CN106022093A - Device authorization and timing management method and device - Google Patents

Device authorization and timing management method and device Download PDF

Info

Publication number
CN106022093A
CN106022093A CN201610342050.7A CN201610342050A CN106022093A CN 106022093 A CN106022093 A CN 106022093A CN 201610342050 A CN201610342050 A CN 201610342050A CN 106022093 A CN106022093 A CN 106022093A
Authority
CN
China
Prior art keywords
authorization message
authorization
sub
log information
managed devices
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610342050.7A
Other languages
Chinese (zh)
Other versions
CN106022093B (en
Inventor
徐逢春
张力
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Quasi (beijing) Electronic Technology Co Ltd
Original Assignee
Quasi (beijing) Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Quasi (beijing) Electronic Technology Co Ltd filed Critical Quasi (beijing) Electronic Technology Co Ltd
Priority to CN201610342050.7A priority Critical patent/CN106022093B/en
Publication of CN106022093A publication Critical patent/CN106022093A/en
Application granted granted Critical
Publication of CN106022093B publication Critical patent/CN106022093B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a device authorization and timing management method and device. By applying the technical scheme disclosed by the invention, the management system and device store use authorization information of a managed device in an encryption mode; when the management system and device are applied to the managed device, use timing can be carried out on the device based on different needs, and flexible adjustment and authorization can be carried out on use of the managed device based on specific different conditions; and therefore, on the basis of saving the management and manpower cost, the business application range is expanded.

Description

A kind of device authorization and timer supervision method and device
Technical field
The invention relates to electronic technology field, particularly relate to a kind of device authorization and timer supervision method.The application also relates to a kind of device authorization and timer supervision device.
Background technology
In current industrial production, the charter business of instrument and equipment, because of the feature that its motility is high, cost performance is high, is increasingly favored by client.In leasing of equipment, equipment supplier suffers from a problem that and is, client has various different needs for duration and the date of leased equipment, different needs various for client and the different scenes etc. of application, equipment supplier needs this pays more management cost and human cost, carries out the operation at scene.It addition, the software and hardware system of managed devices is needed to repeat dismounting and transport, generally, in addition it is also necessary to pay certain logistics cost or other costs, cause the waste of resource.
Summary of the invention
Defect for prior art, a kind of method that present applicant proposes device authorization and timer supervision, for use duration, number of times and the date of managed devices being controlled automatically according to authorization message, thus save management and expend with logistics cost and manpower, this authorization management method be applied to include device authorization with in the system of timer supervision device and managed devices, presetting the management software adaptive with timer supervision device with described device authorization in described managed devices, the method includes:
When with timer supervision device, device authorization detects that managed devices starts, described device authorization and timer supervision device obtain the mark of described managed devices by described management software, and obtain the log information corresponding with described mark and authorization message, described device authorization and timer supervision device have the corresponding relation between described mark, described log information and described authorization message, described authorization message is made up of sub-authorization message, and each described sub-authorization message specifies function corresponding with each of described managed devices;
Whether each sub-authorization message that described device authorization judges in described authorization message according to described log information with timer supervision device lost efficacy;
Described device authorization terminates described managed devices with timer supervision device and runs the function corresponding with the sub-authorization message lost efficacy, and after the use time according to described managed devices updates the log information that the sub-authorization message not lost efficacy is corresponding, whether lost efficacy according to each sub-authorization message that described log information judges in described authorization message.
Preferably, whether each sub-authorization message that described device authorization judges in described authorization message according to described log information with timer supervision device lost efficacy, particularly as follows:
If each sub-authorization message that described device authorization judges in described authorization message according to described log information with timer supervision device lost efficacy, described device authorization and timer supervision device issue authorization signaling 0 in fixed signal position, and described authorization signaling runs the function corresponding with described failed sub-authorization message for terminating described managed devices;
If each sub-authorization message that described device authorization judges in described authorization message according to described log information with timer supervision device did not lost efficacy, described device authorization and timer supervision device issue authorization signaling 1 in fixed signal position, and described authorization signaling runs the function corresponding with the described sub-authorization message not lost efficacy for starting described managed devices;
Preferably, described device authorization searches the log information corresponding with described device identification with timer supervision device, described log information comprises the record of use of First ray number and described managed devices, described sub-authorization message comprises each functional module usable record of the second serial number and described managed devices, whether each sub-authorization message that described device authorization judges in described authorization message according to described log information with timer supervision device lost efficacy, particularly as follows:
Judge that described First ray number is the most consistent with described second serial number;
If described First ray number is consistent with described second serial number, it is judged that the described scope having used record whether to exceed described usable record;
If the determination result is YES, confirm that described sub-authorization message lost efficacy;
If judged result is no, confirm that described sub-authorization message did not lost efficacy.
Preferably, also include:
If described First ray number is inconsistent with described second serial number, described device authorization then generates the new log information corresponding with authorization message with timer supervision device, and the second serial number of described log information is consistent with First ray number.
Preferably, determine that using in described log information records without departing from the used record in described sub-authorization message with specific reference to following condition:
In described sub-authorization message, access times are more than the access times in described log information;And/or,
Described sub-authorization message use duration more than the use duration in described log information;And/or,
The date is used not less than described sub-authorization message uses the date described in described log information.
Preferably, described device authorization updates, according to the use time of described managed devices, the log information that the described sub-authorization message not lost efficacy is corresponding with timer supervision device, particularly as follows:
When described device authorization and timer supervision device issue described authorization order, described managed devices is carried out timing, timing content includes: switching on and shutting down number of times, duration, use date, after preset time period, described log information is updated, after described log information has updated, judge according to the log information after described renewal whether the described sub-authorization message of correspondence lost efficacy.
Preferably, after described device authorization terminates, with timer supervision device, the function that the operation of described managed devices is corresponding with the sub-authorization message lost efficacy, also include:
Described device authorization is sending, to the management software of managed devices, the information that runs abort with timer supervision device, the described information that runs abort is carried the alarm of the appointment function being terminated, so that described management software sends notice to the user of described managed devices.
A kind of device authorization and timer supervision device, it is characterized in that, described device is applied to include that device authorization, with the system of timer supervision device and managed devices, presets the management software adaptive with timer supervision device with described device authorization in described managed devices, and this device includes:
Described device detects when managed devices starts, described device obtains the mark of described managed devices by described management software, and obtain the log information corresponding with described mark and authorization message, described device has the corresponding relation between described mark, described log information and described authorization message, described authorization message is made up of sub-authorization message, and each described sub-authorization message specifies function corresponding with each of described managed devices;
Whether each sub-authorization message that described device judges in described authorization message according to described log information lost efficacy;
Described device terminates described managed devices and runs the function corresponding with the sub-authorization message lost efficacy, and after the use time according to described managed devices updates the log information that the sub-authorization message not lost efficacy is corresponding, whether lost efficacy according to each sub-authorization message that described log information judges in described authorization message.
Preferably, whether each sub-authorization message that described device judges in described authorization message according to described log information lost efficacy, particularly as follows:
If each sub-authorization message that described device judges in described authorization message according to described log information lost efficacy, described device issues authorization signaling 0 in fixed signal position, runs the function corresponding with described failed sub-authorization message for terminating described managed devices;
If each sub-authorization message that described device judges in described authorization message according to described log information did not lost efficacy, described device issues authorization signaling 1 in fixed signal position, runs the function corresponding with the described sub-authorization message not lost efficacy for starting described managed devices;
Preferably, described device authorization searches the log information corresponding with described device identification with timer supervision device, described log information comprises the record of use of First ray number and described managed devices, described sub-authorization message comprises each functional module usable record of the second serial number and described managed devices, whether each sub-authorization message that described device judges in described authorization message according to described log information lost efficacy, particularly as follows:
Judge that described First ray number is the most consistent with described second serial number;
If described First ray number is consistent with described second serial number, it is judged that the described scope having used record whether to exceed described usable record;
If the determination result is YES, confirm that described sub-authorization message lost efficacy;
If judged result is no, confirm that described sub-authorization message did not lost efficacy.
Preferably, also include: if described First ray number is inconsistent with described second serial number, described device then generates the new log information corresponding with authorization message, and the second serial number of described log information is consistent with First ray number.
Preferably, determine that using in described log information records without departing from the used record in described sub-authorization message with specific reference to following condition:
In described sub-authorization message, access times are more than the access times in described log information;And/or,
Described sub-authorization message use duration more than the use duration in described log information;And/or,
The date is used not less than described sub-authorization message uses the date described in described log information.
Preferably, described device updates, according to the use time of described managed devices, the log information that the described sub-authorization message not lost efficacy is corresponding, particularly as follows:
When described device issues described authorization order, described managed devices is carried out timing, timing content includes: switching on and shutting down number of times, duration, use date, after preset time period, described log information is updated, after described log information has updated, judge according to the log information after described renewal whether the described sub-authorization message of correspondence lost efficacy.
Preferably, after described device terminates the function that the operation of described managed devices is corresponding with the sub-authorization message lost efficacy, also include:
Described device runs abort information sending to the management software of managed devices, described in run abort and information carried the alarm of the appointment function being terminated, so that described management software sends notice to the user of described managed devices.
Compared with prior art, by applying the technical scheme of the application, the managing device use authorization message of cipher mode storage managed devices, it is applied in managed devices, can carry out using timing to equipment based on different needs, and based on concrete different situations, the use of managed devices can be adjusted flexibly and authorizes.The business scope of application is extended on the basis of saving management and human cost.
Accompanying drawing explanation
Fig. 1 is a kind of device authorization structural representation with timer supervision device of the application specific embodiment proposition;
Fig. 2 is a kind of device authorization schematic flow sheet with timer supervision method of the application specific embodiment proposition.
Detailed description of the invention
For problems of the prior art, the present invention proposes a kind of authorization management method, this authorization management method be applied to include device authorization with in the system of timer supervision device and managed devices, as it is shown in figure 1, a kind of device authorization proposed for the application specific embodiment and timer supervision device and the schematic diagram of managed devices;Device authorization is connected with managed devices with timer supervision device, it is powered by managed devices, managed devices is preset the management software adaptive with timer supervision device with described device authorization, after the functional module of managed devices is authorized by device authorization and timer supervision device, the software startup optimization of the functional module of managed devices.
In order to the technological thought of the present invention is expanded on further, in conjunction with concrete application scenarios, technical scheme is illustrated, a kind of authorization management method that the embodiment of the present application proposes, be applied in device authorization as shown in Figure 1 and timer supervision device and managed devices system.
Managed devices is wherein preset with the management software adaptive with timer supervision device with device authorization, comprising the information such as the device identification of managed devices and the functional module coding of managed devices in management software, the authorization signaling that management software issues by reading empowerment management equipment controls the operation of function.
As in figure 2 it is shown, a kind of device authorization proposed for the embodiment of the present application and the schematic flow sheet of timer supervision method.
Step 101, detect when managed devices starts, the authorization message of managed devices is encrypted checking, the encrypted authentication algorithm carried out includes md5 encryption, rsa encryption, AES encryption, any one or more in the cipher modes such as 3DES encryption, after managed devices is verified, is obtained the device identification of managed devices by the management software in managed devices, obtain log information corresponding in empowerment management equipment and authorization message according to the mark of managed devices.
Wherein, authorization message is corresponding with the device identification of managed devices, authorization message is formed and comprises the second serial number by one or more sub-authorization messages, each sub-authorization message specifies function corresponding with each of managed devices, sub-authorization message and the functional module one_to_one corresponding in managed devices, each sub-authorization message includes functional module coding and the usable record of managed devices of managed devices;Log information and the device identification one_to_one corresponding of managed devices, comprise use record and the First ray number of this equipment and each functional module, the mark of managed devices, log information and the authorization message one_to_one corresponding of managed devices.
Step 102, search the log information corresponding with device identification, when the authorization message found the second serial number and log information First ray number not in the presence of, show that authorization message is newly written device authorization and timer supervision device, generating new log information, the First ray number of the new log information of generation is consistent with the serial number of corresponding authorization message;When the second serial number of the authorization message found and the First ray number of log information are the most inconsistent, generating the new log information that authorization message is corresponding, the First ray number of the log information of generation is consistent with the second serial number of authorization message.
In authorization message, the used record of each sub-authorization message includes: uses duration, access times, uses the date etc.;The use record of the managed devices in usage log information includes: uses duration, access times, uses the date etc..
Step 103, according to the managed devices in log information use record judge whether each sub-authorization message in authorization message lost efficacy, if meet following condition any one; sub-authorization message inefficacy:
(1) access times during access times are less than log information in sub-authorization message;
(2) sub-authorization message use duration less than the use duration in log information;
(3) the use date in log information exceedes the use date in sub-authorization message.
Step 104, lost efficacy if judged result is the authorization message in sub-authorization message, issued authorization signaling 0 in fixed signal position, and its flag bit is that the authorization signaling of 0 runs for terminating the functional module corresponding with sub-authorization message;
Not losing efficacy if judged result is the authorization message in sub-authorization message, and issued authorization signaling 1 in fixed signal position, its flag bit is that the authorization signaling of 1 runs for starting the functional module corresponding with sub-authorization message.
Step 105, if sub-authorization message lost efficacy, it is managed after software receives the authorization signaling that flag bit is 0, terminate managed devices and run the functional module running software corresponding with the sub-authorization message lost efficacy, the function stop operation that sub-authorization message is corresponding, and after the log information that the sub-authorization message using record renewal not lose efficacy according to managed devices is corresponding, with whether each sub-authorization message judged in authorization message according to log information lost efficacy.
Step 106, managed devices functional module starts backward device authorization and sends timing notice with timer supervision device, device authorization and timer supervision device carry out timing to managed devices after receiving, and timing content includes: timing in real time, switching on and shutting down number of times calendar scheduling, after preset duration, log information is updated, the content updated includes: uses time, access times, uses the date etc., after log information has updated, perform step 103.
Step 107, after terminating the function that managed devices operation is corresponding with the sub-authorization message lost efficacy, the information that runs abort is sent to the management software of managed devices, the information that wherein runs abort is carried the alarm of the appointment function being terminated, send notice by management software to the user of managed devices, specifically can be exported by audio frequency or show the modes such as output.
Based on above-mentioned device authorization and timer supervision device and the system of managed devices, another embodiment of the present invention provides a kind of authorization management method, in order to simplify existing recording control apparatus, save management cost and waste of human resource;
Step 201, device authorization and timer supervision device pass through to read in the USB interface management software preset from managed devices the device identification of managed devices, the device identification that comparison authorization message is carried and the device identification of managed devices, it is judged that whether the managed devices currently accessed is the equipment that in empowerment management equipment, authorization message is corresponding.
Step 202, if the device identification that authorization message is carried is mated with the device identification of managed devices, module coding in sub-authorization message is coded into row with timer supervision device and mates by device authorization with module in the management software of managed devices, judge the usage log information whether in device authorization and timer supervision device with sub-authorization message corresponding module, perform step 203.
Step 203, if there is not log information in being not detected by currently, then generates the log information corresponding with sub-authorization message, performs step 205.
If detecting that current device authorizes in timer supervision device to there is log information, judge that the authorization message serial number in sub-authorization message is the most consistent with the serial number of log information, if both serial numbers are identical, if both serial numbers are different, then continue to search for the log information corresponding with sub-authorization message, until the log information found is consistent with existing sub-authorization message serial number, perform step 204;If not finding the log information consistent with authorization message serial number, then generating new log information, the serial number of newly-generated daily record is consistent with the serial number of authorization message, performs step 205.
Step 204, judge the use of every sub-authorization message can use record and the record of use in log information, such as access times are recorded more than the access times having used record in log information if sub-authorization message can use, and use duration more than the use duration in log information, and log information uses the date not less than the use date in sub-authorization message, then perform step 205.
If information such as access times are less than the access times in log information information in sub-authorization message, and use duration is more than the use duration in log information, and uses the date not less than the use date in sub-authorization message in log information;
Or, if information such as access times are more than the access times in log information in sub-authorization message, and use duration is less than the use duration in log information, and uses the date not less than the use date in sub-authorization message in log information;
Or, if information such as access times are more than the access times in log information in sub-authorization message, and use duration is more than the use duration in log information, and uses the date to exceed the use date in sub-authorization message in log information;
Meet above-mentioned three kinds of conditions any one, then perform step 206.
Step 205, according to the coding of the functional module of managed devices corresponding to sub-authorization message, issues corresponding functional module and starts authorization:
If managed devices the corresponding function module software is in state to be launched, now the functional module software receipt of managed devices is to corresponding authorization, starts functional module software, performs step 207.
Or, if now the functional module software of managed devices is in running status, then keeps managed devices functional module running software, perform step 207.
Step 206, issues the mandate command for stopping that sub-authorization message the corresponding function module software starts, if managed devices the corresponding function module software is in state to be launched, then managed devices cannot start the corresponding function module software;
Or, if now the functional module software of managed devices is in running status, then expiry feature module software runs;
Perform step 208.
Step 207, timing module carries out timing to managed devices, and timing content includes: timing in real time, switching on and shutting down number of times calendar scheduling, is updated log information after preset duration, and the content of renewal includes: use the time, access times, use the date etc., perform step 204 after write every time.
Step 208, if empowerment management is written into new authorization message, then covers original authorization message file, performs step 201, if empowerment management is not written to new authorization message, then keep standing state.
Step 209, after terminating the function that managed devices operation is corresponding with the sub-authorization message lost efficacy, the information that runs abort is sent to the management software of managed devices, the information that wherein runs abort is carried the alarm of the appointment function being terminated, send notice by management software to the user of managed devices, specifically can be exported by audio frequency or show the modes such as output.
A kind of device authorization and timer supervision device, in this specific embodiment, this device authorization and timer supervision device include memory module, control module, timing module and interface module, and the effect of disparate modules is as follows:
(1) memory module is for storing use authorization message and the log information of managed devices, each authorization message comprises many sub-authorization messages, the difference in functionality module of every sub-authorization message correspondence managed devices, every sub-authorization message contains the coding of corresponding function module, authorization device can generate the management device log information corresponding with authorization message according to authorization message, second serial number of authorization message is identical with the log information First ray number of generation, and memory module specifically includes: flash storage;
(2) control module reads, with timer supervision device, the device coding being managed for controlling device authorization, and judge device coding that authorization message carries whether with managed devices codes match, mate coding and the coding of corresponding function module that sub-authorization message is carried simultaneously, control to issue the authorization of sub-authorization message.
Wherein, after device authorization starts with timer supervision device, control module reads the device identification of managed devices by interface module, the device identification that comparison authorization message is carried and the device identification of managed devices, whether judge current accessed managed devices is corresponding equipment, if comparison result device identification is mated, it is judged that the used record of sub-authorization message judges whether to issue authorization with the record of use in corresponding log information.
Control module specifically includes: programmable logic device.
(3) timing module is for the clock real-time timing independent for the offer of described managed devices, specifically includes: clock chip;
After managed devices the corresponding function module software starts, management software sends timing notice to empowerment management equipment, timing module starts functional module corresponding to managed devices and carries out timing, timing content includes: timing in real time, switching on and shutting down number of times calendar scheduling, rewrites log at set intervals, and the content rewritten includes: use the time, access times, use the date etc..
In actual applications, it is contemplated that the maintenance to the use of equipment, individual plants can not keep intensive work for a long time, needs to carry out running duration protection to it, can be defined the duration of the single number of times in access times.
More than simply being illustrated some equipment leasing schemes of reality application, present specification includes but not limited to that these clocking schemes combine, and falls among the protection domain of the application in some rental scheme of those skilled in the art.
(4) interface module is used for connecting device authorization and timer supervision device and managed devices, power with timer supervision device for device authorization, and for the data transmission of device authorization with timer supervision device with managed devices, described interface module specifically includes: USB interface etc..
The said equipment authorizes timer supervision device, it is applied to be preset with in the managed devices of the management software adaptive with device authorization and timer supervision device, comprising the information such as the device identification of managed devices and the functional module coding of managed devices in management software, the authorization signaling that management software issues by reading empowerment management equipment controls the operation of function.
Step 301, device authorization and timer supervision device detect when managed devices starts, managed devices is encrypted checking, the encrypted authentication algorithm carried out includes md5 encryption, rsa encryption, AES encryption, any one or more in the cipher modes such as 3DES encryption, after managed devices is verified, device authorization and timer supervision device are read information in the management software in managed devices and obtain the device identification of managed devices, with obtaining log information corresponding in memory module and authorization message according to the mark of managed devices by interface module.
Wherein, authorization message is corresponding with the device identification of managed devices, authorization message is formed and comprises the second serial number by one or more sub-authorization messages, each sub-authorization message specifies function corresponding with each of managed devices, sub-authorization message and the functional module one_to_one corresponding in managed devices, each sub-authorization message includes functional module coding and the usable record of managed devices of managed devices;Log information and the device identification one_to_one corresponding of managed devices, comprise use record and the First ray number of this equipment and each functional module, the mark of managed devices, log information and the authorization message one_to_one corresponding of managed devices.
Step 302, device authorization is searched managing of managed devices and is obtained the log information corresponding with device identification in software with timer supervision device, when the authorization message found the second serial number and log information First ray number not in the presence of, show that authorization message is newly written device authorization and timer supervision device, generating new log information, the First ray number of the new log information of generation is consistent with the serial number of corresponding authorization message;When the second serial number of the authorization message found and the First ray number of log information are the most inconsistent, generating the new log information that authorization message is corresponding, the First ray number of the log information of generation is consistent with the second serial number of authorization message.
In authorization message in memory module, the used record of each sub-authorization message includes: uses duration, access times, uses the date etc.;The use record of the managed devices in usage log information includes: uses duration, access times, uses the date etc..
Step 303, control module according to the managed devices in log information use record judge whether each sub-authorization message in authorization message lost efficacy, if meet following condition any one; sub-authorization message inefficacy:
(1) access times during access times are less than log information in sub-authorization message;
(2) sub-authorization message use duration less than the use duration in log information;
(3) the use date in log information exceedes the use date in sub-authorization message.
Step 304, lost efficacy if judged result is the authorization message in sub-authorization message, issued authorization signaling 0 in fixed signal position, and its flag bit is that the authorization signaling of 0 runs for terminating the functional module corresponding with sub-authorization message;
Not losing efficacy if judged result is the authorization message in sub-authorization message, and issued authorization signaling 1 in fixed signal position, its flag bit is that the authorization signaling of 1 runs for starting the functional module corresponding with sub-authorization message.
Step 305, if sub-authorization message lost efficacy, it is managed after software receives the authorization signaling that flag bit is 0, terminate managed devices and run the functional module running software corresponding with the sub-authorization message lost efficacy, son authorizes the function stop that letter is corresponding to run, and after the log information that the sub-authorization message using record renewal not lose efficacy according to managed devices is corresponding, with whether each sub-authorization message judged in authorization message according to log information lost efficacy.
Step 306, managed devices functional module starts backward device authorization and sends timing notice with timer supervision device, device authorization and timer supervision device carry out timing by timing module to managed devices after receiving, and timing content includes: timing in real time, switching on and shutting down number of times calendar scheduling, after preset duration, log information is rewritten, the content rewritten includes: uses time, access times, uses the date etc., after log information has updated, perform step 303.
Step 307, after the function that control module is corresponding with the sub-authorization message lost efficacy by issuing authorization signaling termination managed devices operation, management software sends, to managed devices, the information that runs abort, the information that wherein runs abort is carried the alarm of the appointment function being terminated, send notice by management software to the user of managed devices, specifically can be exported by audio frequency or show the modes such as output.
In actual applications, device authorization and timer supervision device are the most independently placed on managed devices, being connected by USB interface, authorization message directly can be updated in the way of according to actual needs by Local or Remote on timer supervision device by management personnel in device authorization.Can carry out using timing to equipment based on different needs, and based on concrete different situations, the use of managed devices can adjusted flexibly and authorizes.Compared to managed devices, this managing device volume is little, lightweight, it is simple to carry, and can arrange authorization message flexibly, it is also possible to coordinates remote authorization system to carry out network remote management, extends the business scope of application on the basis of saving management and human cost.
It will be appreciated by those skilled in the art that accompanying drawing is a schematic diagram being preferable to carry out scene, module or flow process in accompanying drawing are not necessarily implemented necessary to the application.
It will be appreciated by those skilled in the art that the module in the device implemented in scene can carry out being distributed in the device implementing scene according to implementing scene description.
Above-mentioned the application sequence number, just to describing, does not represent the quality implementing scene.
The several scenes that are embodied as being only the application disclosed above, but, the application is not limited to this, and the changes that any person skilled in the art can think of all should fall into the protection domain of the application.

Claims (14)

1. a device authorization and timer supervision method, it is characterized in that, described method is applied to include that device authorization, with the system of timer supervision device and managed devices, presets the management software adaptive with timer supervision device with described device authorization in described managed devices, and the method includes:
When with timer supervision device, device authorization detects that managed devices starts, described device authorization and timer supervision device obtain the mark of described managed devices by described management software, and obtain the log information corresponding with described mark and authorization message, described device authorization and timer supervision device have the corresponding relation between described mark, described log information and described authorization message, described authorization message is made up of sub-authorization message, and each described sub-authorization message specifies function corresponding with each of described managed devices;
Whether each sub-authorization message that described device authorization judges in described authorization message according to described log information with timer supervision device lost efficacy;
Described device authorization terminates described managed devices with timer supervision device and runs the function corresponding with the sub-authorization message lost efficacy, and after the log information that the sub-authorization message using record renewal not lose efficacy according to described managed devices is corresponding, whether lost efficacy according to each sub-authorization message that described log information judges in described authorization message.
2. the method for claim 1, it is characterised in that whether lost efficacy according to each sub-authorization message that described log information judges in described authorization message, particularly as follows:
If losing efficacy according to each sub-authorization message that described log information judges in described authorization message, described device authorization and timer supervision device issue authorization signaling 0 in fixed signal position, and described authorization signaling runs the function corresponding with described failed sub-authorization message for terminating described managed devices;
If not losing efficacy according to each sub-authorization message that described log information judges in described authorization message, described device authorization and timer supervision device issue authorization signaling 1 in fixed signal position, and described authorization signaling runs the function corresponding with the described sub-authorization message not lost efficacy for starting described managed devices.
3. the method for claim 1, it is characterized in that, described device authorization searches the log information corresponding with described device identification with timer supervision device, described log information comprises the record of use of First ray number and described managed devices, described sub-authorization message comprises each functional module usable record of the second serial number and described managed devices, whether each sub-authorization message that described device authorization judges in described authorization message according to described log information with timer supervision device lost efficacy, particularly as follows:
Judge that described First ray number is the most consistent with described second serial number;
If described First ray number is consistent with described second serial number, it is judged that the described scope having used record whether to exceed described usable record;
If the determination result is YES, confirm that described sub-authorization message lost efficacy;
If judged result is no, confirm that described sub-authorization message did not lost efficacy.
4. method as claimed in claim 3, it is characterised in that also include:
If described First ray number is inconsistent with described second serial number, then generating the new log information corresponding with authorization message, the second serial number of described log information is consistent with First ray number.
5. method as claimed in claim 3, it is characterised in that determine with specific reference to following condition and using record beyond the used record in described sub-authorization message in described log information:
In described sub-authorization message, access times are less than the access times in described log information;And/or,
Described sub-authorization message use duration less than the use duration in described log information;And/or,
The date is used to exceed the use date in described sub-authorization message described in described log information.
6. method as claimed in claim 3, it is characterised in that described device authorization updates, according to the use time of described managed devices, the log information that the described sub-authorization message not lost efficacy is corresponding with timer supervision device, particularly as follows:
When described device authorization and timer supervision device issue described authorization order, described managed devices is carried out timing, timing content includes: switching on and shutting down number of times, duration, use date, after preset time period, described log information is updated, after described log information has updated, judge according to the log information after described renewal whether the described sub-authorization message of correspondence lost efficacy.
7. method as claimed in claim 6, it is characterised in that after described device authorization terminates, with timer supervision device, the function that the operation of described managed devices is corresponding with the sub-authorization message lost efficacy, also include:
Described device authorization is sending, to the management software of managed devices, the information that runs abort with timer supervision device, the described information that runs abort is carried the alarm of the appointment function being terminated, so that described management software sends notice to the user of described managed devices.
8. a device authorization and timer supervision device, it is characterized in that, described device is applied to include that device authorization, with the system of timer supervision device and managed devices, presets the management software adaptive with timer supervision device with described device authorization in described managed devices, and this device includes:
Described device detects when managed devices starts, described device obtains the mark of described managed devices by described management software, and obtain the log information corresponding with described mark and authorization message, described device has the corresponding relation between described mark, described log information and described authorization message, described authorization message is made up of sub-authorization message, and each described sub-authorization message specifies function corresponding with each of described managed devices;
Whether each sub-authorization message that described device judges in described authorization message according to described log information lost efficacy;
Described device terminates described managed devices and runs the function corresponding with the sub-authorization message lost efficacy, and after the use time according to described managed devices updates the log information that the sub-authorization message not lost efficacy is corresponding, whether lost efficacy according to each sub-authorization message that described log information judges in described authorization message.
9. device as claimed in claim 8, it is characterised in that whether each sub-authorization message that described device judges in described authorization message according to described log information lost efficacy, particularly as follows:
If each sub-authorization message that described device judges in described authorization message according to described log information lost efficacy, described device issues authorization signaling 0 in fixed signal position, and described authorization signaling runs the function corresponding with described failed sub-authorization message for terminating described managed devices;
If each sub-authorization message that described device judges in described authorization message according to described log information did not lost efficacy, described device issues authorization signaling 1 in fixed signal position, and described authorization signaling runs the function corresponding with the described sub-authorization message not lost efficacy for starting described managed devices.
10. device as claimed in claim 8, it is characterized in that, described device authorization searches the log information corresponding with described device identification with timer supervision device, described log information comprises the record of use of First ray number and described managed devices, described sub-authorization message comprises each functional module usable record of the second serial number and described managed devices, whether each sub-authorization message that described device judges in described authorization message according to described log information lost efficacy, particularly as follows:
Judge that described First ray number is the most consistent with described second serial number;
If described First ray number is consistent with described second serial number, it is judged that the described scope having used record whether to exceed described usable record;
If the determination result is YES, confirm that described sub-authorization message lost efficacy;
If judged result is no, confirm that described sub-authorization message did not lost efficacy.
11. devices as claimed in claim 10, it is characterised in that also include:
If described First ray number is inconsistent with described second serial number, then generating the new log information corresponding with authorization message, the second serial number of described log information is consistent with First ray number.
12. devices as claimed in claim 10, it is characterised in that determine that using in described log information records without departing from the used record in described sub-authorization message with specific reference to following condition:
In described sub-authorization message, access times are more than the access times in described log information;And/or,
Described sub-authorization message use duration more than the use duration in described log information;And/or,
The date is used not less than described sub-authorization message uses the date described in described log information.
13. devices as claimed in claim 10, it is characterised in that described device updates, according to the use time of described managed devices, the log information that the described sub-authorization message not lost efficacy is corresponding, particularly as follows:
When described device issues described authorization order, described managed devices is carried out timing, timing content includes: switching on and shutting down number of times, duration, use date, after preset time period, described log information is updated, after described log information has updated, judge according to the log information after described renewal whether the described sub-authorization message of correspondence lost efficacy.
14. devices as claimed in claim 13, it is characterised in that after described device terminates the function that the operation of described managed devices is corresponding with the sub-authorization message lost efficacy, also include:
Described device runs abort information sending to the management software of managed devices, described in run abort and information carried the alarm of the appointment function being terminated, so that described management software sends notice to the user of described managed devices.
CN201610342050.7A 2016-05-20 2016-05-20 Equipment authorization and timing management method and device Active CN106022093B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610342050.7A CN106022093B (en) 2016-05-20 2016-05-20 Equipment authorization and timing management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610342050.7A CN106022093B (en) 2016-05-20 2016-05-20 Equipment authorization and timing management method and device

Publications (2)

Publication Number Publication Date
CN106022093A true CN106022093A (en) 2016-10-12
CN106022093B CN106022093B (en) 2023-05-05

Family

ID=57095477

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610342050.7A Active CN106022093B (en) 2016-05-20 2016-05-20 Equipment authorization and timing management method and device

Country Status (1)

Country Link
CN (1) CN106022093B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108241319A (en) * 2017-12-08 2018-07-03 武汉市海沁医疗科技有限公司 A kind of real-time timekeeping system for RF energy radiating circuit
CN108846285A (en) * 2018-06-19 2018-11-20 北京奥普维尔科技有限公司 Model machine management method and model machine management system
CN109522734A (en) * 2018-11-19 2019-03-26 陕西西普数据通信股份有限公司 A kind of security application store system
CN111950006A (en) * 2020-08-12 2020-11-17 顿汉布什(中国)工业有限公司 Authorization method for controlling use duration of equipment
CN112115459A (en) * 2020-09-22 2020-12-22 杭州海康威视数字技术股份有限公司 Embedded equipment operation information output method and device and embedded equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110247085A1 (en) * 2010-03-30 2011-10-06 Hon Hai Precision Industry Co., Ltd. Electronic device and method of protecting software
CN102314572A (en) * 2011-10-14 2012-01-11 迈普通信技术股份有限公司 Registration information file generation method and device, and use authorization method of application software
CN102831352A (en) * 2012-09-11 2012-12-19 南京天溯自动化控制***有限公司 Equipment authorization use method and equipment for method
CN103793630A (en) * 2014-01-14 2014-05-14 上海上讯信息技术股份有限公司 Multi-product and multi-platform authorization management system and multi-product and multi-platform authorization management method
CN105335628A (en) * 2015-10-28 2016-02-17 凌云光技术集团有限责任公司 Method and device for authorizing software based on removable storage equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110247085A1 (en) * 2010-03-30 2011-10-06 Hon Hai Precision Industry Co., Ltd. Electronic device and method of protecting software
CN102314572A (en) * 2011-10-14 2012-01-11 迈普通信技术股份有限公司 Registration information file generation method and device, and use authorization method of application software
CN102831352A (en) * 2012-09-11 2012-12-19 南京天溯自动化控制***有限公司 Equipment authorization use method and equipment for method
CN103793630A (en) * 2014-01-14 2014-05-14 上海上讯信息技术股份有限公司 Multi-product and multi-platform authorization management system and multi-product and multi-platform authorization management method
CN105335628A (en) * 2015-10-28 2016-02-17 凌云光技术集团有限责任公司 Method and device for authorizing software based on removable storage equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张建伟等: "基于电子邮件***和MD5算法的软件授权控制技术研究与实现", 《计算机应用与软件》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108241319A (en) * 2017-12-08 2018-07-03 武汉市海沁医疗科技有限公司 A kind of real-time timekeeping system for RF energy radiating circuit
CN108846285A (en) * 2018-06-19 2018-11-20 北京奥普维尔科技有限公司 Model machine management method and model machine management system
CN109522734A (en) * 2018-11-19 2019-03-26 陕西西普数据通信股份有限公司 A kind of security application store system
CN111950006A (en) * 2020-08-12 2020-11-17 顿汉布什(中国)工业有限公司 Authorization method for controlling use duration of equipment
CN111950006B (en) * 2020-08-12 2022-11-22 顿汉布什(中国)工业有限公司 Authorization method for controlling use duration of equipment
CN112115459A (en) * 2020-09-22 2020-12-22 杭州海康威视数字技术股份有限公司 Embedded equipment operation information output method and device and embedded equipment

Also Published As

Publication number Publication date
CN106022093B (en) 2023-05-05

Similar Documents

Publication Publication Date Title
CN106022093A (en) Device authorization and timing management method and device
CN108124480B (en) Software authorization method, system and equipment
JP3728366B2 (en) IC card
US20190245853A1 (en) Secure storage device with on-board encryption control
MY130889A (en) Method and apparatus of storage anti-piracy key encryption (sake) device to control data access for networks
CN100465925C (en) Receiver and storage control method
JP2001500685A (en) Method for performing cryptographic authentication in a radio frequency identification system
CN107743115B (en) Identity authentication method, device and system for terminal application
US20090070599A1 (en) Memory card, application program holding method, and holding program
CN107273749B (en) Vehicle ECU file safe flashing method and system
CN104238486A (en) Methods and apparatus to manage and maintain process control system field devices using RFID devices
CN108898725B (en) Door lock control method and device
CN112860791A (en) Cross-network data synchronous control system, method and storage medium
CN101630265A (en) Upgrading device, terminal device, method and system for updating software
CN108573181B (en) RFID reader-writer, RFID system and block chain network
JP2009253783A (en) Mobile terminal, data protection method and program for data protection
CN109471488B (en) Projector timing method and system
CN102651079A (en) IC (integrated circuit) card management method occupying memory space for a short time and IC card management system
CN105740662A (en) Information processing method and electronic device
CN105718761A (en) Software probation period controlling method and device
KR100862009B1 (en) System and Method for Authenticating RFID Readeror Terminal, Secure RFID Tag for Authenticating RFID Readeror Terminal
CN115729568A (en) Program burning protection method and device, burner and board card
CN102693389B (en) A kind of method, device and CPU that CPU is controlled
CN108647870B (en) UPS power supply ownership determination method and system based on Internet of things card
CN203241980U (en) Data collecting working station with encryption U flash disc automatic identification technology

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant