期刊文献+

基于SaaS的软件在线授权机制的研究与设计 被引量:1

Research and design of software online authorization mechanism based on SaaS
下载PDF
导出
摘要 为解决软件版权保护问题,提出一种软件保护和授权服务方式。结合混合加密算法和数字证书,以及超文本传输协议(hypertext transfer protocol,HTTP)和传输层安全协议(transport layer security,TLS)保证通信安全,将软件的核心功能函数或者核心数据迁移到服务器端(软件提供商),软件使用者需要软件服务时须向服务器提出请求,服务器可监控使用者使用软件的服务次数,在收取服务费用后,将运行结果返回给使用者,达到软件授权服务的效果,从根本上杜绝了软件在客户端被反汇编破解的情况,达到保护软件知识产权的要求,体现并运用了云计算中软件即服务(software as a service,SaaS)的概念。 To solve the severe problem of software copyright protection,a method of software protection and authorization service combining hybrid encryption algorithm,digital certificates,HTTP and TLS protocols to ensure the security of communication was put forward.The core functions or data of the software were moved to the server side(software provider).To monitor the times of users using the software service,a service fee was charged and thus the software authorization service was implemented,the users were required to send a request to the server side,and then the corresponding result was obtained.The possibility of cracking of the software on the client side via the disassembly is eliminated.It not only achieves the requirement of software intellectual property protection,but also embodies and practically realizes the concept of software as a service(SaaS)in cloud computing.
作者 朱启辉 黄琼
出处 《计算机工程与设计》 北大核心 2015年第3期608-612,共5页 Computer Engineering and Design
基金 国家自然科学基金项目(61103232)
关键词 超文本传输协议 传输层安全协议 软件授权服务 软件保护 软件即服务 HTTP TLS software authorization service software protection SaaS
  • 相关文献

参考文献11

  • 1王艳娜,徐国胜.一种基于RSA和SHAl的软件保护方案[C]//2011年通信与信息技术新进展--第八届中国通信学会学术年会论文集,2011.
  • 2高博,李彦.一种基于硬件特征和动态许可证的服务器端软件授权认证模型[J].计算机工程与科学,2013,35(2):56-61. 被引量:3
  • 3Ranjith D, Srinivasan J. Identity security using authentication and authorization in cloud computing [J]. International Journal of Computer & Organization Trends, 2013, 3 (4):122-129.
  • 4Haseeb K, Bakar K A, Qureshi K N. Comparison of public key authority and token based registration approach [J]. World Applied Sciences Journal, 2013, 23 (6): 740-743.
  • 5Alphonsa Johny, Jayasudha JS. Secure socket layer implemen- tations a review [J]. International Journal of Computer Science Engineering Technology, 2013, 4 (2): 118-123.
  • 6Seon-Joo Kim, Jin-Mook Kim, In-June Jo. An efficient ac- cess control mechanism for application software using the open authentication [J]. Future Information Communication Tech- nology and Applications, 2013 (235): 133-140.
  • 7Dinesha HA. Framework design of secure cloud transmission protocol [J]. International Journal of Computer Science Is- sues, 2013, 10 (1): 74-81.
  • 8SafeNet, Inc. Sentinel cloud run-time [EB/OL]. [2013-06- 08]. http.. //documentation. sentinelcloud, com/CRTG/.
  • 9Bitanswer [EB/OL]. [2013-06-08]. http: //www. bitan- swer. corn/solutions/.
  • 10Nginx [EB/OL] . [2013-06-08]. http: //wiki. nginx, org/ NginxHttpSslModule.

二级参考文献8

共引文献2

同被引文献6

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部