Off-line available software license centralized security authentication system based on cloud computation, and method of the same

A centralized authentication and security authentication technology, applied in the field of software license centralized security authentication system, can solve the problems of high network environment requirements, inability to detect authentication services, and forged authentication.

Inactive Publication Date: 2012-06-13
FOUNDER INTERNATIONAL CO LTD
View PDF3 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] These technical solutions have the following defects: 1. It is required that the server-side application must be online in real time, and if it is not online, the service will be stopped, and the requirements for the network environment are relatively high
2. Proxy authorization is not supported, and cluster authentication in an offline environment is not supported
3. The message is not encrypted when the remote software application performs authentication, and it is easy to be intercepted for analysis
4. When the authentication server crashes, each client will fail to detect the authentication service, and the service will be interrupted
5. When the authentication server technology is upgraded, the original license may become invalid
6. The authentication client cannot provide a variety of external access interfaces, such as SOA, WEBSevice, DLL, COM, SOCKET; 7. It cannot support both offline and online authorization requirements
8. If the client is used to crack, the client authentication message is intercepted, and it is easy to forge the real authentication message on the client and cause the authentication to be broken

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Off-line available software license centralized security authentication system based on cloud computation, and method of the same
  • Off-line available software license centralized security authentication system based on cloud computation, and method of the same
  • Off-line available software license centralized security authentication system based on cloud computation, and method of the same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0035] Such as figure 1 Shown is a network architecture diagram of a centralized security authentication system for software licenses that can be offline based on cloud computing, including an interconnected network composed of centralized authentication servers, proxy authentication servers, and clients. The centralized authentication server is responsible for producing authorization certificates and authenticating to agents The server or the client issues the authorization certificate; the proxy authentication server is responsible for accepting the authorized proxy authentication of the centralized authentication server and performing the offline authorization service of the client on behalf of the centralized authentication server; when the client is offline, it sends heartbeat detection information to the proxy authentication server The proxy authorization service program performs proxy authentication; or the client confirms the validity of the authorization certificate th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an off-line available software license centralized security authentication system based on cloud computation, comprising an internetwork composed of a centralized authentication server, a proxy authentication server and a client. The system is characterized in that the centralized authentication server is responsible for producing an authorization certificate, and granting the authorization certificate to the proxy authentication server or the client; the proxy authentication server is responsible for accepting the proxy authentication authorization of the centralized authentication server, and acts on behalf of the centralized authentication server to execute an off-line authorization service for the client; in off-line condition, the client sends heartbeat detection information to a proxy authorization service program of the proxy authentication server to perform proxy authentication; or, in on-line condition, the client and the centralized authentication server performs heartbeat detection to check the validity of the authorization certificate. The system simultaneously supports off-line authentication, proxy authentication and on-line authentication.

Description

technical field [0001] The invention belongs to the technical field of Internet security authentication, and in particular relates to a cloud computing-based centralized security authentication system for software licenses and a method thereof. Background technique [0002] There are already some existing technologies such as: [0003] The Chinese patent application whose application number is 200610156463 ​​discloses a network license management method, system, license server and client, in which the validity detection protection time is determined in the license server; within the validity detection protection time, the license server A heartbeat check is performed with a client requesting a license, and when the heartbeat fails, the license server reclaims the license assigned to the client. The invention detects the validity of the license through the heartbeat detection within the validity detection protection time. When the heartbeat detection fails, the license is d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/26
Inventor 谢清
Owner FOUNDER INTERNATIONAL CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products