Science, Technology, Engineering and Mathematics.
Open Access

IMPLEMENTATION OF TRUELICENSE, AN OPEN-SOURCE CERTIFICATE MANAGEMENT ENGINE

Download as PDF

Volume 3, Issue 3, Pp 38-41, 2025

DOI: https://doi.org/10.61784/wms3077

Author(s)

ZheKai Huang

Affiliation(s)

Portland Institute, Nanjing University of Posts and Telecommunications, Nanjing 210023, Jiangsu, China.

Corresponding Author

ZheKai Huang

ABSTRACT

This article addresses the shortcomings of the open-source certificate management engine TrueLicense in terms of security, flexibility, and usability. A new license management system based on RSA asymmetric encryption and hardware binding is proposed, with a focus on strengthening three aspects: preventing time callback attacks through encrypted time anchors, transferring core verification logic to C++to resist JAVA decompilation risks, and implementing code obfuscation to protect software intellectual property. The system significantly improves authorization security through multiple security verification mechanisms, while adopting a non-invasive integrated design to lower the threshold for developers to use. This system can effectively defend against time callback attacks and license forgery, support distributed deployment in high concurrency scenarios, and provide an automated integration solution based on Maven. This article elaborates on the implementation principles, architecture design, and operational processes of the system, providing a reliable solution for enterprise level software authorization management.

KEYWORDS

TrueLicense framework; Key pair; Client-side validation; Three-tier architecture

CITE THIS PAPER

ZheKai Huang. Implementation of truelicense, an open-source certificate management engine. World Journal of Management Science. 2025, 3(3): 38-41. DOI: https://doi.org/10.61784/wms3077.

REFERENCES

[1] Zhang X, Li R, Wang Q, et al. Time-manipulation Attack: Breaking Fairness against Proof of Authority Aura. Proceedings of the ACM Web Conference, 2022: 2076–2086.

[2] Rúa E A, Salomón F J G, Pérez-Freire L. DEMO: Gradiant Asymmetric Encryption and verification systems based on handwritten signature. CCS’13: 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013.

[3] ISO/IEC/IEEE 26515: 2018(E): ISO/IEC/IEEE International Standard - Systems and software engineering? Developing information for users in an agile environment, 2018.

[4] Zheng J, Tong Z, Wu G, et al. Code Confusion confrontation method based on feature comparison. 2021 International Conference on Intelligent Computing, Automation and Systems (ICICAS), 2019: 61–65.

[5] Collberg C, Thomborson C, Low D. A Taxonomy of Obfuscating Transformations. Technical Report, 1997. https://researchspace.auckland.ac.nz/handle/2292/3491.

[6] Yu Y, Huang W, Zhang C. A New Centralized License Management Framework based on Internet of Things (IoT-CLMF). SPML 2024: 2024 7th International Conference on Signal Processing and Machine Learning, 2024: 328–334.

[7] Permit Implementation Principle and Operation Manual. Tencent Docs. 2023. https://docs.qq.com/doc/DT1R5ZUpteFhLa1FD.

[8] Lamport L, Shostak R, Pease M. The Byzantine Generals problem. ACM Transactions on Programming Languages and Systems, 1982, 4(3): 382–401.

All published work is licensed under a Creative Commons Attribution 4.0 International License. sitemap
Copyright © 2017 - 2025 Science, Technology, Engineering and Mathematics.   All Rights Reserved.