CN104484620B - A method of false sales volume and inventory are avoided in pin sales management cloud system fastly - Google Patents
A method of false sales volume and inventory are avoided in pin sales management cloud system fastly Download PDFInfo
- Publication number
- CN104484620B CN104484620B CN201410823874.7A CN201410823874A CN104484620B CN 104484620 B CN104484620 B CN 104484620B CN 201410823874 A CN201410823874 A CN 201410823874A CN 104484620 B CN104484620 B CN 104484620B
- Authority
- CN
- China
- Prior art keywords
- identification code
- functional module
- hardware identification
- client
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of method that false sales volume and inventory is avoided in pin sales management cloud system fastly, includes the following steps: that step 1, calling sequence number obtain module and generate the hardware identification code type of client, and obtain the hardware identification code of local device;Step 2, client request obtain the functional module that permission allows;Step 3, background server verifying account number and hardware identification code, if correctly, filter out with account number and the matched functional module of hardware identification code, and be digitally signed and encrypt;Step 4, client are decrypted, and parse verifying digital signature;Step 5, client run each functional module, and step 6, user submit data to be sent to background server plus the coding and digital signature of the functional module;Whether step 7, background server verifying digital signature are legal, legal, and submission stores data into database.The damage of company interest caused by dealer or business personnel under very good solution Kuai Xiao of the present invention enterprise fake.
Description
[technical field]
The present invention relates to a kind of methods that false sales volume and inventory is avoided in pin sales management cloud system fastly.
[background technique]
Information system undoubtedly can be improved the management level of enterprise, improve production efficiency, improve sale marketing efficiency, mention
Rise the benefits such as utilization of resources rate.Currently, be the system problem for solving different people, different post operations in information system,
Often through the control that different account rights are arranged, carry out links step in operating process to control different people.However, real
Situation is to be difficult to control well only by the control of account right, often since software operation can be used with Remote Installation
Occur often not telling another people account number in place due to personnel, by another people on behalf of operation, or in order to can
With the fraud of convenient data collaborative, directly switch account number on a computer using the same account number to complete industry by the same person
Business operation.For example, usually can all there is the dealer of dozens to hundreds of family to carry out merchandise sales under Kuai Xiao enterprise;Kuai Xiao enterprise is logical
It crosses and sells deposit system to dealer's configuration, dealer is allowed to input the real-time database that the information such as stock-taking and sales bill grasp enterprise
It deposits and sales situation.Since the interests of dealer and business personnel are often than more consistent, often join together to fake and juggle enterprise, very
The data of more dealers are all often by Regional Manager's business personnel's typing, if the operation of two people can be set as tying
Specific hardware device is closed, they are difficult to achieve the purpose that joint is faked.
[summary of the invention]
The technical problem to be solved in the present invention is that provide one kind avoids false sales volume in pin sales management cloud system fastly
With the method for inventory, dealer is easy to appear which solve the existing trade management system that disappears fastly and business personnel cooperates with fraud etc. to ask
Topic.
The present invention is implemented as follows:
A method of false sales volume and inventory being avoided in pin sales management cloud system fastly, is included the following steps:
Step 1, the starting of the log-in module of client, calling sequence number obtain the hardware identification code class that module generates client
Type, and according to the hardware identification code of hardware identification code type acquisition local device, to carry out user validation login authentication, account
It number is verified, enters step 2 acquisition operating rights;
Account number and its hardware identification code are sent background server by step 2, client, what request permission allowed
Functional module;
Step 3, background server verifying account and hardware identification code, if account number and hardware identification code are correct,
Filter out with account and the matched functional module of hardware identification code, and the functional module that encrypts of needs is digitally signed,
And functional module file is encrypted, and the functional module is downloaded to client, digital signature and functional module file
Encryption key use the corresponding hardware identification code of account;
Step 4, client downloads simultaneously store each functional module, functional module file are decrypted, and parse verifying
The digital signature of each functional module, is dynamically loaded into client if legal;If hardware identification code is not pair or number
It is not right to sign, then can not load the functional module;Use is loaded directly into for the functional module not encrypted;
Step 5, each functional module of client operation allow to grasp if account number and hardware identification code are all satisfied requirement
Make the module;
Step 6, user's operation finish, if there is submit data then add the functional module coding and the digital signature
It is sent to background server;
Whether the digital signature that step 7, background server verify the functional module is legal, legal, and submission stores data into
Database.
Further, the sequence number obtains the hardware device identification code that local device is obtained when module is used to start, institute
Stating hardware identification code type is the address network interface card mac, hard disk serial number, cpu sequence number or mainboard number or is above several
Combination;It is logged in if it is first time, client determines hardware identification code type by obtaining random code, obtains the one of local device
A hardware identification code, and in the client hardware identification code type note, being obtained when next time starts according to the random code type should
Hardware identification code;If client has been set hardware identification code type, hardware is directly obtained according to hardware identification code type
Identification code;The hardware identification code is by generating after encryption conversion.
Further, in the step 3, by the priority assignation module of background server, to the account number opened into
Row priority assignation, specifically: priority assignation, and specified hardware identification code are opened to each functional module;The functional module includes:
Sales bill typing, stock-taking, revenue shipment and arrival confirmation.
Further, in the step 4, the digital signature of each functional module is taken out by Authority Verification module, and and
The digital signature that hardware identification code on local device calculates is compared, and compares verifying correctly by ability dynamically load
The functional module, and allow the operation of user's progress corresponding module, otherwise operation indicating illegal operation please contact administrator.
Further, in the step 7, whether the digital signature that background server verifies the functional module is legal, tests
The method of card is: the digital signature that the hardware identification code uploaded when user is logged in is calculated is enclosed when submitting with data
Digital signature be compared, if unanimously, then submit store data into database, thereby further ensure that fake operation
Data can not be submitted correctly, and the information of recording exceptional operation log in systems.
The present invention has the advantage that
The present invention is to combine to carry out software operating right legitimacy by using the hardware identification code and account number of user equipment
Control, to control whether user can log in or operate certain module.It can be in the practical application for the trade management system that disappears fastly
Regional Manager or group leader cannot arbitrarily log in sell deposit system progress data modification and report, is sold by controlling respectively
Quotient, Regional Manager, area business personnel data inputting operating procedure operated on different account number different computers respectively, thus logical
The consistency for crossing verification data prevents Regional Manager and dealer from combining data fabrication.Operation of the present invention operation is succinct convenient, can
Lead to the damage to company interest with the dealer or business personnel's fraud under very good solution Kuai Xiao enterprise, while can also answer
In application system for needing control system operation to need to use in distinct device difference account number.
[Detailed description of the invention]
The present invention is further illustrated in conjunction with the embodiments with reference to the accompanying drawings.
Fig. 1 is the flow diagram of the method for the present invention.
[specific embodiment]
Referring to Fig. 1, a kind of method that false sales volume and inventory is avoided in pin sales management cloud system fastly, including it is as follows
Step:
Step 1, the starting of the log-in module of client, calling sequence number obtain the hardware identification code class that module generates client
Type, and according to the hardware identification code of hardware identification code type acquisition local device, to carry out user validation login authentication, account
It number is verified, enters step 2 acquisition operating rights;The local device is generally computer or tablet computer or mobile phone;
The sequence number obtains the hardware device identification code that local device is obtained when module is used to start, the hardware identification
Code type is the address network interface card mac, hard disk serial number, cpu sequence number or mainboard number or is above several combination;If
It is to log in for the first time, client determines hardware identification code type by obtaining random code, and a hardware for obtaining local device is known
Other code, and in the client hardware identification code type note, the hardware identification is obtained according to the random code type when next time starts
Code;If client has been set hardware identification code type, hardware identification code is directly obtained according to hardware identification code type;Institute
Stating hardware identification code is by generating after encryption conversion;The hardware identification code type, each equipment can be randomly selected (can
With preparatory preset 10 kinds of rules), and remember in local device, next time still uses the hardware identification code type, if changing computer
Or refitting system needs to reset hardware identification code in background server;Due to using the ID combination producing hardware identification of device hardware
Code, and the hardware identification code type that every equipment obtains is not necessarily, therefore can preferably prevent user from using and distort
The method of device identification is played tricks use;
Account number and its hardware identification code are sent background server by step 2, client, what request permission allowed
Functional module;
Step 3, background server verifying account and hardware identification code, if account number and hardware identification code are correct,
Filter out with account and the matched functional module of hardware identification code, and the functional module that encrypts of needs is digitally signed,
And functional module file is encrypted, and the functional module is downloaded to client, digital signature and functional module file
Encryption key use the corresponding hardware identification code of account;
By the priority assignation module of background server, priority assignation is carried out to the account number opened, specifically: to each
Functional module opens priority assignation, and specified hardware identification code, the hardware identification code can be current account number login user institute
In the identification code (can upload when system login) of equipment, the typing after oral offer after client query by user can also be used;
The functional module includes: sales bill typing, stock-taking, revenue shipment and arrival confirmation;
Step 4, client downloads simultaneously store each functional module, functional module file are decrypted, and parse verifying
The digital signature of each functional module, is dynamically loaded into client if legal;If hardware identification code is not pair or number
It is not right to sign, then can not load the functional module;Use is loaded directly into for the functional module not encrypted;
Take out the digital signature of each functional module by Authority Verification module, and with the hardware identification code on local device
The digital signature calculated is compared, and compares verifying correctly by the ability dynamically load functional module, and allow user
The operation of corresponding module is carried out, otherwise operation indicating illegal operation please contact administrator.
Step 5, each functional module of client operation allow to grasp if account number and hardware identification code are all satisfied requirement
Make the module;
Step 6, user's operation finish, if there is submit data then add the functional module coding and the digital signature
It is sent to background server;
Whether the digital signature that step 7, background server verify the functional module is legal, legal, and submission stores data into
The method of database, verifying is: the digital signature and number that the hardware identification code uploaded when user is logged in is calculated
It is compared according to digital signature appended when submitting, if unanimously, then submitting and storing data into database, thus further really
The data for protecting operation of faking can not be submitted correctly, and the information of recording exceptional operation log in systems.
The present invention makes full use of the feature and some relative complex Encryption Algorithm of the hardware facility of user equipment, by right
The corresponding functional module setting operating right of business operation simultaneously verifies hardware identification code, specifies each business operation can only be specified
Equipment and designated person's account number operate.MAC Address, the CPU sequence number, hard disk of user equipment are acquired when logging in for the first time
Sequence number etc., transmission is saved in background data base after then being encrypted by MD5 (or other) algorithm, and then different personnel step on
The permission for corresponding to account number with background server again by the hardware identification code of current device when the account number of land is checked, and is obtained
Corresponding functional module, so that reaching dealer and producer business personnel etc. arbitrarily login system cannot carry out data modification and upper
Report, or even if logging in rear certain nucleus modules can not be operated.Data that are last and submitting to each authority module count
According to signature authentication, operated on designated equipment, in specified operating procedure to reach control designated person's account number well
Purpose, business operation can be carried out on the same device so as to avoid the account number of different rights, reach improve data make
False difficulty.
Although specific embodiments of the present invention have been described above, those familiar with the art should be managed
Solution, we are merely exemplary described specific embodiment, rather than for the restriction to the scope of the present invention, it is familiar with this
The technical staff in field should be covered of the invention according to modification and variation equivalent made by spirit of the invention
In scope of the claimed protection.
Claims (5)
1. a kind of method for avoiding false sales volume and inventory in pin sales management cloud system fastly, which is characterized in that including as follows
Step:
Step 1, the starting of the log-in module of client, calling sequence number obtain the hardware identification code type that module generates client,
And the hardware identification code of local device is obtained according to hardware identification code type, to carry out user validation login authentication, account number
It is verified, enters step 2 acquisition operating rights;
Account number and its hardware identification code are sent background server, the function that request permission allows by step 2, client
Module;
Step 3, background server verifying account and hardware identification code filter if account number and hardware identification code are correct
Out with account and the matched functional module of hardware identification code, and the functional module that encrypts of needs is digitally signed, and
Functional module file is encrypted, and the functional module is downloaded to client, digital signature and functional module file plus
Key uses the corresponding hardware identification code of account;
Step 4, client downloads simultaneously store each functional module, and functional module file is decrypted, and it is each to parse verifying
The digital signature of functional module, is dynamically loaded into client if legal;If hardware identification code is not pair or digital signature
It is not right, then it can not load the functional module;Use is loaded directly into for the functional module not encrypted;
Step 5, client run each functional module, if account number and hardware identification code are all satisfied requirement, allowing to operate should
Module;
Step 6, user's operation finish, and if there is submitting, data then add the coding of the functional module and the digital signature is sent
To background server;
Whether the digital signature that step 7, background server verify the functional module is legal, legal, and submission stores data into data
Library.
2. a kind of method that false sales volume and inventory is avoided in pin sales management cloud system fastly according to claim 1,
It is characterized by: the sequence number obtains the hardware device identification code for obtaining local device when module is used to start, the hardware
Identity type is the address network interface card mac, hard disk serial number, cpu sequence number or mainboard number or is above several combination;
It is logged in if it is first time, client determines hardware identification code type by obtaining random code, and one for obtaining local device is hard
Part identification code, and in the client hardware identification code type note, the hardware is obtained according to the random code type when next time starts
Identification code;If client has been set hardware identification code type, hardware identification is directly obtained according to hardware identification code type
Code;The hardware identification code is by generating after encryption conversion.
3. a kind of method that false sales volume and inventory is avoided in pin sales management cloud system fastly according to claim 1,
It is characterized by:, by the priority assignation module of background server, carrying out permission to the account number opened in the step 3
Setting, specifically: priority assignation, and specified hardware identification code are opened to each functional module;The functional module includes: sales slip
Confirm according to typing, stock-taking, revenue shipment and arrival.
4. a kind of method that false sales volume and inventory is avoided in pin sales management cloud system fastly according to claim 1,
It is characterized by: taking out the digital signature of each functional module by Authority Verification module, and and locally set in the step 4
The digital signature that standby upper hardware identification code calculates is compared, and compares verifying correctly by the ability dynamically load function
Module, and allow the operation of user's progress corresponding module, otherwise operation indicating illegal operation please contact administrator.
5. a kind of method that false sales volume and inventory is avoided in pin sales management cloud system fastly according to claim 1,
It is characterized by: whether the digital signature that background server verifies the functional module is legal in the step 7, the side of verifying
Method is: the digital signature and data that the hardware identification code uploaded when user is logged in is calculated appended number when submitting
Signature is compared, if unanimously, then submit store data into database, thereby further ensure that fake operation data without
Method is correctly submitted, and the information of recording exceptional operation log in systems.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410823874.7A CN104484620B (en) | 2014-12-26 | 2014-12-26 | A method of false sales volume and inventory are avoided in pin sales management cloud system fastly |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410823874.7A CN104484620B (en) | 2014-12-26 | 2014-12-26 | A method of false sales volume and inventory are avoided in pin sales management cloud system fastly |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104484620A CN104484620A (en) | 2015-04-01 |
CN104484620B true CN104484620B (en) | 2019-03-05 |
Family
ID=52759161
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410823874.7A Active CN104484620B (en) | 2014-12-26 | 2014-12-26 | A method of false sales volume and inventory are avoided in pin sales management cloud system fastly |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104484620B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107563684A (en) * | 2017-07-28 | 2018-01-09 | 广州亿程交通信息有限公司 | Dealer's vehicle inventory management method |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106911632B (en) * | 2015-12-22 | 2019-12-13 | ***通信集团辽宁有限公司 | Method and system for packaging calling capability |
CN106485099B (en) * | 2016-09-28 | 2020-05-08 | 上海奕瑞光电子科技股份有限公司 | Method and system for authorizing flat panel detector on demand |
CN107242854B (en) * | 2017-05-27 | 2020-03-06 | 西安邮电大学 | Intelligent medical system based on safety communication |
CN109461005A (en) * | 2018-06-25 | 2019-03-12 | 浙江苏泊尔家电制造有限公司 | Prevent method, cooking apparatus, mobile terminal and the server of cross selling |
CN110765149B (en) * | 2019-10-30 | 2023-04-28 | 南宁市指搜信息技术有限公司 | Intelligent device full life cycle monitoring query and user identity recognition binding system |
CN111488361A (en) * | 2020-04-17 | 2020-08-04 | 北京中启智源数字信息技术有限责任公司 | Cross report generation method and system |
CN112468609A (en) * | 2020-11-16 | 2021-03-09 | 深圳市联新移动医疗科技有限公司 | Method and system for acquiring unique identification code of hardware equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102938120A (en) * | 2011-08-15 | 2013-02-20 | 徐雷 | IP multimedia subsystem (IMS) trade payment system |
CN103095456A (en) * | 2013-01-10 | 2013-05-08 | 天地融科技股份有限公司 | Method and system for processing transaction messages |
CN103186842A (en) * | 2011-12-30 | 2013-07-03 | ***通信集团贵州有限公司 | Shop purchase-sell-stock management system and shop purchase-sell-stock management method |
CN103824170A (en) * | 2014-03-23 | 2014-05-28 | 倪继超 | Mobile phone buying and selling client based on two-dimension codes, system and buying and selling management method |
CN103914775A (en) * | 2012-12-31 | 2014-07-09 | ***通信集团浙江有限公司 | Channel production management and control system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110208659A1 (en) * | 2006-08-15 | 2011-08-25 | Last Mile Technologies, Llc | Method and apparatus for making secure transactions using an internet accessible device and application |
FR2965431B1 (en) * | 2010-09-28 | 2013-01-04 | Mouchi Haddad | SYSTEM FOR EXCHANGING DATA BETWEEN AT LEAST ONE TRANSMITTER AND ONE RECEIVER |
-
2014
- 2014-12-26 CN CN201410823874.7A patent/CN104484620B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102938120A (en) * | 2011-08-15 | 2013-02-20 | 徐雷 | IP multimedia subsystem (IMS) trade payment system |
CN103186842A (en) * | 2011-12-30 | 2013-07-03 | ***通信集团贵州有限公司 | Shop purchase-sell-stock management system and shop purchase-sell-stock management method |
CN103914775A (en) * | 2012-12-31 | 2014-07-09 | ***通信集团浙江有限公司 | Channel production management and control system |
CN103095456A (en) * | 2013-01-10 | 2013-05-08 | 天地融科技股份有限公司 | Method and system for processing transaction messages |
CN103824170A (en) * | 2014-03-23 | 2014-05-28 | 倪继超 | Mobile phone buying and selling client based on two-dimension codes, system and buying and selling management method |
Non-Patent Citations (1)
Title |
---|
"基于.NET的企业进销存管理***的设计与实现";郭旭;《中国优秀硕士学位论文全文数据库 信息科技辑》;20141015(第10期);第I138-191页,第3章 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107563684A (en) * | 2017-07-28 | 2018-01-09 | 广州亿程交通信息有限公司 | Dealer's vehicle inventory management method |
Also Published As
Publication number | Publication date |
---|---|
CN104484620A (en) | 2015-04-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104484620B (en) | A method of false sales volume and inventory are avoided in pin sales management cloud system fastly | |
CN109274652B (en) | Identity information verification system, method and device and computer storage medium | |
US10808427B1 (en) | Smart lock box | |
WO2017197974A1 (en) | Biometric characteristic-based security authentication method, device and electronic equipment | |
CN106104563B (en) | The technology of network security is provided by the account opened on time just | |
US9892404B2 (en) | Secure identity authentication in an electronic transaction | |
CN108898389A (en) | Based on the content verification method and device of block chain, electronic equipment | |
CN108111473B (en) | Unified management method, device and system for hybrid cloud | |
US11418499B2 (en) | Password security | |
CN104104672A (en) | Method for establishing dynamic authorization code based on identity authentication | |
CN112527912B (en) | Data processing method and device based on block chain network and computer equipment | |
EP4367841A1 (en) | Systems and method for providing security against deception and abuse in distributed and tokenized environments | |
WO2019011187A1 (en) | Method, device, and apparatus for loss reporting, removing loss report, and service management of electronic account | |
CN107196943B (en) | A kind of security display implementation method of private data in third-party platform | |
CN109067785A (en) | Cluster authentication method, device | |
CN111460400A (en) | Data processing method and device and computer readable storage medium | |
CN104125230A (en) | Short message authentication service system and authentication method | |
CN115829574A (en) | Data asset transaction system and method based on block chain | |
CN106209751A (en) | Service-oriented interface authentication method based on the operating system certificate of authority | |
CN112883425A (en) | Data processing method based on block chain and block chain link point | |
CN112488707A (en) | Service flow supervision method and system | |
CN113869901B (en) | Key generation method, key generation device, computer-readable storage medium and computer equipment | |
CN115913734A (en) | User authority management method, device and equipment applied to alliance chain | |
CA3226273A1 (en) | User authentication | |
CN107395344A (en) | User profile guard method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |