Software authorization system based on public key cryptosystem

A public key cryptography system and software authorization technology, applied in the field of software authorization system based on public key cryptography system, can solve the problems of inability to effectively manage authorization information, difficulty in upgrading, tracking and after-sales management, inability to realize trial version and on-demand purchase, etc. problem, achieve the effect of preventing illegal copying and facilitating upgrade

Active Publication Date: 2014-01-01
HUAZHONG NORMAL UNIV
View PDF7 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, as the use of the Internet becomes more and more popular, many shortcomings are also exposed: 1) It is suitable for traditional one-time permanent authorization, and trial versions and on-demand purchases cannot be realized; 2) The existence of hardware brings additional production and initialization , logistics, installation and maintenance costs; 3) installation of drivers and client components and additional hardware devices affect customer experience; 4) electronic distribution based on the Internet cannot be realized; 5) it is difficult to perform upgrades, tracking and after-sales management
However, the current license file authorization mechanism still has obvious deficiencies in the use of institutional management environments, and it cannot realize modular authorization by user level
The organization administrator role cannot effectively manage the authorization information of ordinary users under it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software authorization system based on public key cryptosystem
  • Software authorization system based on public key cryptosystem
  • Software authorization system based on public key cryptosystem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0038] The embodiment of the present invention is based on the software authorization system of the public key cryptosystem, such as figure 1 As shown, including server and client, where:

[0039] The server side includes:

[0040] The institution authorization certificate generation module is used to encrypt and generate the institution authorization certificate according to the application information of the institution user; the institution authorization certificate is generated by the server end according to the application information of the institution user, and is provided to the institutio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a software authorization system based on public key cryptosystem. The software authorization system comprises a server end and a client end, wherein the server end comprises an institution authorization certification generation module, a receiving module, a verification module and a user authorization certificate generation module. The user authorization certificate generation module comprises a digital signing module used for carrying out digital signing on computer hardware characteristics h0 in a user registration file with an RSA private key to generate S0, an encryption string generation module used for carrying out preset hybrid operations on obtained software version information v, user information u, an authorization term ex, current time cur and s0 to generate an encryption string signB64 and a certificate generation module used for generating a user authorization certificate with the encryption string signB64 and the RSA public key. The method can prevent software from being illegally copied, meanwhile, the software can be managed by a software issuer in a concentrated mode, and upgrading and tracking of the software, pushing personalized services for users and other after-sale management are facilitated.

Description

technical field [0001] The invention relates to a software authorization method, in particular to a software authorization system based on a public key cryptosystem. Background technique [0002] The existence of piracy has become an important factor restricting the development of the computer software industry. Software is easy to copy and the copy cost is low. Now companies urgently need to take technical measures to protect their copyrights. Therefore, it is of great practical significance to study and design an effective, practical and secure software authorization method. [0003] In public key cryptography, the encryption key is different from the decryption key. Among all public key cryptosystems so far, the RSA algorithm is the most famous and widely used one. The RSA algorithm solves the problem of using the public channel transmission and distribution of the key of the symmetric encryption algorithm well. It can also use the RSA algorithm to complete the digital ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32G06F21/10
CPCG06F8/71G06F8/60G06F8/65G06F21/602G06F2221/2107H04L9/006H04L9/3263H04L63/0823
Inventor 张昭理杨宗凯刘三女牙易宝林舒江波孙建文郑婷彭晛
Owner HUAZHONG NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products