Method for utilizing Elagamal public key algorithm to generate software license code

A technology for generating software and public key algorithms, applied to public keys for secure communications, computing, computer security devices, etc.

Inactive Publication Date: 2011-06-29
BEIJING SAFE CODE TECH
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The operation of the PubCMCenter system is very simple, but the functions provided are very comprehensive

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for utilizing Elagamal public key algorithm to generate software license code
  • Method for utilizing Elagamal public key algorithm to generate software license code
  • Method for utilizing Elagamal public key algorithm to generate software license code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Such as image 3 Shown, the embodiment of the present invention is:

[0036] (1) First, the key generation module generates a public key / private key pair with a certain length through a random key generator. The public key is used by the registration code verification module, and the private key is used by the registration code generation module.

[0037] (2) The host ID generation module calculates a fixed-length ID according to the hardware information of the host (disk serial number, physical address of the network card and other unique hardware host identifiers) and a random number Rand. The software user hands over the host ID to the software developer.

[0038] (3) The registration code calculation module calculates the corresponding registration code according to the host ID and the random number Rand, and the registration code is the digital signature of the host ID, which is signed using the private key provided by the key generation module. The software dev...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for utilizing Elagamal public key algorithm to generate a software license code to solve the problem of the software license code. The method comprises steps as follows: a cipher key generating module generates a public key/private key pair with a certain length through a random cipher key generator; secondly, a host computer ID generating module computes an ID with a fixed length according to the hardware information of the host computer and by combining with a random number Rand, and a software user submits the host computer ID to a software developer; a license code computing module computes a corresponding license code according to the host computer ID and the random number Rand, the private key provided by the cipher key generating module is used for signing, and the software developer submits an ordered pair, namely, the ID and the license code, to the user; and the legality of the ID must be determined at first by a license code verification module before operating the software program, and if the ID is illegal, the program terminates.

Description

technical field [0001] The invention relates to the technology of software safety, in particular to the safety of software registration codes and the problems of software anti-piracy. Background technique [0002] In the commonly used registration technology, the process of generating the registration code or serial number on the software vendor's side and the verification process on the user's side are often symmetrical, and crackers may obtain the registration code generation algorithm by tracking and debugging the verification process. Using asymmetric key encryption mechanism to realize software registration can better solve the inherent problems in traditional registration methods. Software developers choose a public key signature algorithm to realize registration code generation. The private key is used to generate a digital signature for the ID, which is used as the registration code of the software. Such as figure 1 As shown, the registration code signature include...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00H04L9/30G06F21/12
Inventor 郑强辛阳杜晓峰包一兵
Owner BEIJING SAFE CODE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products