Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Protecting method and protecting system for authentication server software copyright

An authentication server, copyright protection technology, applied in transmission systems, instruments, electrical components, etc., can solve problems such as troublesome license upgrades, and achieve the effect of protecting intellectual property rights and simple maintenance

Active Publication Date: 2012-11-14
GCI SCI & TECH
View PDF4 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The authentication server is a device that provides access to the authentication server for Internet terminals and network access devices. Its main functions include user authentication, user service authorization, and user information management. Therefore, the copyright protection of the authentication server software is particularly important. Both protection technology and software-based protection technology require the installation of client hardware, drivers, or local licenses, and there is no connection between the authentication server software developer and the application program, so later license upgrades are troublesome, usually through The client generates the request string, and then the authentication server software developer tool generates the return string manually.
In addition, both the client’s encryption lock hardware and the license file are easier to be analyzed and cracked by the cracker. For the encryption lock hardware, there are currently many ways to crack the hardware copy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protecting method and protecting system for authentication server software copyright
  • Protecting method and protecting system for authentication server software copyright

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] see figure 1 As shown, it is a schematic flowchart of a method for protecting software copyright of an authentication server according to an embodiment of the present invention, as shown in FIG. figure 1 As shown, the authentication server software copyright protection method in this embodiment includes requesting authorization, and the requesting authorization includes the following steps:

[0020] Step S101: Receive the first request information sent by the user terminal, where the first request information includes software information and hardware information bound to the software information, and enter step S102, wherein the authentication server is for the Internet terminal and network access The device provides access to the authentication server. The main functions include user authentication, user service authorization, user information management, etc. The first request information is generally transmitted through the network, and the software information in t...

Embodiment 2

[0036] According to the authentication server software copyright protection method of the present invention, the present invention also provides an authentication server software copyright protection system. figure 2 A schematic structural diagram of an authentication server software copyright protection system according to an embodiment of the present invention is shown in , including a copyright management server 201 and a database 202, wherein:

[0037] The copyright management server 201 is configured to receive first request information sent by a user terminal, where the first request information includes software information and hardware information bound to the software information, and is used to query whether the first request information is stored in the database If the software information in the request information is not stored, then after the first request information is stored in the database, digitally sign the software information and hardware information in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a protecting method and a protecting system for authentication server software copyright. The protecting method includes authorization request. The authorization request includes the steps that first request information sent by a user terminal is received, and the first request information comprises software information and hardware information bound with the software information; whether the software information in the first request information is stored is queried; and if the software information in the first request information is not stored, after the first request information is stored, a digital signature is conducted on the software information and the hardware information in the first request information, and the signature is used as authorization information and sent to the user terminal of the first request information. By combining the software information and the hardware information, authentication server software can only be installed and operated on legal hardware and can not be operated on other hardware, and therefore intellectual property of vast authorization server software developers is completely protected. Numerous modules are not required to be installed on a client terminal due to an online software protecting method, and therefore installing, deployment and maintaining are easy.

Description

technical field [0001] The invention relates to the field of communication technologies, and in particular, to a method and system for copyright protection of authentication server software. Background technique [0002] Due to its product characteristics, software is easy to be copied, adapted, and pirated, and the whole process is fast and concealed, which can easily lead to infringement. Therefore, software copyright protection is even more important. [0003] There are two types of software copyright protection: hardware-based protection technology and software-based protection technology. The main purpose of hardware-based software protection technology is to prevent hardware from being copied, including two typical ways: dongle (encryption lock) and CD-ROM floppy disk protection, which need to occupy the computer's external interface slot and require additional costs. Compared with hardware-based protection technology, software-based protection technology has obvious ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32G06F21/24
Inventor 王胜男陈康先张越伍绍秋王文沛
Owner GCI SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products