[go: up one dir, main page]

CN111159656A - Method, device, equipment and storage medium for preventing software from being used without authorization - Google Patents

Method, device, equipment and storage medium for preventing software from being used without authorization Download PDF

Info

Publication number
CN111159656A
CN111159656A CN201911128111.XA CN201911128111A CN111159656A CN 111159656 A CN111159656 A CN 111159656A CN 201911128111 A CN201911128111 A CN 201911128111A CN 111159656 A CN111159656 A CN 111159656A
Authority
CN
China
Prior art keywords
software
hardware
identification information
expiration date
current time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911128111.XA
Other languages
Chinese (zh)
Inventor
张华�
胡康桥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hexin Interconnect Technology Qingdao Co ltd
Original Assignee
Hexin Interconnect Technology Qingdao Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hexin Interconnect Technology Qingdao Co ltd filed Critical Hexin Interconnect Technology Qingdao Co ltd
Priority to CN201911128111.XA priority Critical patent/CN111159656A/en
Publication of CN111159656A publication Critical patent/CN111159656A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention relates to the technical field of information security, in particular to a method, a device, equipment and a storage medium for preventing software from being used without authorization. A method of preventing unauthorized use of software, comprising: acquiring a related authorization file of the software; acquiring the expiration date and valid device identification information of the software from the authorization file; acquiring current time and hardware identification information of hardware equipment to be operated by software; according to the current time and the hardware identification information; and the expiration date and the valid device information of the software judge whether the software is allowed to run. The invention can judge whether the software is allowed to run according to the current time, the hardware identification information of the hardware equipment to be run by the software, the expiration date and the effective equipment information; the software authorization check can be completed locally without networking, and the problem that the software cannot be authenticated if the equipment cannot be networked in the prior art is solved.

Description

Method, device, equipment and storage medium for preventing software from being used without authorization
Technical Field
The embodiment of the invention relates to the technical field of information security, in particular to a method, a device, equipment and a storage medium for preventing software from being used without authorization.
Background
In order to realize the authorized use of software, the prior art has two ways: firstly, an online registration mode: after the user installs the software, registration authorization is carried out through the network. The supplier of the software system registers the information of the user in advance, and when the user registers online, the register system of the supplier verifies the information of the user. When the user identity is valid, the registration system generates a certificate message, and the software system completes authorization according to the certificate message. Secondly, the activation code mode: after a user installs software, a software system generates a registration certificate (registration code) according to key information (such as MAC address, CPU serial number and hard disk serial number) of a user machine, the user sends the registration certificate to a software provider, the software provider generates an activation code through the registration certificate after receiving the registration certificate and sends the activation code to the user, the user inputs the activation code after receiving the activation code, and the software system completes authorization. Both the two modes require cloud participation, software manufacturers are required to prepare cloud servers, and technical complexity and cost of the scheme are increased. When the client is activated, the client must be connected with an external network, otherwise, the software authentication work cannot be completed.
Disclosure of Invention
Therefore, embodiments of the present invention provide a method, an apparatus, and a device for preventing unauthorized use of software, so as to solve the problem in the prior art that it is impossible to determine whether software is authorized to run because an external network cannot be connected.
In order to achieve the above object, the embodiments of the present invention provide the following technical solutions:
according to a first aspect of embodiments of the present invention, a method for preventing unauthorized use of software, applied to a hardware device on which the software is to be installed, includes:
acquiring a related authorization file of the software;
acquiring the expiration date and valid device identification information of the software from the authorization file;
acquiring current time and hardware identification information of hardware equipment to be operated by software;
according to the current time and hardware identification information of the hardware equipment to be operated by the software; and the expiration date and the valid device information of the software judge whether the software is allowed to run.
In one embodiment, according to the current time and hardware identification information of the hardware device to be operated by the software; and the expiration date and the valid device information of the software judge whether to run the software, including:
and determining to allow the software to run if the current time is within the expiration date range and the valid device information is the same as the hardware identification information of the hardware device on which the software is to run.
In one embodiment, according to the current time and hardware identification information of the hardware device to be operated by the software; and the expiration date and the valid device identification information of the software judge whether the software runs, including:
if the current time is not within the expiration date range; or, if the valid device identification information is different from the hardware identification information of the hardware device to be operated by the software, determining that the software is not allowed to operate.
In one embodiment, obtaining an associated authorization file for software includes: generating an authorization file according to an input file of the software; wherein the input file contains an expiration date and valid device identification information.
In one embodiment, generating the authorization file from the input file of the software comprises: and encrypting the input file by using an encryption algorithm to obtain an authorization file.
According to a second aspect of the embodiments of the present invention, an apparatus for preventing unauthorized use of software is applied to a hardware device to which the software is to be installed, and includes:
the acquisition module is used for acquiring the related authorization file of the software;
acquiring the expiration date and valid device identification information of the software from the authorization file;
acquiring current time and hardware identification information of hardware equipment to be operated by software;
the judging module is used for identifying the hardware equipment to be operated according to the current time and the hardware identification information of the hardware equipment to be operated by the software; and the expiration date and the valid device information of the software judge whether the software is allowed to run.
In one embodiment, the determining module is further configured to determine that the software is allowed to run if the current time is within the expiration date range and the valid device information is the same as the hardware identification information of the hardware device on which the software is to run.
In one embodiment, the determining module is further configured to, if the current time is not within the expiration date range; or, if the valid device identification information is different from the hardware identification information of the hardware device to be operated by the software, determining that the software is not allowed to operate.
In one embodiment, the obtaining module is further configured to generate an authorization file according to an input file of the software; wherein the input file contains an expiration date and valid device identification information.
In an embodiment, the obtaining module is further configured to encrypt the input file with an encryption algorithm to obtain an authorization file.
According to a third aspect of an embodiment of the present invention, an apparatus for preventing unauthorized use of software, includes: at least one processor and at least one memory;
the memory is to store one or more program instructions;
the processor, configured to execute one or more program instructions, is configured to perform the following steps:
acquiring a related authorization file of the software;
acquiring the expiration date and valid device identification information of the software from the authorization file;
acquiring current time and hardware identification information of hardware equipment to be operated by software;
according to the current time and hardware identification information of the hardware equipment to be operated by the software; and the expiration date and the valid device information of the software judge whether the software is allowed to run.
In one embodiment, the processor is further configured to determine to allow the software to run if the current time is within the expiration date range and the valid device information is the same as the hardware identification information of the hardware device on which the software is to run.
In one embodiment, the processor is further configured to, if the current time is not within the expiration date range; or, if the valid device identification information is different from the hardware identification information of the hardware device to be operated by the software, determining that the software is not allowed to operate.
In one embodiment, the processor is further configured to generate an authorization file from an input file of the software; wherein the input file contains an expiration date and valid device identification information.
In one embodiment, the processor is further configured to encrypt the input file with an encryption algorithm to obtain an authorization file.
According to a fourth aspect of embodiments herein, a computer readable storage medium having one or more program instructions embodied therein for being executed by a method according to any one of the preceding claims.
The embodiment of the invention has the following advantages: whether the software is allowed to run is judged according to the current time, the hardware identification information of the hardware equipment to be run by the software, the expiration date and the valid equipment information; therefore, the authorization check of the software is completed locally on the hardware device, networking is not required, and in the prior art, if the device cannot be networked and the software cannot be authenticated, the software is not authorized on the device but is used. The method can realize the authentication and verification of the software locally on the equipment without networking, and solves the problem that the software cannot be verified when the equipment cannot be networked in the prior art.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It should be apparent that the drawings in the following description are merely exemplary, and that other embodiments can be derived from the drawings provided by those of ordinary skill in the art without inventive effort.
The structures, ratios, sizes, and the like shown in the present specification are only used for matching with the contents disclosed in the specification, so that those skilled in the art can understand and read the present invention, and do not limit the conditions for implementing the present invention, so that the present invention has no technical significance, and any structural modifications, changes in the ratio relationship, or adjustments of the sizes, without affecting the functions and purposes of the present invention, should still fall within the scope of the present invention.
FIG. 1 is a flowchart of a method for preventing unauthorized use of software according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of an exemplary engineering demoproject logic structure for preventing unauthorized software application according to an embodiment of the present invention;
FIG. 3 is a schematic structural diagram of an apparatus for preventing unauthorized software use according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an apparatus for preventing unauthorized software use according to an embodiment of the present invention.
In the figure: 20-Application; 22-a first module libauth; 23-a second module libpal; 24-configuration file config; 31-an acquisition module; 32-a judgment module; 41-a processor; 42-memory.
Detailed Description
The present invention is described in terms of particular embodiments, other advantages and features of the invention will become apparent to those skilled in the art from the following disclosure, and it is to be understood that the described embodiments are merely exemplary of the invention and that it is not intended to limit the invention to the particular embodiments disclosed. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The present application proposes a method for preventing software from unauthorized use, which is shown in the flowchart of a method for preventing software from unauthorized use shown in fig. 1; the method is applied to a hardware device to which software is to be installed, and comprises the following steps:
step S101, acquiring a related authorization file of software;
the authorization file can be obtained by using the input file generation mode.
The input file comprises the expiration date and the valid equipment identification information of the software; the authorization file also contains the expiration date of the software and valid device identification information. When the input file is generated into the authorization file, the encryption may be performed by using an encryption algorithm, for example, using a hash encryption algorithm to perform encryption, so as to obtain the authorization file. Because the authorization file is obtained after being encrypted by the encryption algorithm, the security of the authorization file is improved. Even if the authorization file is obtained by a lawless person, the authorization file cannot be cracked due to the absence of the secret key. Expiration date and valid device identification information of the software therein cannot be obtained.
Step S102, acquiring the expiration date and valid equipment identification information of the software from the authorization file;
the expiration date refers to a valid time parameter for software usage, and specifically a maximum time threshold for usage. The effective equipment identification information is the preset identification of the equipment operated by the software;
the valid device identifier includes, but is not limited to, one or more of the following: media access Control (media access Control MAC) address, CPU serial number, hard disk serial number.
Step S103, acquiring the current time and the hardware identification information of the hardware equipment to be operated by the software;
the hardware identification information of the hardware device on which the software is to run includes, but is not limited to, one or more of the following: MAC address, CPU serial number, hard disk serial number.
Step S104, according to the current time and the hardware identification information of the hardware equipment to be operated by the software; and the expiration date and the valid device information of the software judge whether the software is allowed to run.
In one embodiment, according to the current time and hardware identification information of the hardware device to be operated by the software; and judging whether the software is operated or not according to the expiration date and the valid device information of the software, and adopting the following steps:
and determining to allow the software to run if the current time is within the expiration date range and the valid device information is the same as the hardware identification information of the hardware device on which the software is to run.
If the current time is not within the expiration date range; or, if the valid device identification information is different from the hardware identification information of the hardware device to be operated by the software, determining that the software is not allowed to operate.
Examples are as follows: assume that the current date is 2019, 1 month, 1 day; and the expiration date is 12 months and 1 day 2018; the current date is not within the expiration date range; overrun, so software is not allowed to run; or, if the valid device identification information is the MAC address of the computer, 08:00:27:02: f3: 09; the MAC address of the hardware device to be operated by the software is 08:00:27:02: f3: 08; comparing to obtain different MAC addresses; software is not allowed to run on the hardware device. If the current date and the identification information of the hardware equipment both meet the conditions, allowing the software to run; if the current date is before the expiration date and the identification of the hardware device on which the software is to be installed is the same as the valid device identification information; it is determined that software can run on the hardware device.
In one embodiment, obtaining an associated authorization file for software includes: generating an authorization file according to an input file of the software; wherein the input file contains an expiration date and valid device identification information.
The input file may be encrypted by an encryption algorithm to obtain an authorization file. Even if the authorization file is acquired by a lawless person, the expiration date and valid device identification information carried therein cannot be acquired. The safety is improved.
The following describes a specific implementation architecture of the present invention, referring to an exemplary engineering demoproject logical structure diagram for preventing unauthorized software usage shown in fig. 2; the structure includes: application20, first module libauth22, second module libpal23 and configuration file config 24;
wherein, the Application20 calls a first module libauth 22; the first module libauth22 calls the second module libpal23 and the authorization file auth.
The function of the second module, libpal23, is to extract features of hardware devices, including: the MAC address and the current time of the hardware device are sent to the first module libauth22 as input. The configuration file config24 stores therein an authorization file auth.
The first module libauth22 obtains the preset MAC address and deadline of valid hardware from the configuration file config/auth.bin through inverse cryptography transformation;
comparing the MAC address and deadline of the effective hardware with the MAC address and current time of the hardware equipment extracted by a second module, namely, libpal 23; if the MAC addresses are consistent and the current time does not exceed the expiration date; application20 is allowed to run, otherwise application is not allowed to run.
In one embodiment, a specific implementation reference example of the second module libauth22 is as follows:
authorization checking function:
int check_authority(void);
inputting parameters: is free of
And returning a value: 0 represents that the software can run by checking the authorization;
-1 represents a machine unique identification code pair;
-2 represents that the unique identification code is correct but the authorization is overdue;
-3 represents an error in the authorization file;
the authorization check function described above should be invoked at all important nodes of the software application to confirm whether the end-user's machine is authorized to use the software.
The invention discloses a component technology, which is not a separate application, but a component embedded in application software and can help the application software to realize use authorization. The application software can be fixed on one device, and the service time of the application software can be controlled. The application software can not be used when the application software is transmitted to other equipment or is on the equipment but exceeds the authorized time. Therefore, software can be prevented from being stolen and even sold, and a business model of deploying one machine for charging money in one day can be brought to application software.
In correspondence with the above method, the present application also discloses an apparatus for preventing unauthorized use of software, which is applied to a hardware device to which software is to be installed, and is shown in fig. 3, and the apparatus includes:
an obtaining module 31, configured to obtain an authorization file related to software;
acquiring the expiration date and valid device identification information of the software from the authorization file;
acquiring current time and hardware identification information of hardware equipment to be operated by software;
the judging module 32 is configured to determine, according to the current time and hardware identification information of the hardware device on which the software is to operate; and the expiration date and the valid device information of the software judge whether the software is allowed to run.
In one embodiment, the determining module 32 is further configured to determine to allow the software to run if the current time is within the expiration date range and the valid device information is the same as the hardware identification information of the hardware device on which the software is to run.
In one embodiment, the determining module 32 is further configured to, if the current time is not within the expiration date range; or, if the valid device identification information is different from the hardware identification information of the hardware device to be operated by the software, determining that the software is not allowed to operate.
In one embodiment, the obtaining module 31 is further configured to generate an authorization file according to an input file of the software; wherein the input file contains an expiration date and valid device identification information.
In one embodiment, the obtaining module 31 is further configured to encrypt the input file with an encryption algorithm to obtain an authorization file.
The application also discloses a device for preventing software from being used without authorization, which is shown in the structural schematic diagram of the device for preventing software from being used without authorization shown in figure 4; the apparatus comprises: at least one processor 41 and at least one memory 42;
the memory 42 is for storing one or more program instructions;
the processor 41 is configured to execute one or more program instructions to perform the following steps:
acquiring a related authorization file of the software;
acquiring the expiration date and valid device identification information of the software from the authorization file;
acquiring current time and hardware identification information of hardware equipment to be operated by software;
according to the current time and hardware identification information of the hardware equipment to be operated by the software; and the expiration date and the valid device information of the software judge whether the software is allowed to run.
In one embodiment, the processor 41 is further configured to determine to allow the software to run if the current time is within the expiration date range and the valid device information is the same as the hardware identification information of the hardware device on which the software is to run.
In one embodiment, the processor 41 is further configured to, if the current time is not within the expiration date range; or, if the valid device identification information is different from the hardware identification information of the hardware device to be operated by the software, determining that the software is not allowed to operate.
In one embodiment, the processor 41 is further configured to generate an authorization file according to an input file of the software; wherein the input file contains an expiration date and valid device identification information.
In one embodiment, the processor 41 is further configured to encrypt the input file with an encryption algorithm to obtain an authorization file.
The invention also provides a computer readable storage medium having embodied therein one or more program instructions for being executed to perform a method as claimed in any one of the preceding claims.
(1) The invention can realize the software use authorization locally, does not need the participation of a cloud server, does not need the connection of user equipment to an external network, reduces the technical complexity and the realization cost of the system, and increases the reliability of the system.
(2) The invention is realized in the form of software components, and can be flexibly embedded into various software systems of clients.
(3) The invention can fix the host software on one device for a preset time, thereby preventing the host software from being stolen and sold.
In various commercial software in the future, the component technology described by the invention can be adopted to realize software use authorization, so that the software is prevented from being stolen and sold.
Although the invention has been described in detail above with reference to a general description and specific examples, it will be apparent to one skilled in the art that modifications or improvements may be made thereto based on the invention. Accordingly, such modifications and improvements are intended to be within the scope of the invention as claimed.

Claims (10)

1. A method for preventing unauthorized use of software, applied to a hardware device on which the software is to be installed, the method comprising:
acquiring a related authorization file of the software;
acquiring the expiration date and valid device identification information of the software from the authorization file;
acquiring current time and hardware identification information of hardware equipment to be operated by software;
according to the current time and hardware identification information of the hardware equipment to be operated by the software; and the expiration date and the valid device information of the software judge whether the software is allowed to run.
2. The method of claim 1, wherein the hardware identification information of the hardware device to be operated by the software is determined according to the current time; and the expiration date and the valid device information of the software judge whether to run the software, including:
and determining to allow the software to run if the current time is within the expiration date range and the valid device information is the same as the hardware identification information of the hardware device on which the software is to run.
3. The method of claim 1, wherein the hardware identification information of the hardware device to be operated by the software is determined according to the current time; and the expiration date and the valid device identification information of the software judge whether the software runs, including:
if the current time is not within the expiration date range; or, if the valid device identification information is different from the hardware identification information of the hardware device to be operated by the software, determining that the software is not allowed to operate.
4. The method of claim 1, wherein obtaining the associated authorization file for the software comprises: generating an authorization file according to an input file of the software; wherein the input file contains an expiration date and valid device identification information.
5. The method of claim 4, wherein generating the authorization file from the input file of the software comprises: and encrypting the input file by using an encryption algorithm to obtain an authorization file.
6. An apparatus for preventing unauthorized use of software, applied to a hardware device on which the software is to be installed, comprising:
the acquisition module is used for acquiring the related authorization file of the software;
acquiring the expiration date and valid device identification information of the software from the authorization file;
acquiring current time and hardware identification information of hardware equipment to be operated by software;
the judging module is used for identifying the hardware equipment to be operated according to the current time and the hardware identification information of the hardware equipment to be operated by the software; and the expiration date and the valid device information of the software judge whether the software is allowed to run.
7. The apparatus of claim 6, wherein the determining module is further configured to,
and determining to allow the software to run if the current time is within the expiration date range and the valid device information is the same as the hardware identification information of the hardware device on which the software is to run.
8. The apparatus of claim 6, wherein the determining module is further configured to, if the current time is not within the expiration date range; or, if the valid device identification information is different from the hardware identification information of the hardware device to be operated by the software, determining that the software is not allowed to operate.
9. An apparatus for preventing unauthorized use of software, comprising: at least one processor and at least one memory;
the memory is to store one or more program instructions;
the processor, configured to execute one or more program instructions to perform the method of any of claims 1-5.
10. A computer-readable storage medium having one or more program instructions embodied therein for being executed to perform the method of any one of claims 1-5.
CN201911128111.XA 2019-11-18 2019-11-18 Method, device, equipment and storage medium for preventing software from being used without authorization Pending CN111159656A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911128111.XA CN111159656A (en) 2019-11-18 2019-11-18 Method, device, equipment and storage medium for preventing software from being used without authorization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911128111.XA CN111159656A (en) 2019-11-18 2019-11-18 Method, device, equipment and storage medium for preventing software from being used without authorization

Publications (1)

Publication Number Publication Date
CN111159656A true CN111159656A (en) 2020-05-15

Family

ID=70555939

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911128111.XA Pending CN111159656A (en) 2019-11-18 2019-11-18 Method, device, equipment and storage medium for preventing software from being used without authorization

Country Status (1)

Country Link
CN (1) CN111159656A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111709059A (en) * 2020-06-19 2020-09-25 山东省计算中心(国家超级计算济南中心) Method and system for generating terminal authentication information based on national secret algorithm
CN113139171A (en) * 2021-03-29 2021-07-20 聚融医疗科技(杭州)有限公司 Method and system for controlling software license and hardware license of ultrasonic diagnosis system
CN113778559A (en) * 2021-09-15 2021-12-10 东莞新能安科技有限公司 Software security application method and device and electronic equipment
CN114117362A (en) * 2021-11-23 2022-03-01 中国航空工业集团公司洛阳电光设备研究所 PMA software encryption technology implementation method
CN114172670A (en) * 2020-08-19 2022-03-11 中国电信股份有限公司 Authorization method, device and system
CN114595436A (en) * 2022-03-08 2022-06-07 北京圣博润高新技术股份有限公司 Tool application authorization method, device, electronic device and storage medium
CN114676393A (en) * 2022-05-26 2022-06-28 杭州微帧信息科技有限公司 A software offline authentication method
WO2022242035A1 (en) * 2021-05-21 2022-11-24 长扬科技(北京)有限公司 Software secure application method and apparatus

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140289507A1 (en) * 2006-10-11 2014-09-25 Bassilic Technologies Llc Method and system for secure distribution of selected content to be protected on an appliance-specific basis with definable permitted associated usage rights for the selected content
CN104573475A (en) * 2014-12-31 2015-04-29 乐视网信息技术(北京)股份有限公司 Method and system for authenticating transcoding service program
CN108052802A (en) * 2017-12-06 2018-05-18 杭州同立方软件有限公司 A kind of software for the exploitation of unity3d engines is carried out using USB flash disk using the method authorized
CN109359478A (en) * 2018-12-03 2019-02-19 北京中科晶上科技股份有限公司 Authorization method and system based on encrypted permission file

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140289507A1 (en) * 2006-10-11 2014-09-25 Bassilic Technologies Llc Method and system for secure distribution of selected content to be protected on an appliance-specific basis with definable permitted associated usage rights for the selected content
CN104573475A (en) * 2014-12-31 2015-04-29 乐视网信息技术(北京)股份有限公司 Method and system for authenticating transcoding service program
CN108052802A (en) * 2017-12-06 2018-05-18 杭州同立方软件有限公司 A kind of software for the exploitation of unity3d engines is carried out using USB flash disk using the method authorized
CN109359478A (en) * 2018-12-03 2019-02-19 北京中科晶上科技股份有限公司 Authorization method and system based on encrypted permission file

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111709059A (en) * 2020-06-19 2020-09-25 山东省计算中心(国家超级计算济南中心) Method and system for generating terminal authentication information based on national secret algorithm
CN111709059B (en) * 2020-06-19 2021-06-01 山东省计算中心(国家超级计算济南中心) Method and system for generating terminal authentication information based on national secret algorithm
CN114172670A (en) * 2020-08-19 2022-03-11 中国电信股份有限公司 Authorization method, device and system
CN113139171A (en) * 2021-03-29 2021-07-20 聚融医疗科技(杭州)有限公司 Method and system for controlling software license and hardware license of ultrasonic diagnosis system
WO2022242035A1 (en) * 2021-05-21 2022-11-24 长扬科技(北京)有限公司 Software secure application method and apparatus
CN113778559A (en) * 2021-09-15 2021-12-10 东莞新能安科技有限公司 Software security application method and device and electronic equipment
CN114117362A (en) * 2021-11-23 2022-03-01 中国航空工业集团公司洛阳电光设备研究所 PMA software encryption technology implementation method
CN114595436A (en) * 2022-03-08 2022-06-07 北京圣博润高新技术股份有限公司 Tool application authorization method, device, electronic device and storage medium
CN114676393A (en) * 2022-05-26 2022-06-28 杭州微帧信息科技有限公司 A software offline authentication method

Similar Documents

Publication Publication Date Title
CN111159656A (en) Method, device, equipment and storage medium for preventing software from being used without authorization
CN111708991B (en) Service authorization method, device, computer equipment and storage medium
CN109522726B (en) Authentication method for applet, server and computer readable storage medium
US20200169406A1 (en) Security authentication method and device
US8266684B2 (en) Tokenized resource access
CN1323538C (en) A method and system for dynamic identity authentication
CN112000951B (en) Access method, device, system, electronic equipment and storage medium
CN108616504B (en) A sensor node identity authentication system and method based on the Internet of Things
CN109272617B (en) Unlocking verification method, server, door lock, electronic device and storage medium
CN105915338B (en) Generate the method and system of key
US20080189772A1 (en) Method for generating digital fingerprint using pseudo random number code
CN106452764B (en) A method and cryptographic system for automatic update of identification private key
CN106936588B (en) Hosting method, device and system of hardware control lock
CN108769029B (en) Authentication device, method and system for application system
US11526596B2 (en) Remote processing of credential requests
CN112257093B (en) Authentication method, terminal and storage medium for data object
CN113766450A (en) Vehicle virtual key sharing method, mobile terminal, server and vehicle
CN114598501A (en) Data processing method and device based on Internet of things
CN108881280A (en) Cut-in method, content distribution network system and access system
CN113505353B (en) Authentication method, authentication device, authentication equipment and storage medium
CN112887099B (en) Data signing method, electronic device and computer readable storage medium
JP2020005064A (en) User authority authentication system
CN104135482A (en) Authentication method and device as well as server
CN109951319B (en) Method for backing up lock of manager of encryption equipment and encryption equipment
CN119808030B (en) Software authorization method, device, equipment and medium based on multi-node computer

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200515

RJ01 Rejection of invention patent application after publication