Software permission authorization management method based on symmetric encryption technology

文档序号:168996 发布日期:2021-10-29 浏览:19次 中文

阅读说明:本技术 一种基于对称加密技术的软件权限授权管理方法 (Software permission authorization management method based on symmetric encryption technology ) 是由 胡军军 刘开强 蒋媛 于 2021-07-28 设计创作,主要内容包括:本发明公开了一种基于对称加密技术的软件权限授权管理方法,属于软件权限授权管理技术领域,包括如下步骤:进入对称加密解密管理系统,并启动系统程序;本发明通过采用DES加密方式,在开发程序内部集成加密解密算法,可有效将时间期限、机器码、软件启动时间等信息加密解密,采用暗码的方式读写,外部及程序开发者均无法明文识别含义,需要使用解密程序加密,大大提升了该管理方法的安全性与保密性,同时在方法内设置有利用神经网络对于软件权限授权进行有效分类管理,可有效通过调整内部大量节点之间相互连接的关系,进行大量的信息处理,可有效对于授权管理更加精细化,同时降低了错误率,同时保证授权关系的对应效果。(The invention discloses a software authority authorization management method based on a symmetric encryption technology, which belongs to the technical field of software authority authorization management and comprises the following steps: entering a symmetric encryption and decryption management system and starting a system program; the invention integrates encryption and decryption algorithms in the development program by adopting a DES encryption mode, can effectively encrypt and decrypt information such as time limit, machine codes, software starting time and the like, adopts a secret code mode to read and write, can not identify meanings in plain text by both external and program developers, needs to encrypt by using a decryption program, greatly improves the safety and confidentiality of the management method, simultaneously effectively classifies and manages software authority authorization by utilizing a neural network in the method, can effectively process a large amount of information by adjusting the mutual connection relationship among a large number of internal nodes, can effectively refine authorization management, reduces error rate and ensures the corresponding effect of the authorization relationship.)

1. A software authority authorization management method based on a symmetric encryption technology comprises the following steps:

s1, entering a symmetric encryption and decryption management system and starting a system program;

s2, solving two important files in the system, which are an authorization file (authority. ini) and a hidden × dll file;

s3, judging whether the two exist or not;

s4, if the authorization file (authority. ini) exists, judging whether the file is started initially;

s5, if not, checking the machine code and the authorization time;

s6, rechecking the quick right time, machine code, changing time or not, and restarting the program;

s7, if the hidden-type-free dll file exists, the password records the starting time and the machine code;

s8, checking whether the time of each start is continuous and not more than the time limit of the right;

s9, rechecking the quick right time, machine code, changing time or not, and restarting the program;

s10, performing effective classification management on the software authority authorization;

and S11, recording the software authority authorization mode.

2. The method as claimed in claim 1, wherein in S2, the authorization file password records the time limit of the start and end of the authorization and the initial boot code "hRE 11 vzuutsmmbc 8qsqpA ═ h". The program flow is set as that whether the authorization time meets the requirement is checked during the first starting, whether the initial starting code is the set code or not, the condition starting is met, the exe file is written, meanwhile, the third line of characters are rewritten into the machine code of the local machine, including the serial number information of a CPU, a hard disk and a network card, and the machine code is checked during the next starting.

3. The method for managing software authority authorization based on symmetric encryption technology as claimed in claim 1, wherein in S2, hidden type × dll file is used to record the information password for checking authority in file, and as the cross check whether the usage authority meets the requirement, the file name can be similar to system dll file, for example, the following naming and recording method is used in the author program.

4. The method as claimed in claim 1, wherein in S4, if the authorization file (authority. ini) and the hidden type × dll file do not exist, the procedure is directly ended.

5. The method as claimed in claim 1, wherein in S5, if not, the machine code and authorization time are checked, and if yes, the machine code is recorded in place of the authorization file, and the program is restarted.

6. The method for managing software authority according to claim 1, wherein in S8, it is checked whether each time start continues and is not greater than the time limit of the right, and the user system time is checked.

7. The method for managing software authorization based on symmetric encryption technology as claimed in claim 1, wherein in S10, the neural network is used to perform effective classification management on the software authorization.

8. The method for managing software authority authorization based on symmetric encryption technology as claimed in claim 1, wherein in S11, the software authority authorization manner is recorded and stored in the large database.

Technical Field

The invention belongs to the technical field of software permission authorization management, and particularly relates to a software permission authorization management method based on a symmetric encryption technology.

Background

At present, the state vigorously promotes intellectual property protection, software developers sometimes need to properly encrypt software authorities for the purpose of protecting developed products, users need to apply authorities and effective dates, and at present, authority management has a plurality of modes, including networking verification, U shield permission and the like.

The method is characterized in that a symmetric encryption technology is not arranged in the traditional authority management mode, so that information such as time limit, machine codes and software starting time cannot be encrypted and decrypted, the application safety of the method cannot be guaranteed, meanwhile, a neural network model is not adopted in the traditional authority management mode, so that the management fineness and the accuracy cannot be guaranteed, a simple encryption scheme is urgently needed to solve the problem, the permission time and the algorithm for using the machine codes are bound based on the symmetric encryption cipher, and meanwhile, the bug that a user acquires the authority by modifying the system time can be solved.

Disclosure of Invention

The invention aims to: the software permission authorization management method based on the symmetric encryption technology is provided for solving the problems that information such as time limit, machine codes and software starting time cannot be encrypted and decrypted due to the fact that the symmetric encryption technology is not arranged in a traditional permission management mode, and accordingly application safety of the method cannot be guaranteed, and management fineness and accuracy cannot be guaranteed due to the fact that a neural network model is not adopted in the traditional permission management mode.

In order to achieve the purpose, the invention adopts the following technical scheme: a software authority authorization management method based on a symmetric encryption technology comprises the following steps:

s1, entering a symmetric encryption and decryption management system and starting a system program;

s2, solving two important files in the system, which are an authorization file (authority. ini) and a hidden × dll file;

s3, judging whether the two exist or not;

s4, if the authorization file (authority. ini) exists, judging whether the file is started initially;

s5, if not, checking the machine code and the authorization time;

s6, rechecking the quick right time, machine code, changing time or not, and restarting the program;

s7, if the hidden-type-free dll file exists, the password records the starting time and the machine code;

s8, checking whether the time of each start is continuous and not more than the time limit of the right;

s9, rechecking the quick right time, machine code, changing time or not, and restarting the program;

s10, performing effective classification management on the software authority authorization;

and S11, recording the software authority authorization mode.

As a further description of the above technical solution:

in S2, the authorization file password records the authorized start/end time limit and the initial start code "hRE 11 vzuutsmmbc 8qsqpA ═ in". The program flow is set as that whether the authorization time meets the requirement is checked during the first starting, whether the initial starting code is the set code or not, the condition starting is met, the exe file is written, meanwhile, the third line of characters are rewritten into the machine code of the local machine, including the serial number information of a CPU, a hard disk and a network card, and the machine code is checked during the next starting.

As a further description of the above technical solution:

in S2, the hidden type × dll file records the information password of the checking authority in the file, and as the cross check whether the usage authority meets the requirement, the file name may be similar to the system dll file, for example, the following naming and recording method is adopted in the author program.

As a further description of the above technical solution:

in S4, if the authorization file (authority. ini) and the hidden-type × dll file do not exist, the procedure is directly ended.

As a further description of the above technical solution:

in S5, if not, the machine code and the authorization time are checked, and if the program is started, the machine code of the machine is recorded in place of the authorization file, and then the program is started.

As a further description of the above technical solution:

in S8, it is checked whether the timeout of each start is continuous and not greater than the time limit of the right, and the user system time is checked.

As a further description of the above technical solution:

in S10, a neural network is used to perform effective classification management on the software authority authorization.

As a further description of the above technical solution:

in S11, the software authority authorization mode is recorded and stored in the large database.

In summary, due to the adoption of the technical scheme, the invention has the beneficial effects that:

in the invention, by adopting a DES encryption mode, an encryption and decryption algorithm is integrated in a development program, and keys and vectors are mastered by a developer, so that information such as time limit, machine codes, software starting time and the like can be effectively encrypted and decrypted, the information is read and written by adopting a secret code mode, the meanings of the information cannot be identified by the outside and the program developer in a plaintext manner, the encryption of a decryption program is needed, the safety and the confidentiality of the management method are greatly improved, meanwhile, effective classification management is carried out on software authority authorization by utilizing a neural network in the method, an algorithm mathematical model for distributed parallel information processing is provided, a large amount of information processing can be effectively carried out by adjusting the mutual connection relationship among a large number of nodes in the method, the authorization management can be effectively refined, the error rate is reduced, and the corresponding effect of the authorization relationship is ensured.

Drawings

Fig. 1 is a flowchart of a software authority authorization management method based on a symmetric encryption technology.

Detailed Description

The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.

Example 1

Referring to fig. 1, the present invention provides a technical solution: a software authority authorization management method based on a symmetric encryption technology comprises the following steps:

s1, entering a symmetric encryption and decryption management system and starting a system program;

s2, solving two important files in the system, namely an authorization file (authorization. ini) and a hidden × dll file, wherein the authorization file password records an authorized start/stop time period and an initial boot code "hRE 11 vzuutsmmbc 8qsqpA ═ h". The method comprises the steps of firstly, checking whether authorization time meets requirements or not during initial starting, checking whether an initial starting code is a set code or not, starting under the conditions, and then, writing a third line of characters into a machine code of a local machine, wherein the machine code comprises serial number information of a CPU (Central processing Unit), a hard disk and a network card;

s3, judging whether the two exist or not;

s4, if the authorization file (authority. ini) and the hidden-type × dll file do not exist, directly ending the program;

s5, if not, checking the machine code and the authorization time, if started, replacing the authorization file to record the machine code of the machine, and then starting the program;

s6, rechecking the quick right time, machine code, changing time or not, and restarting the program;

s7, if the hidden-type-free dll file exists, the password records the starting time and the machine code;

s8, checking whether the time of each start is continuous and not more than the right-holding period, and checking the system time of the user;

s9, rechecking the quick right time, machine code, changing time or not, and restarting the program;

s10, carrying out effective classification management on the software authority authorization by using a neural network;

and S11, recording the software authority authorization mode, and storing the software authority authorization mode in a large database.

Example 2

Referring to fig. 1, the present invention provides a technical solution: a software authority authorization management method based on a symmetric encryption technology comprises the following steps:

s1, entering a symmetric encryption and decryption management system and starting a system program;

s2, solving two important files in the system, namely an authorization file (authorization. ini) and a hidden × dll file, wherein the authorization file password records an authorized start/stop time period and an initial boot code "hRE 11 vzuutsmmbc 8qsqpA ═ h". The method comprises the steps of firstly, checking whether authorization time meets requirements or not during initial starting, checking whether an initial starting code is a set code or not, starting under the conditions, and then, writing a third line of characters into a machine code of a local machine, wherein the machine code comprises serial number information of a CPU (Central processing Unit), a hard disk and a network card;

s3, judging whether the two exist or not;

s4, if the authorization file (authority. ini) and the hidden-type × dll file do not exist, directly ending the program;

s5, if not, checking the machine code and the authorization time, if started, replacing the authorization file to record the machine code of the machine, and then starting the program;

s6, rechecking the quick right time, machine code, changing time or not, and restarting the program;

s7, if the hidden-type-free dll file exists, the password records the starting time and the machine code;

s8, checking whether the time of each start is continuous and not more than the right-holding period, and checking the system time of the user;

s9, rechecking the quick right time, machine code, changing time or not, and restarting the program;

s10, if there are no two important files needing to be solved;

s11, directly checking the quick right time, the machine code and whether the time is changed;

s12, carrying out effective classification management on the software authority authorization by using a neural network;

and S13, recording the software authority authorization mode, and storing the software authority authorization mode in a large database.

In the embodiment 1-2, by adopting the DES encryption method, the encryption and decryption algorithm is integrated in the development program, the key and the vector are all mastered by the developer, therefore, the information such as time limit, machine code, software starting time and the like can be effectively encrypted and decrypted, the information is read and written by adopting a password mode, no clear text can be identified by the external part and a program developer, the decryption program is required to be used for encryption, the safety and the confidentiality of the management method are greatly improved, meanwhile, the method is internally provided with a neural network for effectively classifying and managing the software authority authorization, which is an arithmetic mathematical model for distributed parallel information processing, can effectively process a large amount of information by adjusting the mutual connection relationship among a large amount of internal nodes, the authorization management can be effectively refined, the error rate is reduced, and the corresponding effect of the authorization relationship is ensured.

The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.

7页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:数据管理方法、智能卡及计算机可读存储介质

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类