Software network authentication binding method and system

A technology of network authentication and software, applied in transmission systems, electrical components, etc., can solve problems such as easy to be illegally embezzled, unreliable software authentication, etc., and achieve the effect of preventing embezzlement and improving reliability

Inactive Publication Date: 2016-08-17
MEDELI ELECTRONICS SHANGHAI
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the above-mentioned shortcomings of the prior art, the purpose of the present invention is to provide a software network authentication binding method and system for solving the problem of unreliable software authentication in the prior art and easy to be illegally embezzled

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software network authentication binding method and system
  • Software network authentication binding method and system
  • Software network authentication binding method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] Such as figure 1 As shown, this embodiment discloses a network authentication binding method for software when the client runs the software, which is implemented through a software authentication binding system on the terminal side, specifically including:

[0062] Step S11, after receiving the running instruction of the software, send a verification request to the network server corresponding to the software:

[0063] When the software authentication binding system on the terminal side receives the software running instruction from the client, it will automatically read the machine code of the client running the software; and send a verification request to the network server through the client.

[0064] Wherein, the machine code is obtained by processing the hardware code of the client; and the hardware code can uniquely identify the client, including but not limited to the serial number of the machine, the MAC address of the network card, or the time stamp of software...

Embodiment 2

[0091] This embodiment also discloses a software network authentication binding method when the client runs the software, which is realized by a software authentication binding system on the terminal side. The network authentication binding method of the software in this embodiment is exactly the same as step S11 and step S12 of the network authentication binding method in embodiment 1, only in order to further ensure that the software and the client are not attacked by the counterfeit server, in step S13 ~ Step S15 is slightly changed.

[0092] Step S13, open the software, input the user information, and encrypt the result of the first decryption process, the user information, the relevant information (machine code) of the client, and the second random character string randomly generated by the client to generate the second random character string. an authentication code;

[0093] Wherein, the second random character string is randomly generated by the software authenticatio...

Embodiment 3

[0103] This embodiment discloses a terminal-side software authentication binding system 500, such as Figure 5 shown, including:

[0104] A verification request sending module 510, configured to send a verification request to the network server 100 corresponding to the software after receiving the running instruction of the software;

[0105] The receiving module 520 is configured to receive feedback information fed back from the network server 100; the feedback information includes an encrypted first random string generated by the network server 100 and a verification result;

[0106] The processing module 530 is configured to perform a first decryption process on the received encrypted first random character string, and generate a first authentication code.

[0107] Wherein, the first authentication code is generated by encrypting the result of the first decryption process, user information and related information of the client;

[0108] The first authentication code is ge...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a software network authentication binding method and system, which are executed by the cooperation of the client and the network server: when the software is running on the client, it sends a verification request to the network server; according to the verification request, the network server randomly generates the first Random character strings, encrypted and fed back to the client; the client performs the first decryption process, and encrypts the decryption result, user information and client machine code to generate the first authentication code, and sends the first authentication code to the network Server; the network server performs a second decryption process on the first authentication code, and verifies the result of the second decryption process, and feeds back the verification result to the client. Run the software through the client. The invention not only protects the network server from the attack of the pirated software, but also protects the software from the attack of the counterfeit server, and improves the reliability of the legal authentication of the software.

Description

technical field [0001] The invention relates to a network data processing technology, in particular to a software network authentication binding method and system applied in the field of music teaching. Background technique [0002] In order to protect their copyright interests, network software publishers usually use registered user names and passwords, or registered serial numbers as software signs for authentication, so as to prevent people who are not qualified to use the software from stealing the software. [0003] It is more common to use user name and password for authentication between software and computer, which can prevent the software from being stolen to a certain extent, and is relatively convenient to use, and as long as the user name and password are correct, the software can be used on different computers. However, user names and passwords are easy to be stolen, and the software can be used on different computers, which also leads to data leakage. [0004]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/083H04L63/0876H04L63/145H04L2463/103
Inventor 郑文筠周昊来
Owner MEDELI ELECTRONICS SHANGHAI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products