The invention refers to a software distribution control method and system

06-07-2018 дата публикации
Номер:
CN0108259429A
Принадлежит: Aisino Corp
Контакты:
Номер заявки: 24-11-20165071
Дата заявки: 29-12-2016

[1]

Technical Field

[2]

The invention relates to software control field, and more specifically, relates to a control to software distribution method and system.

[3]

Background Art

[4]

With the continued development of computer technology, an increasing number of computer software program, in order to maintain the developer and the interests of the developers, many software manufacturers choose to use the software authentication or authorization and other technical means to distributing software usage right, so as to obtain software legalization of interests, such as requiring the user to purchase software KEYGEN or use of the software is licensed number and the like, but with the development of technology, software is secondary use and the use of the growing number of cases, many 3rd party using various means has authorized the software adds shell, illegal call, modifying the procedures for the replacement or module, tampering with the content of the program is set up or the like to eliminate this kind of software protection, thereby achieving the normal use or counterfeiting using effect, and benefit from. If the user distribution software licensed number, developer according to the user's purchase of the software pre-generating a licensed number, the user to install software input when the licensed number, program through the on-line or off to the side node authentication, licensed number through the authentication the user is allowed to use, otherwise rejected the use of. The method does not guarantee that the software is not secondary distribution, namely the user on the basis of the development of the new program, the program call normal authorized program function, thereby having the function of the authorization, the authorization program the interests of the developers is damaged. It is also the case when the user is circulated need providing hardware characteristic, the hardware is specific to the authorized user, development manufacturers use hardware features of the authorized products, such authorized software can only be used on fixed hardware equipment, cause user using various not convenient, such as damage to hardware is required after the developer re-authorization and other. In this case, how to effectively protect the software secondary distribution, ensure software in the distribution will not be hacker or illegal person tampering with the procedures secondary distribution has become a pressing work. In order to meet this software distribution protection, the protection of the legitimate rights of the developer, is the need to focus on the problem of the method.

[5]

Content of the invention

[6]

In order to solve the problems existing in the background technology, the invention provides an method of software distribution control, it is used for the distribution of the software prevents the user from 1st to secondary distribution of the software, the method including:

[7]

The licensing process extraction software compiling characteristics and the caller information, and the extracted through the encryption method of the software compiling characteristics and the caller information form an encrypted message, and said software compiling characteristics and the caller information for the digital signature;

[8]

The licensing process through a network including the encrypted message and the contrast of the digital signature sent to the feature request, comparing the request characteristic;

[9]

After obtaining the contrast characteristic request, for digital signature verification, when the digital signature by after verification, to decrypt the encrypted message characteristic, obtaining software compiling characteristics and the caller information; and

[10]

Characteristic of the obtained software compiling characteristics and the caller information with the pre-stored software compiling characteristic and comparing the caller information, when the two are the same, the competence of the program determining to transfer the call, return the response characteristic, the normal use of the procedures; when the two are not the same, the authorization program exit.

[11]

Further, authorization program extraction software compiling characteristics and the caller information before the establishment of the characteristic, the characteristic accessor conveyor belt authorized program is compiled into the software after the compiling the software, to allow the call and secondary by utilizing the authorization procedures of the caller information of the call program and binding software compiling characteristics and the caller information, and the establishment of states the characteristic storehouse authorization procedures and the correlation between the calling program.

[12]

Further, the software compiling features include: compile-time, compiling a SUMMARY of the characteristics of the content, compiling the file size and compile to authorized program for the digital signature to obtain the signature information, said regulating user information includes: the name of the calling program, and the file size of the call program of the version information of the calling program.

[13]

Further, the request to obtain the contrast characteristic, for digital signature verification, when the digital signature does not pass the authentication, authorization from the degree.

[14]

According to the another aspect of the invention, the present invention provides a control to software distribution system, used in the 1st after distribution of the software to the software prevents the user from secondary distribution, the system including:

[15]

Characteristic, it is used for storing authorized program is compiled into the software after the compiling the software, to allow the call and secondary by utilizing the authorization procedures of the caller of the call program of information and binding software compiling characteristics and the caller information, and the establishment of the licensing process and the correlation between the calling program;

[16]

The characteristic extracting unit, it is used for making authorization program fetch software compiling characteristics and the caller information;

[17]

To encrypt the unit, it is used for through encryption method the authorization program extracted software compiling characteristics and the caller information form an encrypted message, and said software compiling characteristics and the caller information for the digital signature; characteristic communication unit, it is used for making authorization program through the network including the encrypted message and the contrast of the digital signature request sent to the characteristic and comparing the request characteristic;

[18]

The decryption unit characterized in that, it is used for obtaining the contrast characteristic request, to verify the digital signature, after passing the validation, decrypting the encrypted message characteristic, obtaining software compiling characteristics and the caller information; and

[19]

Verifying unit, which is used to obtain the characteristic of the software compiling characteristics and the caller information with the pre-stored software compiling characteristic and comparing the caller information, when the two are the same, the competence of the program determining to transfer the call, return the response characteristic, the normal use of the procedures, when the two are not the same, the authorization program exit.

[20]

Further, feature database software compiling features include compile-time, compiling a SUMMARY of the characteristics of the content, compiling the file size and compile to authorized program for the digital signature to obtain the signature information, and caller information includes the name of the calling program, and the file size of the call program of the version information of the calling program.

[21]

Further, the decryption unit characterized in that, when the characteristic of the request to obtain the contrast, for digital signature verification, when the digital signature does not pass the authentication, authorization from the degree.

[22]

Description of drawings

[23]

By reference to the following Figures, can be more complete understanding of the illustrative embodiment of the present invention:

[24]

Figure 1 is the flow chart of the present invention to the specific embodiment of the method of the software distribution control; and

[25]

Figure 2 is the chart of the invention embodiment of the software distribution control system.

[26]

Mode of execution

[27]

Now reference with photos on an exemplary embodiment of the present invention, however, the invention can be used in many different forms to implement, and is not limited to the embodiment described herein, the provision of these embodiments is to detailed and in a fully discloses the invention, and to the belonging to the technical field of technical personnel to fully convey the scope of the invention. For the expressed in the attached drawing of the terminology in the exemplary embodiment of the present invention is not limited. In the attached drawing, the same unit/element using the same marks on the attached drawing.

[28]

Unless otherwise indicated, the terminology used herein (including technological terms) to belongs to the technical field of the technical staff has the meaning generally understood. In addition, it will be understood that, in order to commonly used dictionary defined terms, should be interpreted as the context of the related fields have consistent meaning, but should not be interpreted in an idealized or overly formal sense.

[29]

Figure 1 is the flow chart of the present invention to the specific embodiment of the method of the software distribution control.

[30]

The licensing process extraction software compiling characteristics and the caller information, and the extracted through the encryption method of the software compiling characteristics and the caller information form an encrypted message, and said software compiling characteristics and the caller information for the digital signature;

[31]

The licensing process through a network including the encrypted message and the contrast of the digital signature sent to the feature request, comparing the request characteristic;

[32]

After obtaining the contrast characteristic request, for digital signature verification, when the digital signature by after verification, to decrypt the encrypted message characteristic, obtaining software compiling characteristics and the caller information; and

[33]

Characteristic of the obtained software compiling characteristics and the caller information with the pre-stored software compiling characteristic and comparing the caller information, when the two are the same, the competence of the program determining to transfer the call, return the response characteristic, the normal use of the procedures; when the two are not the same, the authorization program exit.

[34]

Preferably, the authorization program extraction software compiling characteristics and the caller information before the establishment of the characteristic, the characteristic accessor conveyor belt authorized program is compiled into the software after the compiling the software, to allow the call and secondary by utilizing the authorization procedures of the caller information of the call program and binding software compiling characteristics and the caller information, and the establishment of states the characteristic storehouse authorization procedures and the correlation between the calling program.

[35]

Preferably, the software compiling features include: compile-time, compiling a SUMMARY of the characteristics of the content, compiling the file size and compile to authorized program for the digital signature to obtain the signature information, said regulating user information includes: the name of the calling program, and the file size of the call program of the version information of the calling program.

[36]

Preferably, the request to obtain the contrast characteristic, for digital signature verification, when the digital signature does not pass the authentication, authorization from the degree.

[37]

Figure 2 is the chart of the invention embodiment of the software distribution control system.

[38]

Characteristic, it is used for storing authorized program is compiled into the software after the compiling the software, to allow the call and secondary by utilizing the authorization procedures of the caller of the call program of information and binding software compiling characteristics and the caller information, and the establishment of the licensing process and the correlation between the calling program;

[39]

The characteristic extracting unit, it is used for making authorization program fetch software compiling characteristics and the caller information;

[40]

To encrypt the unit, it is used for through encryption method the authorization program extracted software compiling characteristics and the caller information form an encrypted message, and said software compiling characteristics and the caller information for the digital signature; characteristic communication unit, it is used for making authorization program through the network including the encrypted message and the contrast of the digital signature request sent to the characteristic and comparing the request characteristic;

[41]

The decryption unit characterized in that, it is used for obtaining the contrast characteristic request, to verify the digital signature, after passing the validation, decrypting the encrypted message characteristic, obtaining software compiling characteristics and the caller information; and

[42]

Verifying unit, which is used to obtain the characteristic of the software compiling characteristics and the caller information with the pre-stored software compiling characteristic and comparing the caller information, when the two are the same, the competence of the program determining to transfer the call, return the response characteristic, the normal use of the procedures, when the two are not the same, the authorization program exit.

[43]

Preferably, feature database software compiling features include compile-time, compiling a SUMMARY of the characteristics of the content, compiling the file size and compile to authorized program for the digital signature to obtain the signature information, and caller information includes the name of the calling program, and the file size of the call program of the version information of the calling program.

[44]

Preferably, the decryption unit characterized in that, when the characteristic of the request to obtain the contrast, for digital signature verification, when the digital signature does not pass the authentication, authorization from the degree.

[45]

Has been through the above-mentioned embodiment has described the invention. However, one skilled in the art known, as incidental to the Patent claimed, in addition to the invention more than other embodiments disclosed equivalent fall in the scope of the present invention.

[46]

[...], claim all the terminology used in the technical field in accordance with their usual meaning is interpreted, unless where it is in addition clearly defined. All the reference "a/the/the [device, assembly and the like]" are open to interpretation for the device, and at least one of the assembly in one embodiment of the invention, unless otherwise clearly indicated. Any of the methods disclosed herein of the steps is not necessary to open the accurate sequentially operate, unless clearly.



[47]

The invention relates to a kind of the software distribution control method and system, the method comprising: extracting software compiling the authorization procedures and caller information, and through the encryption method will be the characteristic and information form an encrypted message, and the stated features and information for the digital signature; authorization program through the network including the encrypted message and the contrast of the digital signature sent to the feature request, comparing the request characteristic; obtaining contrast request characteristic, for digital signature verification, when the digital signature verification after the, decrypting the encrypted message characteristic, obtaining software compiling characteristics and the caller information; and characteristic of the obtained software compiling characteristics and the caller information with the pre-stored software compiling characteristic and comparing the caller information, when the two are the same, the competence of the program determining to transfer the call, return the response characteristic, the normal use of the procedures; when the two are not the same, the authorization program exit.



1. The invention refers to a method of software distribution control, for 1st after distribution of the software to the software prevents the user from secondary distribution, characterized in that the method comprises:

The licensing process extraction software compiling characteristics and the caller information, and the extracted through the encryption method of the software compiling characteristics and the caller information form an encrypted message, and said software compiling characteristics and the caller information for the digital signature;

The licensing process through a network including the encrypted message and the contrast of the digital signature sent to the feature request, comparing the request characteristic;

After obtaining the contrast characteristic request, for digital signature verification, when the digital signature by after verification, to decrypt the encrypted message characteristic, obtaining software compiling characteristics and the caller information; and

Characteristic of the obtained software compiling characteristics and the caller information with the pre-stored software compiling characteristic and comparing the caller information, when the two are the same, the competence of the program determining to transfer the call, return the response characteristic, the normal use of the procedures; when the two are not the same, the authorization program exit.

2. Method according to Claim 1, characterized in that authorization program extraction software compiling characteristics and the caller information before the establishment of the characteristic, the characteristic accessor conveyor belt authorized program is compiled into the software after the compiling the software, to allow the call and secondary by utilizing the authorization procedures of the caller information of the call program and binding software compiling characteristics and the caller information, and the establishment of states the characteristic storehouse authorization procedures and the correlation between the calling program.

3. Method according to Claim 1, characterized in that said software compiling features include: compile-time, compiling a SUMMARY of the characteristics of the content, compiling the file size and compile to authorized program for the digital signature to obtain the signature information, said regulating user information includes: the name of the calling program, and the file size of the call program of the version information of the calling program.

4. Method according to Claim 1, characterized in that after obtaining the contrast characteristic request, for digital signature verification, when the digital signature does not pass the authentication, authorization from the degree.

5. The invention refers to a software distribution control system, used in the 1st after distribution of the software to the software prevents the user from secondary distribution, characterized in that said system comprises:

Characteristic, it is used for storing authorized program is compiled into the software after the compiling the software, to allow the call and secondary by utilizing the authorization procedures of the caller of the call program of information and binding software compiling characteristics and the caller information, and the establishment of the licensing process and the correlation between the calling program;

The characteristic extracting unit, it is used for making authorization program fetch software compiling characteristics and the caller information;

To encrypt the unit, it is used for through encryption method the authorization program extracted software compiling characteristics and the caller information form an encrypted message, and said software compiling characteristics and the caller information for the digital signature; characteristic communication unit, it is used for making authorization program through the network including the encrypted message and the contrast of the digital signature request sent to the characteristic and comparing the request characteristic;

The decryption unit characterized in that, it is used for obtaining the contrast characteristic request, to verify the digital signature, after passing the validation, decrypting the encrypted message characteristic, obtaining software compiling characteristics and the caller information; and

Verifying unit, which is used to obtain the characteristic of the software compiling characteristics and the caller information with the pre-stored software compiling characteristic and comparing the caller information, when the two are the same, the competence of the program determining to transfer the call, return the response characteristic, the normal use of the procedures, when the two are not the same, the authorization program exit.

6. System according to Claim 5, characterized in that in the feature of the software compiling features include compile-time, compiling a SUMMARY of the characteristics of the content, compiling the file size and compile to authorized program for the digital signature to obtain the signature information, and caller information includes the name of the calling program, and the file size of the call program of the version information of the calling program.

7. System according to Claim 5, characterized in that the characteristic decryption unit, when the characteristic of the request to obtain the contrast, for digital signature verification, when the digital signature does not pass the authentication, authorization from the degree.