Software authorization method based on public key cryptosystem

A public key cryptography system and software authorization technology, applied in the field of software authorization based on the public key cryptography system, can solve problems such as inability to effectively manage authorization information, difficulty in upgrading, tracking and after-sales management, and inability to realize electronic distribution based on the Internet. Achieve the effect of preventing illegal copying and facilitating upgrades

Active Publication Date: 2014-01-01
HUAZHONG NORMAL UNIV
View PDF3 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, as the use of the Internet becomes more and more popular, many shortcomings are also exposed: 1) It is suitable for traditional one-time permanent authorization, and trial versions and on-demand purchases cannot be realized; 2) The existence of hardware brings additional production and initialization , logistics, installation and maintenance costs; 3) installation of drivers and client components and additional hardware devices affect customer experie

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software authorization method based on public key cryptosystem
  • Software authorization method based on public key cryptosystem
  • Software authorization method based on public key cryptosystem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0031] Such as figure 1 As shown, the embodiment of the present invention is based on the software authorization method of the public key cryptosystem, comprising the following steps:

[0032] S1. The server side receives the organization authorization certificate and the registration document from the client side;

[0033] The agency authorization certificate is encrypted and generated by the server according to the application information of the agency user, and is provided to the agency user for management and storage. The agency user distributes it to individual software users. Perform author...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a software authorization method based on public key cryptosystem. The method includes the following steps: a server end receives an institution authorization certificate and a registration file sent by a client; the server end decrypts the received institution authorization certificate and verifies decrypted information, if the information passes the verification, the registered file is encrypted, and a user authorization certificate is generated and returned to the client; when a customer starts software, the software end encrypts and verifies the user authorization certificate, if the decryption and the verification are successful, the software is started, and otherwise, the software is not started. The method can prevent the software from being illegally copied, meanwhile, the software can be managed by a software issuer in a concentrated mode, and upgrading and tracking of the software, pushing personalized services for users and other after-sale management are facilitated.

Description

technical field [0001] The invention relates to a software authorization method, in particular to a software authorization method based on a public key cryptosystem. Background technique [0002] The existence of piracy has become an important factor restricting the development of the computer software industry. Software is easy to copy and the copy cost is low. Now companies urgently need to take technical measures to protect their copyrights. Therefore, it is of great practical significance to study and design an effective, practical and secure software authorization method. [0003] In public key cryptography, the encryption key is different from the decryption key. Among all public key cryptosystems so far, the RSA algorithm is the most famous and widely used one. The RSA algorithm solves the problem of using the public channel transmission and distribution of the key of the symmetric encryption algorithm well. It can also use the RSA algorithm to complete the digital ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32G06F21/10
Inventor 张昭理杨宗凯刘三女牙易宝林舒江波孙建文郑婷彭晛
Owner HUAZHONG NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products