Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software authentication method and device, processing node and storage medium

An authentication method and a technology of an authentication device, applied in the information field, can solve the problems of increasing the risk of the license issuance mechanism being cracked, the difficulty of changing the form and content, and the difficulty of dynamic adjustment.

Pending Publication Date: 2020-10-20
CHINA MOBILE SUZHOU SOFTWARE TECH CO LTD +1
View PDF1 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 1. The license information stored in the authentication management server may be tampered with, which increases the risk of the license issuance mechanism being cracked;
[0008] 2. There is a possibility of tampering with the certification records, which may cause a license to be reused any number of times, resulting in the problem of multiple sets of valid software;
[0009] 3. The certification process of the license is a static process, and it is difficult to change the form and content after certification, and it is difficult to adjust dynamically

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software authentication method and device, processing node and storage medium
  • Software authentication method and device, processing node and storage medium
  • Software authentication method and device, processing node and storage medium

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0163] This example provides an authentication system consisting of:

[0164] Terminal for software installation. Responsible for the interaction with the blockchain authentication system.

[0165] Authentication module: through the interaction with the blockchain authentication system, send the license information (license) encrypted by the public key and receive the authentication message returned by the blockchain system, and execute the instructions returned by the blockchain authentication system.

[0166] The blockchain authentication system is responsible for authenticating and updating the license information of the management software and storing transaction records, including: smart contract module, state storage database module and transaction information storage module.

[0167] Smart contract module: responsible for monitoring and receiving software license authentication requests and returning authentication results to the software. The license information encr...

example 2

[0171] The software application certification process may include:

[0172] The connection with the nodes in the blockchain system is normal: when the software starts authentication, according to the configured blockchain node server address list, select any node to actively initiate a connection, and send the license encrypted by the public key to the smart contract module of this node Information, if the license information is legal and valid and the remaining number of authentications is greater than 0, the smart contract module responds that the authentication is successful. At this time, the software authentication is successful and the authentication process ends; if the license information is legal and valid but the remaining number of authentications is 0, the smart contract module returns the license If the authentication message with the remaining number of authentications is 0, the license authentication fails; if the license information is invalid, the smart contrac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a software authentication method and device, a processing node and a storage medium. The software authentication method comprises: receiving an authenticationrequest which is sent by a terminal and contains license information of software; based on the block record of the blockchain, obtaining the legality and the remaining life cycle of the license information; if the license information passes the validity verification and the remaining life cycle is greater than zero, determining that the license information is successfully authenticated; if the license information is successfully authenticated, generating a block record containing the license information and the current remaining life cycle of the license information, and adding the block record into a block of a blockchain based on a consensus mechanism; and if the license information is successfully authenticated, sending an authentication success message to the terminal.

Description

technical field [0001] The present invention relates to the field of information technology, in particular to a software authentication method and device, a processing node and a storage medium. Background technique [0002] With the development of network function virtualization (Network Function Virtualization, NFV) technology, the sales form of network equipment has gradually changed from hardware to software. At present, whether it is an individual or an enterprise, the demand for software is getting higher and higher, but pirated and illegal software is becoming more and more rampant, which makes software certification and licensing very important. The more common software authentication method is the license (license) certificate. The user purchases the software installation disk from the merchant to carry the license. The software authentication mechanism can judge whether the user's identity is legal through the license. Only users with legal identities can use the s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12
CPCG06F21/12
Inventor 翁业早
Owner CHINA MOBILE SUZHOU SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products