring method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240306

Address after: Room 1179, W Zone, 11th Floor, Building 1, No. 158 Shuanglian Road, Qingpu District, Shanghai, 201702

Patentee after: Shanghai Zhongan Information Technology Service Co.,Ltd.

Country or region after: China

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Patentee before: ZHONGAN INFORMATION TECHNOLOGY SERVICE Co.,Ltd.

Country or region before: China

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240415

Address after: Room 1179, W Zone, 11th Floor, Building 1, No. 158 Shuanglian Road, Qingpu District, Shanghai, 201702

Patentee after: Shanghai Zhongan Information Technology Service Co.,Ltd.

Country or region after: China

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Patentee before: ZHONGAN INFORMATION TECHNOLOGY SERVICE Co.,Ltd.

Country or region before: China

CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 3F-24, Group A, Qianhai Shenzhen Hong Kong Innovation Center, No. 4008 Menghai Avenue, Nanshan Street, Qianhai Shenzhen Hong Kong Cooperation Zone, Shenzhen, Guangdong Province 518054

Patentee after: Zhong'an Xinke (Shenzhen) Co.,Ltd.

Country or region after: China

Address before: Room 1179, W Zone, 11th Floor, Building 1, No. 158 Shuanglian Road, Qingpu District, Shanghai, 201702

Patentee before: Shanghai Zhongan Information Technology Service Co.,Ltd.

Country or region before: China