Supercharge Your Innovation With Domain-Expert AI Agents!

Software authorization authentication method

An authentication method and software authorization technology, which can be used in program/content distribution protection, instruments, electrical digital data processing, etc., and can solve problems such as poor reliability.

Pending Publication Date: 2022-01-04
NEWCAPEC ELECTRONICS CO LTD
View PDF1 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of this application is to provide a software authorization authentication method to solve the problem of poor reliability of existing authentication methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software authorization authentication method
  • Software authorization authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Embodiment of software authorization authentication method:

[0030] The main idea of ​​the present invention is that, based on the problem that the existing authentication method needs to obtain the hardware information of the host, which leads to the failure of authorization authentication, the software authorization authentication system of the present invention includes an authorization management platform, an authorization authentication server, and a business system. The business system calls the authorization The authentication server generates the application file, and then sends the application file to the authorization management platform. The authorization management platform generates the authorization activation file based on the application file and sends it to the business system, and then the business system calls the authorization authentication server again to complete the decryption of the authorization activation file, and finally realizes the authoriz...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a software authorization authentication method, and belongs to the technical field of software encryption. The method comprises the following steps: a service system initiates authorization application information to an authorization authentication server, and the authorization authentication server encrypts the authorization application information by using a platform public key to generate an authorization application file; the authorization management platform uses the platform private key to decrypt the authorization application file to obtain authorization application information, further generates authorization opening information, and then uses the platform private key to sign the authorization opening information to generate an authorization opening file; the authorization authentication server verifies the signature of the authorization opening file by using the platform public key and analyzes authorization opening information; and the service system queries authorization information according to the client code, decrypts the authorization information through the software public key and then performs authorization authentication. Hardware information of the host does not need to be obtained in the authorization authentication process, and the reliability of authorization authentication is improved.

Description

technical field [0001] The invention relates to a software authorization authentication method, which belongs to the technical field of software encryption. Background technique [0002] In order to protect their own rights, software developers have carried out various protections for the software. When the client uses the software, it needs to obtain the authorization certification of the software. [0003] At present, the authorization authentication of the software system is realized by obtaining the host hardware information of the user, for example: the Chinese invention patent application document with the application publication number CN 111625783 A, which discloses a software authorization management system based on multi-level encryption , the authentication method includes: firstly, when the software authorization client obtains the registration request of the target software from the user, it forms an application file based on the collection and encryption of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/10G06F21/12G06F21/60
CPCG06F21/105G06F21/12G06F21/602
Inventor 焦征海李冰卢涛崔永刚
Owner NEWCAPEC ELECTRONICS CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More