Secure and confidential offline software registration authorization method

A software registration, security and confidentiality technology, applied in the direction of program/content distribution protection, platform integrity maintenance, etc., can solve the problems of unable to uniformly manage authorized software registration information, easy to lose, waste of manpower, etc., to achieve encryption and transmission mode guarantee, Easy to see the effect of supervision

Inactive Publication Date: 2019-06-07
JIANGSU BOZHI SOFTWARE TECH CO LTD
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, the computers used in confidential products are often offline confidential computers isolated from the network. There are two traditional authorization methods for application software in confidential hosts: one is KEY binding authorization, and the use of KEY can not only manage authorization in a unified manner The software registration information is easy to lose; another authorization method is manual authorization, which needs to generate a registration file on the host (client) first, export it from a storage medium such as a CD or U disk, and import the registration information to the management end (server) Generate an authorization file, and then return to the software host (client) to import the authorization file for formal authorization. The operation is cumbersome and wastes manpower, and due to the direct contact between the storage medium and the confidential machine, the problem of security risks is becoming more and more obvious.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure and confidential offline software registration authorization method
  • Secure and confidential offline software registration authorization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Below in conjunction with accompanying drawing, the present invention is further elaborated:

[0021] A safe and confidential off-line software registration and authorization method, its specific implementation examples are as follows:

[0022] Such as figure 1 As shown, the working steps are as follows: (1) Generate registration information: obtain multiple unique identification information of the host device and perform special splicing, the user enters the registration information such as the company name and then splices with the unique host ID; the above information data Use RSA to encrypt AES key + AES encrypted text, which is a combination of irreversible and reversible encryption; the encrypted string generates a QR code image and displays it on the interface; use physical devices to analyze and identify the QR code locally ;(2) Generate registration code: When the registration management terminal receives the need to register the software, it will enter the en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Confidential software products installed and used by a confidential host in a national security and confidentiality place basically need to be authorized and verified. The invention provides a secureand confidential offline software registration authorization method. Authorization software registration information can be managed at a management end in a unified manner, the whole process is physically isolated from a host, and the potential safety hazard that a storage medium is in direct contact with a secret-related machine in the authorization process is avoided. The security and confidentiality offline software registration authorization method comprises: when the software needs registration authorization, obtaining a unique identifier of the equipment, performing special splicing, reversible and irreversible encryption to generate a registration two-dimensional code, performing local analysis and identification on the two-dimensional code by using physical equipment, performing analysis and decryption by using a management end, performing encryption by using a private algorithm to generate a registration code, and inputting the registration code by the software to perform registration verification authorization; when software needs to migrate or replace hardware equipment, a logout two-dimensional code is generated through encryption, the two-dimensional code is locally analyzed and recognized through physical equipment, a management end analyzes and recovers software authorization, the hardware equipment is migrated or replaced after success, and the hardware equipment can be reused after re-registration.

Description

technical field [0001] The invention relates to the field of computer safety and security, in particular to a system requiring both physical isolation and authorized management among security products. Background technique [0002] At present, the computers used in confidential products are often offline confidential computers isolated from the network. There are two traditional authorization methods for application software in confidential hosts: one is KEY binding authorization, and the use of KEY can not only manage authorization in a unified manner The software registration information is easy to lose; another authorization method is manual authorization, which needs to generate a registration file on the host (client) first, export it from a storage medium such as a CD or U disk, and import the registration information to the management end (server) Generating the authorization file, and then returning to the software host (client) to import the authorization file for f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/57
Inventor 傅涛王力郑轶邓楠
Owner JIANGSU BOZHI SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products