发明名称 Software authorization system and method
摘要 A software authorization system has a server end and a user end. A software authorization method includes acquiring a software identification code of a protected software when the user end downloads the protected software from the server end; transmitting the software identification code and an inherent user identification code to the server end; acquiring a first key and main key by the server end according to the user identification code and the software identification code, respectively, so as to generate a second key by operating the main key and the first key and transmit the second key to the user end; restoring the main key by the user end with the second key combined with the first key; and decrypting the protected software by the main key. Therefore, the protected software is hard to be decrypted.
申请公布号 US8959659(B2) 申请公布日期 2015.02.17
申请号 US201113009628 申请日期 2011.01.19
申请人 Industrial Technology Research Institute 发明人 Kao Ming-Chih
分类号 G06F7/04;G06F21/10 主分类号 G06F7/04
代理机构 Muncy, Geissler, Olds & Lowe, P.C. 代理人 Muncy, Geissler, Olds & Lowe, P.C.
主权项 1. A software authorization system, comprising: a software provision module for providing a protected software encrypted by a main key, wherein the protected software has a software identification code; a processing module for downloading the protected software from the software provision module and outputting the software identification code of the downloaded protected software; an intermediation module having an user identification code and a first key corresponding to the user identification code, wherein the intermediation module is used to receive the software identification code outputted by the processing module; an authorization module having a main key library and a first key library, wherein the authorization module receives the user identification code and the software identification code outputted by the intermediation module, searches the main key library and the first key library respectively for the main key corresponding to the software identification code and the first key corresponding to the user identification code according to the user identification code and the software identification code, generates a second key by operating the main key and the first key with a secret sharing scheme, and transmits the second key to the intermediation module so as to restore the main key by the intermediation module according to the inherent first key in combination with the received second key such that the processing module decrypts the downloaded protected software by using the main key; and a conversion module for converting a software to the protected software by an encryption method of the main key and transmitting the protected software to the software provision module, wherein the conversion module adds an integrity inspection parameter into the software so as to render the software to become the protected software.
地址 Hsinchu TW