Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software lease authorization method based on attribute encryption

A technology of attribute encryption and software authorization, applied in the fields of instruments, digital data processing, computer security devices, etc., can solve the problems of complex leasing process, unable to provide effective protection measures, unable to solve software leasing security problems, etc., to achieve high security sexual effect

Inactive Publication Date: 2012-12-05
HARBIN CONCORD ISLAND DIGITAL SCI & TECH
View PDF2 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These security protection schemes cannot solve all the security problems in software leasing, especially in the case of multi-party joint leasing, that is, the "many-to-one" and "many-to-many" models composed of multiple lessors and one or more lessees
Existing solutions cannot provide effective protection measures for these software leasing businesses with complex leasing process, various forms of use restrictions, and multi-party interest division.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software lease authorization method based on attribute encryption
  • Software lease authorization method based on attribute encryption
  • Software lease authorization method based on attribute encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The present invention will be further described in detail below in conjunction with accompanying drawings and examples. This paper proposes a software authorization method based on attribute encryption. The basic principle is as follows: figure 1 shown. Attribute-based encryption is an extension of identity-based encryption, where identities (public keys) are represented by a series of descriptive attributes and a more flexible access structure is added. Attribute-based encryption has the characteristics of "one-to-many" and fuzzy identity. The encryptor encrypts the message with a set of attributes, and the user who has the private key corresponding to these attributes can decrypt the message.

[0014] (1) Initialization of the attribute-based encryption system.

[0015] The private key generation center PKG (generally acted by the software owner) sets the lease member set as U={u 1 , u 2 ,...u |U|}, the number of members is |U|. The attribute set is W. The acce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to software security protection problems in the software lease industry, in particular to multi-party joint authorization and access control of the leased software under the condition that multi-party economic benefits are related. According to the invention, 'many-to-one' and 'many-to-many' software lease business modes consisting of a plurality of leasers and one or more leasers are considered, a public key cryptosystem based on the attribute encryption is applied to the software security protection, a multi-party joint software authorization method based on the attribute encryption is provided, and software authorization and access control in the software lease process are realized. Registration codes are generated by employing a dual encryption strategy, hardware encryption lock equipment is combined to realize the multi-party joint software authorization, and a flexible and complex authorization rule is supported; and moreover, the actual requirements of software leasing business under circumstances of complex leasing process, diversified service restriction forms and involvement of multi-party benefit division can be well met.

Description

technical field [0001] The invention relates to a software security problem in the software leasing industry, in particular to multi-party joint authorization and access control of leased software under the condition of multi-party economic interests. Background technique [0002] Software leasing means that users can use the software system they need or apply related software functions through the Internet through leasing instead of purchasing. The lease authorization of software is an important way to guarantee the legitimate rights and interests of the lessor. However, in the actual market, software owners often cannot directly target leasing customers, and many intermediaries or sales agencies are involved in the middle, which makes it difficult to guarantee the interests and safety of all parties in the software leasing process. Therefore, in addition to realizing the basic copyright protection measures that each set of software is authorized to be used on a computer, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22
Inventor 付小晶郭阿瑶
Owner HARBIN CONCORD ISLAND DIGITAL SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products