
技术领域technical field
本发明涉及软件激活技术领域,尤其涉及一种基于授权文件激活软件的方法、计算装置以及计算机可读介质。The present invention relates to the technical field of software activation, and in particular, to a method, a computing device and a computer-readable medium for activating software based on an authorization file.
背景技术Background technique
在大数据、信息化的时代,随着计算机发展的不断推进,计算机应用已经融入了人们的日常生活。一方面,各种不法公司发行盗版产品,网络安全成为计算机产品的一项重要因素,另一方面,公司不断推出的新产品、新应用,有时用户需要每个依次购买激活方式,而这种基于授权文件的激活,可以有效的保护应用,并且提供给用户一个统一的管理一个公司产品的钥匙,公司可以根据每一个不同的用户所提供的信息独立的控制并掌握发放其激活规则,实现“一机一码”的安全控制。但是,基于授权文件激活软件的实现方式存在技术难度。In the era of big data and informatization, with the continuous advancement of computer development, computer applications have been integrated into people's daily life. On the one hand, various illegal companies issue pirated products, and network security has become an important factor for computer products. The activation of the authorization file can effectively protect the application and provide users with a unified key to manage a company's products. "One Code for the Machine" security control. However, there are technical difficulties in the implementation of software activation based on the authorization file.
因此,有必要提供一种新的技术方案来解决上述问题。Therefore, it is necessary to provide a new technical solution to solve the above problems.
发明内容SUMMARY OF THE INVENTION
本发明的目的在于提供一种基于授权文件激活软件的方法、计算装置以及计算机可读介质,其可以基于“一机一码”的授权文件激活软件,从而提高网络安全性。The purpose of the present invention is to provide a method, a computing device and a computer-readable medium for activating software based on an authorization file, which can activate software based on the "one machine, one code" authorization file, thereby improving network security.
根据本发明的一个方面,本发明提供一种基于授权文件激活软件的方法,其包括:在服务器中对用户源码进行加密得到授权文件,将所述授权文件转移至所述计算机设备中,其中所述用户源码唯一对应一台计算机设备;在所述计算机设备上打开软件产品并选择激活,此时利用所述软件产品打开所述授权文件进行激活校验,在进行激活校验时执行如下步骤:所述软件产品对所述授权文件进行解密得到所述用户源码;所述软件产品采集本地计算机设备的信息得到本地计算机设备的用户源码;所述软件产品将解密得到的用户源码和本地采集的用户源码进行比对以确认激活校验是否成功,若匹配,则认为激活校验成功,能够正常使用所述软件产品。According to one aspect of the present invention, the present invention provides a method for activating software based on an authorization file, comprising: encrypting a user source code in a server to obtain an authorization file, and transferring the authorization file to the computer device, wherein the The user source code uniquely corresponds to a computer device; open the software product on the computer device and select activation, then use the software product to open the authorization file for activation verification, and perform the following steps when performing activation verification: The software product decrypts the authorization file to obtain the user source code; the software product collects the information of the local computer equipment to obtain the user source code of the local computer equipment; the software product decrypts the obtained user source code and the locally collected user source code The source code is compared to confirm whether the activation verification is successful. If there is a match, the activation verification is considered to be successful, and the software product can be used normally.
根据本发明的另一个方面,本发明提供一种计算装置,其包括处理器和存储器,所述存储器中存储有程序指令,该程序指令由处理器执行以实现上述的基于授权文件激活软件的方法。According to another aspect of the present invention, the present invention provides a computing device comprising a processor and a memory, wherein the memory stores program instructions, the program instructions are executed by the processor to implement the above-mentioned method for activating software based on an authorization file .
根据本发明的再一个方面,本发明提供一种计算机可读介质,其内存储有程序指令,该程序指令被执行以实现上述的基于授权文件激活软件的方法。According to yet another aspect of the present invention, the present invention provides a computer-readable medium having program instructions stored therein, the program instructions being executed to implement the above-mentioned method for activating software based on an authorization file.
与现有技术相比,本发明的授权文件激活软件的方式,相比于统一发放的CD-key,需要针对每一个用户进行独立的,特别的供应。它具有一定的保密性以及协议性,它需要用户提供部分源码,这样用户可以对自己购买的产品建立一定的安全保护,发行商则需要根据用户提供的源码,再通过本公司独有的加密技术,进行加密后,发放给用户,起到一机一码的作用,从而提高网络安全性。Compared with the prior art, the way of activating the software by the authorization file of the present invention, compared with the CD-key issued uniformly, requires independent and special supply for each user. It has a certain degree of confidentiality and agreement. It requires users to provide some source code, so that users can establish certain security protection for the products they buy. Publishers need to use the source code provided by users, and then pass the company's unique encryption technology. , encrypted, and distributed to users, playing the role of one machine and one code, thereby improving network security.
附图说明Description of drawings
图1为本发明中的基于授权文件激活软件的方法在一个实施例中的流程示意图。FIG. 1 is a schematic flowchart of a method for activating software based on an authorization file in one embodiment of the present invention.
具体实施方式Detailed ways
为更进一步阐述本发明为达成预定发明目的所采取的技术手段及功效,以下结合附图及较佳实施例,对依据本发明的具体实施方式、结构、特征及其功效,详细说明如下。In order to further illustrate the technical means and effects adopted by the present invention to achieve the predetermined purpose of the invention, the specific embodiments, structures, features and effects of the present invention are described in detail below in conjunction with the accompanying drawings and preferred embodiments.
为更进一步阐述本发明为达成预定发明目的所采取的技术手段及功效,以下结合附图及较佳实施例,对依据本发明的具体实施方式、结构、特征及其功效,详细说明如下。In order to further illustrate the technical means and effects adopted by the present invention to achieve the predetermined purpose of the invention, the specific embodiments, structures, features and effects of the present invention are described in detail below in conjunction with the accompanying drawings and preferred embodiments.
首先,对本发明中的相关术语进行介绍:First, the relevant terms in the present invention are introduced:
1.授权文件:可以是以Lic格式结尾用于激活的一种文件。1. Authorization file: a file that can be used for activation at the end of Lic format.
2.CD-key:商业软件用于安装的序列码,也称为秘钥。2. CD-key: The serial code used by commercial software for installation, also known as the secret key.
3.源码、加密码:根据特定算法,将通过一定规则获取的字符串,称之为源码,并且加密成具有规则的、可以反解密成的字符串,称之为加密码。3. Source code and encryption code: According to a specific algorithm, the string obtained through certain rules is called the source code, and encrypted into a string with rules that can be decrypted, which is called encryption code.
4:一机一码:一台用户计算机对应一个授权文件,即激活码。4: One machine, one code: One user computer corresponds to one authorization file, that is, the activation code.
通过大量的分析,总结出基于授权文件激活软件的难点在于:Through a lot of analysis, it is concluded that the difficulties of activating software based on authorization files are:
1.需要通过用户获取源码,且加密规则通用;1. The source code needs to be obtained from the user, and the encryption rules are common;
2.相比于统一发放的CD-key,授权文件基于每台用户生成;2. Compared with the uniformly issued CD-key, the authorization file is generated based on each user;
3.同一台计算机,用户有意或无意的修改了授权文件,需要进行二次校验;3. On the same computer, the user modifies the authorization file intentionally or unintentionally, and a second verification is required;
4.授权文件需要具有不可识别性,不能轻易被用户及不良商家反编码破解;4. The authorization file needs to be unrecognizable and cannot be easily deciphered by users and bad merchants;
5.实现“一机一码”。5. Realize "one machine, one code".
基于上述分析,本发明提供一种基于授权文件激活软件的方法。Based on the above analysis, the present invention provides a method for activating software based on an authorization file.
请参考图1所示,为本发明中的基于授权文件激活软件的方法在一个实施例中的流程示意图。如图1所示,基于授权文件激活软件的方法包括如下步骤。Please refer to FIG. 1 , which is a schematic flowchart of a method for activating software based on an authorization file in one embodiment of the present invention. As shown in FIG. 1 , the method for activating software based on an authorization file includes the following steps.
步骤110、在服务器中对用户源码进行加密得到授权文件,将所述授权文件转移至所述计算机设备中,其中所述用户源码唯一对应一台计算机设备。在一个实施例中,所述服务器由所述软件产品的发行商运行。Step 110: Encrypt the user source code in the server to obtain an authorization file, and transfer the authorization file to the computer device, wherein the user source code uniquely corresponds to one computer device. In one embodiment, the server is run by a publisher of the software product.
在一个实施例中,步骤110中具体包括如下步骤。In one embodiment,
用户在一台计算机设备上通过浏览器登录所述服务器并选择获取授权文件。通常来将,用户通过自己的用户名和密码通过浏览器登录所述服务器,如果所述用户购买过对应的软件产品,所述服务器会知晓所述用户已经购买过的软件产品的数量、类型、已经被授权使用的数量、已经激活的数量等。举例来说,用户张三购买了永中软件的1套文字处理系统,未在计算机设备上授权使用,也未激活。The user logs into the server through a browser on a computer device and selects to obtain an authorization file. Usually, the user logs in to the server through a browser through his user name and password. If the user has purchased the corresponding software product, the server will know the number, type, and number of software products that the user has purchased. The number of authorized use, the number of activated, etc. For example, user Zhang San purchased a word processing system from Yongzhong Software, which was neither authorized nor activated on the computer equipment.
所述服务器通过所述浏览器获取该台计算机设备唯一对应的用户源码,并对所述用户源码进行加密得到授权文件。当然,如果所述用户没有未在计算机设备上授权使用的软件产品,则无法制作授权文件。在一个实施例中,所述用户源码包括对应的计算机设备的MAC地址、CPU地址中的一个或多个,即所述用户源码唯一对应这台计算机设备;所述服务器将所述用户源码和一组随机的字符串一起进行加密得到所述授权文件,比如加密时可以采用MD5加密算法。The server obtains the unique corresponding user source code of the computer device through the browser, and encrypts the user source code to obtain an authorization file. Of course, if the user does not have a software product that is not authorized for use on the computer device, the authorization file cannot be created. In one embodiment, the user source code includes one or more of the MAC address and CPU address of the corresponding computer device, that is, the user source code uniquely corresponds to this computer device; the server combines the user source code with a A group of random character strings are encrypted together to obtain the authorization file, for example, the MD5 encryption algorithm can be used for encryption.
所述用户通过所述浏览器下载所述授权文件至所述计算机设备上。The user downloads the authorization file to the computer device through the browser.
在另一个实施例中,步骤110包括如下步骤。In another embodiment,
在所述计算机设备上打开软件产品并选择获取授权文件,所述软件产品的通讯模组被启动以与所述服务器建立通讯连接。在此实施例中,所述软件产品具有通讯组件,以便与指定的服务器进行联系,所述软件产品也具有选择获取授权文件的入口,这样可以使得授权文件的获取更为简便。The software product is opened on the computer device and an authorization file is selected to be obtained, and the communication module of the software product is activated to establish a communication connection with the server. In this embodiment, the software product has a communication component to communicate with a designated server, and the software product also has an entry for selecting an authorization file, so that the authorization file can be obtained more easily.
所述软件产品将购买软件产品后获得的购买凭据信息发送至所述服务器以供验证。用户在购买所述软件产品后,发行商会给用户提供购买凭据信息,利用所述购买凭据信息可以获得授权。所述购买凭据信息可以是一个字符串,也可以是用户的用户名和密码。The software product sends purchase credential information obtained after purchasing the software product to the server for verification. After the user purchases the software product, the publisher will provide the user with purchase credential information, and authorization can be obtained by using the purchase credential information. The purchase credential information may be a character string, or may be the user's username and password.
在服务器验证所述购买凭据信息确认该用户已经购买了所述软件产品且未在计算机设备中授权使用后,服务器通过运行于所述计算机设备上的软件产品获取此台计算机设备的用户源码,并将所述用户源码和一组随机的字符串一起进行加密得到所述授权文件。After the server verifies the purchase credential information and confirms that the user has purchased the software product and is not authorized to use it in the computer device, the server obtains the user source code of the computer device through the software product running on the computer device, and The authorization file is obtained by encrypting the user source code together with a set of random character strings.
服务器将所述授权文件通过所述软件产品的通讯模组发送至所述计算机设备上,并登记所述购买凭据信息对应的软件产品已经被授权使用。The server sends the authorization file to the computer device through the communication module of the software product, and registers that the software product corresponding to the purchase credential information has been authorized to use.
步骤120、在所述计算机设备上打开软件产品并选择激活,此时利用所述软件产品打开所述授权文件进行激活校验,在进行激活校验时执行如下步骤:Step 120: Open the software product on the computer device and select activation, and then use the software product to open the authorization file for activation verification, and perform the following steps when performing activation verification:
所述软件产品对所述授权文件进行解密得到所述用户源码;The software product decrypts the authorization file to obtain the user source code;
所述软件产品采集本地计算机设备的信息得到本地计算机设备的用户源码;The software product collects the information of the local computer equipment to obtain the user source code of the local computer equipment;
所述软件产品将解密得到的用户源码和本地采集的用户源码进行比对以确认激活校验是否成功,若匹配,则认为激活校验成功,能够正常使用所述软件产品。若不匹配,则验证激活校验不成功,用户无法正常使用所述软件产品。The software product compares the decrypted user source code with the locally collected user source code to confirm whether the activation verification is successful. If they match, the activation verification is considered to be successful, and the software product can be used normally. If it does not match, the verification and activation verification is unsuccessful, and the user cannot use the software product normally.
在激活校验成功后,所述服务器中登记所述购买凭据信息对应的软件产品已经被激活校验,这样所述购买凭据信息则无法再次在其他计算机设备上激活所述软件产品了。After the activation verification is successful, the software product corresponding to the purchase credential information registered in the server has been activated and verified, so that the purchase credential information cannot activate the software product on other computer devices again.
在一个实施例中,所述授权文件具有不可识别性;所述授权文件基于每台计算机设备生成,以实现一机一码,所述授权文件采取文件激活的方式,所述计算机设备使用文件浏览激活所述软件产品。所述授权文件是以Lic格式结尾用于激活的一种文件。In one embodiment, the authorization file is non-identifiable; the authorization file is generated based on each computer device to realize one machine, one code, and the authorization file adopts a file activation method, and the computer device uses the file browsing method Activate the software product. The authorization file is a file ending in Lic format for activation.
如果用户希望将软件产品更换至另一台计算机设备上,用户将所述软件产品在原来的计算机设备上卸载掉,之后重新从所述服务器上获取授权文件,并重新在另一台计算机设备上利用所述授权文件进行激活校验。If the user wishes to replace the software product to another computer device, the user uninstalls the software product from the original computer device, then obtains the authorization file from the server again, and re-installs the software product on the other computer device. Activation verification is performed using the authorization file.
综上所述,本发明的授权文件激活软件的方式,相比于统一发放的CD-key,需要针对每一个用户进行独立的,特别的供应。它具有一定的保密性以及协议性,它需要用户提供部分源码,这样用户可以对自己购买的产品建立一定的安全保护,发行商则需要根据用户提供的源码,再通过本公司独有的加密技术,进行加密后,发放给用户,起到一机一码的作用。除此之外,产品还需要对用户使用的授权文件进行激活校验。在一个实施例中,相比于传统的CD-key激活方式,本发明中的授权文件采取文件激活的方式,用户可以更加方便的使用文件浏览激活;在一个具体。对文件形式的激活码来说,用户会更加容易方便管理和存储。这一方面可以更加提高安全性与统一性。To sum up, the method of activating the software by the authorization file of the present invention, compared with the CD-key issued uniformly, needs to be provided independently and specially for each user. It has a certain degree of confidentiality and agreement. It requires users to provide some source code, so that users can establish certain security protection for the products they buy. Publishers need to use the source code provided by users, and then pass the company's unique encryption technology. , encrypted, and distributed to users, playing the role of one machine, one code. In addition, the product also needs to perform activation verification on the authorization file used by the user. In one embodiment, compared with the traditional CD-key activation method, the authorization file in the present invention adopts the file activation method, and the user can use the file browsing activation method more conveniently; in a specific example. For the activation code in the form of a file, it will be easier for the user to manage and store it more conveniently. This aspect can further improve security and uniformity.
在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,除了包含所列的那些要素,而且还可包含没有明确列出的其他要素。As used herein, the terms "comprising", "comprising" or any other variation thereof are intended to encompass non-exclusive inclusion, in addition to those elements listed, but also other elements not expressly listed.
在本文中,所涉及的前、后、上、下等方位词是以附图中零部件位于图中以及零部件相互之间的位置来定义的,只是为了表达技术方案的清楚及方便。应当理解,所述方位词的使用不应限制本申请请求保护的范围。In this document, the related terms such as front, rear, upper and lower are defined by the positions of the components in the drawings and the positions between the components, which are only for the clarity and convenience of expressing the technical solution. It should be understood that the use of the locative words should not limit the scope of protection claimed in this application.
在不冲突的情况下,本文中上述实施例及实施例中的特征可以相互结合。The above-described embodiments and features of the embodiments herein may be combined with each other without conflict.
以上所述仅为本发明的较佳实施例,并不用以限制本发明,凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。The above descriptions are only preferred embodiments of the present invention, and are not intended to limit the present invention. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention shall be included in the protection of the present invention. within the range.
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202111544486.1ACN114357384A (en) | 2021-12-16 | 2021-12-16 | Method, computing device, and computer-readable medium for activating software based on authorization file |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202111544486.1ACN114357384A (en) | 2021-12-16 | 2021-12-16 | Method, computing device, and computer-readable medium for activating software based on authorization file |
| Publication Number | Publication Date |
|---|---|
| CN114357384Atrue CN114357384A (en) | 2022-04-15 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202111544486.1AWithdrawnCN114357384A (en) | 2021-12-16 | 2021-12-16 | Method, computing device, and computer-readable medium for activating software based on authorization file |
| Country | Link |
|---|---|
| CN (1) | CN114357384A (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN116415222A (en)* | 2023-05-09 | 2023-07-11 | 南京中图数码科技有限公司 | Authorization management method and system for cloud design platform of process industrial digital factory |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104618384A (en)* | 2015-02-13 | 2015-05-13 | 成都中科合迅科技有限公司 | Single authentication method based on AD (Access Device) server |
| US20170085532A1 (en)* | 2015-03-27 | 2017-03-23 | Arris Enterprises Llc | Cryptographic service with output redirection |
| CN109583156A (en)* | 2018-12-05 | 2019-04-05 | 杭州安恒信息技术股份有限公司 | Code protection method, device, system and equipment based on Certificate Authority |
| CN113268715A (en)* | 2020-02-14 | 2021-08-17 | 中移(苏州)软件技术有限公司 | Software encryption method, device, equipment and storage medium |
| CN113761483A (en)* | 2021-08-31 | 2021-12-07 | 山东浪潮通软信息科技有限公司 | Software product protection method, device and medium based on soft encryption application program |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104618384A (en)* | 2015-02-13 | 2015-05-13 | 成都中科合迅科技有限公司 | Single authentication method based on AD (Access Device) server |
| US20170085532A1 (en)* | 2015-03-27 | 2017-03-23 | Arris Enterprises Llc | Cryptographic service with output redirection |
| CN109583156A (en)* | 2018-12-05 | 2019-04-05 | 杭州安恒信息技术股份有限公司 | Code protection method, device, system and equipment based on Certificate Authority |
| CN113268715A (en)* | 2020-02-14 | 2021-08-17 | 中移(苏州)软件技术有限公司 | Software encryption method, device, equipment and storage medium |
| CN113761483A (en)* | 2021-08-31 | 2021-12-07 | 山东浪潮通软信息科技有限公司 | Software product protection method, device and medium based on soft encryption application program |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN116415222A (en)* | 2023-05-09 | 2023-07-11 | 南京中图数码科技有限公司 | Authorization management method and system for cloud design platform of process industrial digital factory |
| CN116415222B (en)* | 2023-05-09 | 2023-10-20 | 南京中图数码科技有限公司 | Authorization management method and system for cloud design platform of process industrial digital factory |
| Publication | Publication Date | Title |
|---|---|---|
| US10491379B2 (en) | System, device, and method of secure entry and handling of passwords | |
| CN109075976B (en) | Certificate issuance depending on key authentication | |
| US7475254B2 (en) | Method for authenticating software using protected master key | |
| US6961852B2 (en) | System and method for authenticating software using hidden intermediate keys | |
| CN103995991B (en) | Method for binding hardware information and secret keys in software copyright protection | |
| CN101174295B (en) | Off-line DRM authentication method and system | |
| CN102426640B (en) | For the fail-safe software product identifiers of Product Validation and activation | |
| US7516491B1 (en) | License tracking system | |
| WO2021128244A1 (en) | Registration authorization method and system | |
| CN104063788B (en) | Mobile platform credibility payment system and method | |
| CN103946858A (en) | Decryption and encryption of application data | |
| TWI436235B (en) | Data encryption method and system, data decryption method | |
| CN109284603A (en) | A kind of configuration data processing method, device and storage medium | |
| JP6357091B2 (en) | Information processing apparatus and computer program | |
| US20190044709A1 (en) | Incorporating software date information into a key exchange protocol to reduce software tampering | |
| KR20080065661A (en) | Methods for controlling access to file systems, related systems for use in file systems, SIM cards and computer program products | |
| CN104866736B (en) | The system for numeral copyright management and method of a kind of non-proliferation | |
| CN114357384A (en) | Method, computing device, and computer-readable medium for activating software based on authorization file | |
| JP2009032165A (en) | Software license management system, program and device | |
| JP4192738B2 (en) | Electronic document editing device, electronic document editing program | |
| KR102854414B1 (en) | Authentication methods and authentication systems that restrict unauthorized installation of software products | |
| CN114448635B (en) | A method, device, equipment and product for website licensing | |
| US20250272362A1 (en) | Protection-level based mechanism for securing artificial intelligence models | |
| JP6047718B2 (en) | License management system, method and module | |
| Huang et al. | A software licensing authorization scheme based on hardware component identifiers |
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| WW01 | Invention patent application withdrawn after publication | Application publication date:20220415 | |
| WW01 | Invention patent application withdrawn after publication |