CN102739656A - Method and system for controlling type and scale of non-host node - Google Patents

Method and system for controlling type and scale of non-host node Download PDF

Info

Publication number
CN102739656A
CN102739656A CN2012101928600A CN201210192860A CN102739656A CN 102739656 A CN102739656 A CN 102739656A CN 2012101928600 A CN2012101928600 A CN 2012101928600A CN 201210192860 A CN201210192860 A CN 201210192860A CN 102739656 A CN102739656 A CN 102739656A
Authority
CN
China
Prior art keywords
host node
authorization message
type
node
norm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012101928600A
Other languages
Chinese (zh)
Inventor
白树伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
YINGHUA HIGHTECH CO Ltd
Original Assignee
YINGHUA HIGHTECH CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by YINGHUA HIGHTECH CO Ltd filed Critical YINGHUA HIGHTECH CO Ltd
Priority to CN2012101928600A priority Critical patent/CN102739656A/en
Publication of CN102739656A publication Critical patent/CN102739656A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the invention provides a system for controlling a type and a scale of a non-host node. The system comprises a register server, a host node and a non-host node, wherein the register server is used for issuing host node authorization information to the host node; the host node is used for receiving the host node authorization information from the register server, and issuing non-host node authorization information to the non-host node according to the maximum scale and/or type of the extensible non-host node, wherein the host node authorization information at least comprises the maximum scale and/or type of the extensible non-host node; and the non-host node is used for receiving the authorization information from the host node, and executing corresponding operation according to the non-host node authorization information.

Description

A kind of method and system of controlling non-host node type and scale
Technical field
The present invention relates to the Distributed Calculation field, relate in particular to a kind of method and system of controlling non-host node type and scale.
Background technology
Invention 200510109229 and 200910085813 all is a method of from program file, extracting the software copyright protection in partial code to the encryption device.Invention 200510109229 need be at each node deploy one cover hardware apparatus for protecting copyright, and for the cloud system environment, this scheme cost is higher, difficult in maintenance.Based on invention 200510109229 and 200910085813, the upgrading of platform scale or hardware resource very easily causes the replacing of apparatus for protecting copyright, and the system upgrade cost is higher.
And each node all is the node with standalone feature in the prior art, can't realize the control to interstitial content and type.
Summary of the invention
A kind of system that controls non-host node type and/or scale that the embodiment of the invention provides; Comprise registrar; The host node that links to each other with registrar and at least one the non-host node that links to each other with said host node; It is characterized in that: said registrar is used for to master node issues host node authorization message; Said host node; Be used for receiving the host node authorization message from registrar; Said host node authorization message comprises the maximum-norm and/or the type of extendible non-host node at least, and according to the maximum-norm of extendible non-host node and/or type to the non-host node authorization message of non-master node issues; Said non-host node is used for receiving authorization message from host node, and carries out corresponding operation according to said non-host node authorization message.
A kind of method of controlling non-host node type and/or scale that the embodiment of the invention provides; Be applied to the delamination software copyright protecting system; This system comprises registrar; The host node that links to each other with registrar and at least one the non-host node that links to each other with said host node is characterized in that:
Step 1: host node sends the host node register requirement to registrar;
Step 2: whether registrar checking host node register requirement is effective, if invalid, then refusal registration, flow process finishes; If effectively; Then generate the host node authorization message; Send to host node, said host node authorization message comprises the maximum-norm and/or the type of extendible non-host node at least, and according to the maximum-norm of extendible non-host node and/or type to the non-host node authorization message of non-master node issues;
Step 3: host node receives said host node authorization message;
Step 4: non-host node sends non-host node register requirement to host node;
Step 5: host node judges whether non-host node register requirement is effective; One of basis for estimation is whether the maximum-norm and/or the type of non-host node meets the maximum-norm of the extendible non-host node that comprises in the host node authorization message and/or the restriction of type; If effectively, then generate non-host node authorization message according to the host node authorization message; And non-host node authorization message sent to non-host node;
Step 6: non-host node is carried out corresponding operating according to non-host node authorization message.
Through by host node to the number of nodes of non-host node and/or the control of type, make and can effectively control non-host node scale.
Description of drawings
The delamination software copyright protecting system general structure sketch map that Fig. 1 provides for the embodiment of the invention;
The delamination software copyright protecting system concrete structure sketch map that Fig. 2 provides for the embodiment of the invention;
The delamination software copy-right protection method overall procedure sketch map that Fig. 3 provides for the embodiment of the invention;
The schematic flow sheet of first preferred embodiment of the delamination software copy-right protection method that Fig. 4 provides for the embodiment of the invention;
The schematic flow sheet of second preferred embodiment of the delamination software copy-right protection method that Fig. 5 provides for the embodiment of the invention;
The schematic flow sheet of the 3rd preferred embodiment of the delamination software copy-right protection method that Fig. 6 provides for the embodiment of the invention;
Delamination software copy-right protection method first partial view that Fig. 7 provides for the embodiment of the invention;
Delamination software copy-right protection method second partial view that Fig. 8 provides for the embodiment of the invention;
Delamination software copy-right protection method the 3rd partial view that Fig. 9 provides for the embodiment of the invention;
Delamination software copy-right protection method the 4th partial view that Figure 10 provides for the embodiment of the invention.
Embodiment
Referring to Fig. 1; The general illustration of the delamination software copyright protecting system that provides for the embodiment of the invention; This system comprises a registrar 101, the host node 201 that links to each other with registrar and at least one the non-host node 201 and 202 that links to each other with said host node.
Registrar is used for to master node issues host node authorization message; Said host node; Be used for receiving the host node authorization message from registrar; And produce non-host node authorization message according to the host node authorization message; Said host node authorization message comprises the maximum-norm and/or the type of extendible non-host node at least, and according to the maximum-norm of extendible non-host node and/or type to the non-host node authorization message of non-master node issues; Said non-host node is used for receiving authorization message from host node, and carries out corresponding operation according to said non-host node authorization message.
The concrete mode of controlling non-host node quantity and/or scale has following three kinds.
Mode one:
Said host node authorization message only comprises the maximum-norm of extendible non-host node; If the quantity of non-host node does not surpass said maximum-norm then accepts said non-host node register requirement; And to the non-host node authorization message of non-master node issues, said non-host node authorization message comprises the employable software function of said non-host node.
Mode two:
Said host node authorization message comprises the maximum-norm and the type of extendible non-host node; If the quantity of non-host node does not surpass said maximum-norm then refuses said non-host node register requirement; And the type matching of the extendible non-host node that comprises in the type of non-host node and the said host node authorization message is then accepted said non-host node register requirement; And to the non-host node authorization message of non-master node issues, said non-host node authorization message comprises the employable software function of said non-host node.
Mode three:
Said host node authorization message comprises the maximum-norm that type and each type allowed of extendible non-host node; If the type matching of the extendible non-host node that comprises in the type of non-host node and the said host node authorization message and the non-host node quantity of the type do not surpass the maximum-norm of the non-host node of the type; Then accept said non-host node register requirement; And to the non-host node authorization message of non-master node issues, said non-host node authorization message comprises the employable software function of said non-host node.
Participate in Fig. 2, be the concrete sketch map of delamination software copyright protecting system that the embodiment of the invention provides, wherein said registrar comprises the host node registrar, and said host node comprises the host node registered client.
Said have a host node registered client, is used for sending a registration sequence number to said host node registrar.
Said host node registrar is used to judge whether said registration sequence is number effective, if effectively then to master node issues host node authorization message.
Said host node authorization message comprises the maximum-norm and/or the type of extendible non-host node.
Said non-host node comprises non-host node registered client, and said host node comprises non-host node registrar, and said non-host node registered client is used for sending non-host node register requirement to non-host node registrar.
Non-host node registrar judges whether non-host node register requirement is effective, if effectively then to the non-host node authorization message of non-master node issues, said non-host node authorization message comprises the employable software function of said non-host node.Preferably, judge whether effective actual conditions comprises non-host node register requirement: said non-host node is not registered, and the quantity of non-host node surpasses maximum-norm.
Host node also comprises: a safety encipher module is used for the information on the host node is encrypted and/or decryption processing.But not host node then need not comprise the safety encipher module.
Host node also comprises: a host node copyright authentication module is used to verify the legitimacy and the validity of function in the host node.
Non-host node comprises a non-host node copyright authentication module, is used to verify the legitimacy and the validity of function in the non-host node.
Host node can be accomplished registration through LAN or global network, generates the certificate file with operator's signature, and certificate file has comprised the content of copyright file; Content file has defined the essential information of cloud system; The scale of cloud system, node type, information such as the valid expiration date of system; Content file has also been stipulated nodal function, information such as node hardware attributes.In addition, certificate file has comprised that also data encryption is to carry out through hardware encipher equipment to content of copyright file and system hardware finger print data summary encrypted ciphertext data.For the legitimacy that guarantees to authorize, certificate file has also comprised the digital signature of content file and hardware fingerprint being carried out by operator.Adopt this single host node copyright control pattern, make when change takes place for the framework of system and lower floor's equipment, need not to change the mode of copyright control, increased the flexibility of system simultaneously.
Non-host node passes through local area network (LAN); Host node through legal is authorized, according to authorized content (nodal function, node hardware attributes) the generation content file of host node; Hardware fingerprint information together with non-host node; The common certificate file that makes up non-host node also comprises the non-host node content file encrypted through host node and the summary ciphertext of finger print information in the certificate file, and the encrypting module of the encryption key of will making a summary through host node carries out encipherment protection; Protected data only is stored on the host node, makes on the non-host node by the operation of the protection module host node that places one's entire reliance upon.Non-host node is obtained the authorization from host node through local area network (LAN), has improved the speed of obtaining the authorization greatly, has reduced and has authorized the delay that is brought, and has improved the performance of system.
Encryption can be avoided the informative abstract of ciphertext protection is distorted, and promptly can prevent revision power content file and hardware fingerprint information, has guaranteed the integrality of content file information and hardware fingerprint.The integrality of content file information and hardware fingerprint can guarantee the legitimacy of content file and hardware platform, through the Sino-German constraint of legal content file, and scale that can Control Software System, valid expiration date, nodal function, information such as node hardware attributes.The checking burden that the two-stage registration of host node and non-host node and authentication mechanism can reduce host node reduces communicating by letter of host node and non-host node, improves the efficient of authority checking.Simultaneously only on host node, carry out encipherment protection, reduced the cost and the expense of hardware encipher.
The safety encipher module can be according to actual needs, considers to adopt the realization of different security encrypting module according to level of security or equipment cost; It can realize importing the symmetric cryptography (AES of data; DES, 3DES or the like) and decryption oprerations, extraneous interface can not be operated (read/write) to key.The safety encipher module is supported a plurality of keys, is divided into a secondary key and two kinds of keys repeatedly, and a secondary key only can once be encrypted and repeatedly deciphering, and this key is used for the data protection of host node.Repeatedly key can be used for repeatedly the encryption and decryption operation of data, and this key is used for the data protection of non-host node.The safety encipher module is not reproducible hardware unit, can be smart card, and single-chip microcomputer also can be other embedded device etc.In each cloud system, only need to dispose a safety encipher module and get final product.
The method has defined registration management server, host node, non-host node.Registration management server cloud system provider is that the client provides the equipment of system registry service, can be that be deployed in the network can remote access server, and personal computer also can be of portable form.Host node is the core node in the cloud system, can control the normal operation and the scale of whole cloud system, and non-host node is the functional node in the cloud system, can accomplish specific calculating or memory function.
Functional module in host node and the non-host node is the software protection object, and these modules can be accomplished and satisfy cloud platform primary demand.Host node is accomplished system registry through the host node registrar, and non-host node is accomplished registration through the non-host node registrar of host node deploy.The legitimacy of intranodal function and validity are accomplished through the copyright authentication module.The safety encipher module can realize sensitive data is carried out the security module of symmetric cryptography deciphering, can be software module, also can be hardware module.
Participate in Fig. 3, the delamination software copy-right protection method overall procedure sketch map that provides for the embodiment of the invention.
Be applied to like Fig. 1 or the described delamination software copyright protecting system of Fig. 2, this system comprises registrar, the host node that links to each other with registrar and at least one the non-host node that links to each other with said host node.
This method flow comprises the steps:
Step 1: host node sends the host node register requirement to registrar;
Step 2: whether registrar checking host node register requirement is effective, if invalid, then refusal registration, flow process finishes; If effectively, then generate the host node authorization message, send to host node, said host node authorization message comprises the maximum-norm and/or the type of extendible non-host node at least;
Step 3: host node receives said host node authorization message;
Step 4: non-host node sends non-host node register requirement to host node;
Step 5: host node judges whether non-host node register requirement is effective; One of basis for estimation is whether the maximum-norm and/or the type of non-host node meets the maximum-norm of the extendible non-host node that comprises in the host node authorization message and/or the restriction of type; If effectively, then generate non-host node authorization message according to the host node authorization message; And non-host node authorization message sent to non-host node;
Step 6: non-host node is carried out corresponding operating according to non-host node authorization message.
Referring to Fig. 4, be first preferred embodiment of the present invention.
Step 11: host node sends the host node register requirement to registrar;
Step 12: whether registrar checking host node register requirement is effective, if invalid, then refusal registration, flow process finishes; If effectively, then generate the host node authorization message, send to host node, the host node authorization message only comprises the maximum-norm of extendible non-host node;
Step 13: host node receives said host node authorization message;
Step 14: non-host node sends non-host node register requirement to host node;
Step 15: host node judges whether non-host node register requirement is effective, and one of basis for estimation is that the quantity of non-host node does not surpass said maximum-norm, if effectively, then generate non-host node authorization message according to the host node authorization message; And non-host node authorization message sent to non-host node;
Step 16: non-host node is carried out corresponding operating according to non-host node authorization message.
Participate in Fig. 5, be second preferred embodiment of the invention.
Step 21: host node sends the host node register requirement to registrar;
Step 22: whether registrar checking host node register requirement is effective, if invalid, then refusal registration, flow process finishes; If effectively, then generate the host node authorization message, send to host node, the host node authorization message comprises the maximum-norm and the type of extendible non-host node;
Step 23: host node receives said host node authorization message;
Step 24: non-host node sends non-host node register requirement to host node;
Step 25: host node judges whether non-host node register requirement is effective; One of basis for estimation is that the quantity of non-host node is then refused said non-host node register requirement above said maximum-norm; And the type matching of the extendible non-host node that comprises in the type of non-host node and the said host node authorization message; If effectively, then generate non-host node authorization message according to the host node authorization message; And non-host node authorization message sent to non-host node;
Step 26: non-host node is carried out corresponding operating according to non-host node authorization message.
Referring to accompanying drawing 6, be the 3rd preferred embodiment of the present invention.
Step 31: host node sends the host node register requirement to registrar;
Step 32: whether registrar checking host node register requirement is effective, if invalid, then refusal registration, flow process finishes; If effectively, then generate the host node authorization message, send to host node, the host node authorization message comprises the maximum-norm that type and each type allowed of extendible non-host node;
Step 33: host node receives said host node authorization message;
Step 34: non-host node sends non-host node register requirement to host node;
Step 35: host node judges whether non-host node register requirement is effective; One of basis for estimation is the maximum-norm that the non-host node quantity of type matching and the type of the extendible non-host node that comprises in type and the said host node authorization message of non-host node surpasses the non-host node of the type; If effectively, then generate non-host node authorization message according to the host node authorization message; And non-host node authorization message sent to non-host node;
Step 36: non-host node is carried out corresponding operating according to non-host node authorization message.
The detail of step 1-3 among Fig. 3 is described with reference to figure 7.
Step 71: the system registry sequence number that the client provides through friendly interface input system provider, each system all should create unique registration sequence number in advance.
Preferably, can comprise step 72: the host node registered client is obtained hardware information (can be Equipment Serial Numbers such as mainboard, CPU, internal memory, hard disk, network interface card) as hardware fingerprint, and sends to registrar together with sequence number and register.
Step 73: registration service judges that registration sequence number effectively, will and create the host node authorization message service time according to predefined software function, content of copyright file just here, and the content of copyright file mainly comprises:
The cloud system essential information;
The effective storage life of system;
System allows the maximum-norm of expansion;
Allow the node type of interpolation in the system;
Every category node effective efficiency is described and restriction in the system;
Other management or control information.
Step 74: calculate the informative abstract (MD2, MD5, SHA1, or SHA512 or the like) of content of copyright file, and the private key of using system provider signs, content file is sent to host node together with signature, and revise the registration sequence state.
Step 75: the validity of host node certifying signature.
Step 76: host node calculates the complex data summary of content file and hardware fingerprint information architecture, through the safety encipher module summary is encrypted, and generates the summary ciphertext.
Step 77: content file, signature and summary ciphertext are write rights file.
The detail of step 4-5 among Fig. 3 is described with reference to figure 8.
Step 81: non-host node sends to the registrar that operates on the host node with hardware fingerprint and node type.
Step 82: host node is judged register requirement effectively (this node is not by registration or do not exceed maximum-norm), based on authorized content in the rights file, generates the content file to this node.
Step 83: host node has the ID of uniqueness and creates a random symmetric key for this register node distribution, and content file, key and ID are sent to non-host node.
Step 84: at non-host node, will calculate content file and hardware fingerprint merges, and calculate the informative abstract of blended data, and summary encrypted, and destroy key through key.
Step 85: ID, content file and ciphertext are write certificate file, and the result is returned to host node.
Step 86: after host node is received correct result, through the safety encipher module key is encrypted the generation ciphertext, with ciphertext and together with ID, the register node hardware fingerprint is carried out this locality and is preserved the registration end.
The details of the step 6 among Fig. 3 is described with reference to accompanying drawing 9.
Step 91: non-host node ID and hardware fingerprint are sent to host node;
Step 92: host node is retrieved corresponding hardware fingerprint through ID, and two hardware fingerprint are identical, and host node will be deciphered encryption key through the safety encipher module, and key is sent to non-host node;
Step 93: non-host node is decomposed into content of copyright file and original digest cipher-text information with certificate file;
Step 94: non-host node obtains original digest through the secret key decryption ciphertext;
Step 95: the blended data summary that obtains content file and hardware fingerprint information;
Step 96:, show that then content file is effective if original digest is identical with new calculating summary;
Step 97: obtain corresponding function or control information according to content file, if operation meets the requirements, checking is passed through, and operation carries out.
After the step 3 of Fig. 3, if host node need be used the resource on any host node, need to carry out a host node proof procedure, this process is described with reference to accompanying drawing 10.
Step 101: certificate file is decomposed into content of copyright file and cipher-text information.
Step 102:, obtain original digest through safety encipher module decrypts ciphertext.
Step 103: the blended data summary that obtains content file and hardware fingerprint information.
Step 104:, show that then content file is effective if original digest is identical with new calculating summary.
Step 105: obtain corresponding function or control information according to content file, if operation meets the requirements, checking is passed through, and operation carries out.
To the content of above-mentioned accompanying drawing 7-10, various specific embodiments of independent assortment each other, for example certain specific embodiment has only used wherein certain accompanying drawing, the preferably content of Fig. 8.Perhaps, used the wherein content of several accompanying drawings, certain specific embodiment has for example utilized the content of accompanying drawing 7 and accompanying drawing 10.
Content to above-mentioned accompanying drawing 7-10 also can be applied in the preferred embodiment of accompanying drawing 4-6 alone or in combination.
Those skilled in the art should understand that embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt the form of the embodiment of complete hardware embodiment, complete software implementation example or combination software and hardware aspect.And the present invention can be employed in one or more computer storage availability that wherein include computer usable program code and tell the form that medium (including but not limited to magnetic disc store and optical memory etc.) is gone up the computer program of implementing.
Obviously, those skilled in the art can carry out various changes and modification to the present invention and not break away from the spirit and scope of the present invention.Like this, belong within the scope of claim of the present invention and equivalent technologies thereof if of the present invention these are revised with modification, then the present invention also is intended to comprise these changes and modification interior.

Claims (11)

1. the system of a control non-host node type and/or scale comprises registrar, and the host node that links to each other with registrar and at least one the non-host node that links to each other with said host node is characterized in that:
Said registrar is used for to master node issues host node authorization message;
Said host node; Be used for receiving the host node authorization message from registrar; Said host node authorization message comprises the maximum-norm and/or the type of extendible non-host node at least, and according to the maximum-norm of extendible non-host node and/or type to the non-host node authorization message of non-master node issues;
Said non-host node is used for receiving authorization message from host node, and carries out corresponding operation according to said non-host node authorization message.
2. according to the system of claim 1, said non-host node comprises non-host node registered client, and said host node comprises non-host node registrar, and said non-host node registered client is used for sending non-host node register requirement to non-host node registrar.
3. according to the system of claim 2; Said host node authorization message only comprises the maximum-norm of extendible non-host node; If the quantity of non-host node does not surpass said maximum-norm then accepts said non-host node register requirement; And to the non-host node authorization message of non-master node issues, said non-host node authorization message comprises the employable software function of said non-host node.
4. according to the system of claim 2; Said host node authorization message comprises the maximum-norm and the type of extendible non-host node; If the quantity of non-host node does not surpass said maximum-norm then refuses said non-host node register requirement; And the type matching of the extendible non-host node that comprises in the type of non-host node and the said host node authorization message is then accepted said non-host node register requirement; And to the non-host node authorization message of non-master node issues, said non-host node authorization message comprises the employable software function of said non-host node.
5. according to the system of claim 2; Said host node authorization message comprises the maximum-norm that type and each type allowed of extendible non-host node; If the type matching of the extendible non-host node that comprises in the type of non-host node and the said host node authorization message and the non-host node quantity of the type do not surpass the maximum-norm of the non-host node of the type; Then accept said non-host node register requirement; And to the non-host node authorization message of non-master node issues, said non-host node authorization message comprises the employable software function of said non-host node.
6. according to any system among the claim 1-5, said registrar comprises the host node registrar, and said host node comprises the host node registered client, wherein:
Said host node registered client is sent a registration sequence number to said host node registrar, and said host node registrar judges whether said registration sequence is number effective, if effectively then to master node issues host node authorization message.
7. according to any system among the claim 1-6, said host node comprises a safety encipher module, be used for the information on the host node is encrypted and/or decryption processing, and/or,
Said host node comprises a host node copyright authentication module, is used to verify the legitimacy and the validity of function in the host node, and/or,
Said non-host node comprises a non-host node copyright authentication module, is used to verify the legitimacy and the validity of function in the non-host node.
8. the method for a control non-host node type and/or scale; Be applied to the delamination software copyright protecting system; This system comprises registrar, and the host node that links to each other with registrar and at least one the non-host node that links to each other with said host node is characterized in that:
Step 1: host node sends the host node register requirement to registrar;
Step 2: whether registrar checking host node register requirement is effective, if invalid, then refusal registration, flow process finishes; If effectively, then generate the host node authorization message, send to host node, said host node authorization message comprises the maximum-norm and/or the type of extendible non-host node at least;
Step 3: host node receives said host node authorization message;
Step 4: non-host node sends non-host node register requirement to host node;
Step 5: host node judges whether non-host node register requirement is effective; One of basis for estimation is whether the maximum-norm and/or the type of non-host node meets the maximum-norm of the extendible non-host node that comprises in the host node authorization message and/or the restriction of type; If effectively, then generate non-host node authorization message according to the host node authorization message; And non-host node authorization message sent to non-host node;
Step 6: non-host node is carried out corresponding operating according to non-host node authorization message.
9. according to Claim 8 method; Said host node authorization message only comprises the maximum-norm of extendible non-host node; If the quantity of non-host node does not surpass said maximum-norm then accepts said non-host node register requirement; And to the non-host node authorization message of non-master node issues, said non-host node authorization message comprises the employable software function of said non-host node.
10. according to Claim 8 method; Said host node authorization message comprises the maximum-norm and the type of extendible non-host node; If the quantity of non-host node does not surpass said maximum-norm then refuses said non-host node register requirement; And the type matching of the extendible non-host node that comprises in the type of non-host node and the said host node authorization message is then accepted said non-host node register requirement; And to the non-host node authorization message of non-master node issues, said non-host node authorization message comprises the employable software function of said non-host node.
11. method according to Claim 8; Said host node authorization message comprises the maximum-norm that type and each type allowed of extendible non-host node; If the type matching of the extendible non-host node that comprises in the type of non-host node and the said host node authorization message and the non-host node quantity of the type do not surpass the maximum-norm of the non-host node of the type; Then accept said non-host node register requirement; And to the non-host node authorization message of non-master node issues, said non-host node authorization message comprises the employable software function of said non-host node.
CN2012101928600A 2012-06-12 2012-06-12 Method and system for controlling type and scale of non-host node Pending CN102739656A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012101928600A CN102739656A (en) 2012-06-12 2012-06-12 Method and system for controlling type and scale of non-host node

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012101928600A CN102739656A (en) 2012-06-12 2012-06-12 Method and system for controlling type and scale of non-host node

Publications (1)

Publication Number Publication Date
CN102739656A true CN102739656A (en) 2012-10-17

Family

ID=46994440

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012101928600A Pending CN102739656A (en) 2012-06-12 2012-06-12 Method and system for controlling type and scale of non-host node

Country Status (1)

Country Link
CN (1) CN102739656A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789095A (en) * 2017-03-30 2017-05-31 腾讯科技(深圳)有限公司 Distributed system and message treatment method
CN107079058A (en) * 2016-12-23 2017-08-18 深圳前海达闼云端智能科技有限公司 The business of block chain node performs method, device and node device
CN111737660A (en) * 2020-06-28 2020-10-02 浙江大华技术股份有限公司 Method, system and storage medium for realizing software authorization

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101105829A (en) * 2007-07-26 2008-01-16 华为技术有限公司 Utilization limit method, system and apparatus for media file
US20090013177A1 (en) * 2007-07-03 2009-01-08 Samsung Electronics Co., Ltd. License management system and method
CN102799807A (en) * 2012-06-15 2012-11-28 华为终端有限公司 Digital rights management content playing method, user equipment and domain manager

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090013177A1 (en) * 2007-07-03 2009-01-08 Samsung Electronics Co., Ltd. License management system and method
CN101105829A (en) * 2007-07-26 2008-01-16 华为技术有限公司 Utilization limit method, system and apparatus for media file
CN102799807A (en) * 2012-06-15 2012-11-28 华为终端有限公司 Digital rights management content playing method, user equipment and domain manager

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107079058A (en) * 2016-12-23 2017-08-18 深圳前海达闼云端智能科技有限公司 The business of block chain node performs method, device and node device
CN106789095A (en) * 2017-03-30 2017-05-31 腾讯科技(深圳)有限公司 Distributed system and message treatment method
CN106789095B (en) * 2017-03-30 2020-12-08 腾讯科技(深圳)有限公司 Distributed system and message processing method
CN111737660A (en) * 2020-06-28 2020-10-02 浙江大华技术股份有限公司 Method, system and storage medium for realizing software authorization
CN111737660B (en) * 2020-06-28 2023-11-17 浙江大华技术股份有限公司 Method, system and storage medium for realizing software authorization

Similar Documents

Publication Publication Date Title
CN101379487B (en) Method and apparatus for generating rights object by means of delegation of authority
CN103078858B (en) Based on the soft ware authorization trial method of web services and signing certificate
CN102271037B (en) Based on the key protectors of online key
CN101375309B (en) Method and apparatus for temporarily using DRM contents
CN101145906B (en) Method and system for authenticating legality of receiving terminal in unidirectional network
JP5365512B2 (en) Software IC card system, management server, terminal, service providing server, service providing method and program
CN101821746B (en) Device and method for backup of rights objects
WO2011152065A1 (en) Controller, control method, computer program, program recording medium, recording apparatus, and method of manufacturing recording apparatus
JPH11225142A (en) Authentication system and method
JP5380583B1 (en) Device authentication method and system
CN101286994A (en) Digital literary property management method, server and system for content sharing within multiple devices
JP3580333B2 (en) How to equip the encryption authentication function
CN102750479A (en) Method and system for layered software copyright protection
JP2005502269A (en) Method and apparatus for creating a digital certificate
CN103403729A (en) Secure management and personalization of unique code signing keys
JP4823704B2 (en) Authentication system, authentication information delegation method and security device in the same system
CN100410829C (en) Granting an access to a computer-based object
WO2024120051A1 (en) Permission control method for software program, and device
CN102739656A (en) Method and system for controlling type and scale of non-host node
CN101399663B (en) Method, system and device for digital content authentication
KR20100114321A (en) Digital content transaction-breakdown the method thereof
JP4840575B2 (en) Terminal device, certificate issuing device, certificate issuing system, certificate acquisition method and certificate issuing method
JP5296220B2 (en) Signature data server and user terminal
JP2009181598A (en) Information processor for digital right management
KR102055888B1 (en) Encryption and decryption method for protecting information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20121017

WD01 Invention patent application deemed withdrawn after publication