CN111860723B - Terminal management method based on two-dimension code - Google Patents
Terminal management method based on two-dimension code Download PDFInfo
- Publication number
- CN111860723B CN111860723B CN202010714490.7A CN202010714490A CN111860723B CN 111860723 B CN111860723 B CN 111860723B CN 202010714490 A CN202010714490 A CN 202010714490A CN 111860723 B CN111860723 B CN 111860723B
- Authority
- CN
- China
- Prior art keywords
- dimensional code
- software
- management
- computer equipment
- serial number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000007726 management method Methods 0.000 title claims abstract description 61
- 238000000034 method Methods 0.000 claims description 4
- 238000012795 verification Methods 0.000 claims description 4
- 230000009191 jumping Effects 0.000 claims description 3
- 238000004806 packaging method and process Methods 0.000 claims description 3
- 238000013475 authorization Methods 0.000 abstract description 3
- 238000005336 cracking Methods 0.000 abstract 1
- 230000008901 benefit Effects 0.000 description 4
- 230000007547 defect Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
- G06K17/0025—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/105—Arrangements for software license management or administration, e.g. for managing licenses at corporate level
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a terminal management method, in particular to a terminal management method based on two-dimension codes. The two-dimensional code management system can produce software management two-dimensional codes by using the hardware serial numbers and the identity identification information of the computer equipment, and when the software is started, the management server compares and verifies the hardware serial numbers and the identity identification information, so that the cost of cracking the machine codes is improved by using the two-dimensional code technology, the authorization of computer equipment personnel bound on a client site (outside an enterprise) is strictly controlled, in addition, the product requirement is conveniently fed back by a client, the terminal management can be realized, the effective protection of a software system in the terminal is achieved, the application range is wide, and the system is safe and reliable.
Description
Technical Field
The invention relates to a terminal management method, in particular to a terminal management method based on two-dimension codes.
Background
At present, most commercial software and shared software adopt a registration code authorization mode to ensure that the software is not stolen so as to ensure the benefit of the software. Although some versions of many commonly used software systems have been hacked by others, the manner in which registration codes are authorized is an effective means of protecting the software system itself for the particular industry of software.
Typically, a so-called registration code is formed by a certain algorithm (i.e., a registrar) using a unique serial number of computer hardware as a registration source. A general program records a registration code by setting a global variable in the program.
But the serial number and the registration code in the prior art can be bypassed, forged, cracked and the like by a certain technical means; in addition, individuals may fraudster the user through the registrar, causing loss to the user and reputation loss to the product provider.
In addition, when an enterprise product binds a computer device, there are two scenarios: 1. installing a binding computer device from the enterprise by the computer; 2. a customer site self-contained computer (external to the enterprise) performs product binding work by an installation engineer at the customer site.
Therefore, how to more effectively protect a software system has become a technical problem to be solved.
Disclosure of Invention
The invention aims to overcome the defects in the prior art and provides a terminal management method based on a two-dimension code, which can realize terminal management, achieve effective protection of a software system in a terminal, and has the advantages of wide application range, safety and reliability.
According to the technical scheme provided by the invention, the terminal management method based on the two-dimension code comprises the following steps:
Step 1, providing computer equipment for installing software to be protected and a management server for managing the computer equipment; generating a software management two-dimensional code in the computer equipment by using a hardware serial number of the computer equipment and identity identification information of personnel related to the computer equipment, wherein the software management two-dimensional code is associated with software to be protected, and transmitting the hardware serial number and the identity identification information for generating the software management two-dimensional code into a management server by the computer equipment so as to be stored by the management server;
Step 2, on a computer device with a software management two-dimensional code, when software of the software management two-dimensional code is started, jumping out of the software management two-dimensional code to control the starting of the software by using the software management two-dimensional code;
Step 3, scanning or identifying the software management two-dimensional code by using a user terminal, connecting the computer equipment with a management server after scanning or identifying the software management two-dimensional code, and transmitting the hardware serial number of the computer equipment and the identity identification information input by the user terminal to the management server;
And 4, the management server checks the received hardware serial number and the received identity identification information by using the stored hardware serial number and the stored identity identification information respectively, if the verification is passed, the management server allows the starting work of the software, otherwise, the management server outputs a prompt needing to be activated.
In step 1, the hardware serial number of the computer device includes one or more of serial numbers of a motherboard, a network card and a hard disk; the identification information comprises one or more of an identification card number, a mobile phone number and a staff number.
In step 1, the specific process of generating the software management two-dimensional code comprises the following steps:
Step 1.1, encrypting a hardware serial number and identity identification information of computer equipment by using a preset encryption key and an encryption algorithm to generate a license information character string;
And 1.2, packaging the license information character string into a two-dimensional code protocol according to a preset protocol rule, and converting the two-dimensional code protocol by utilizing a preset two-dimensional code generating component to obtain a software management two-dimensional code.
In step 3, the user terminal for scanning or identifying the software management two-dimensional code comprises a smart phone, a smart tablet and/or the computer equipment for generating the software management two-dimensional code.
In step 3, the computer device can allow writing in the user feedback information, and transmit the user feedback information to the management server along with the hardware serial number and the identity identification information input by the user terminal, and the management server stores the received user feedback information in association with the hardware serial number.
The invention has the advantages that: the two-dimensional code management method has the advantages that the software management two-dimensional code can be produced by using the hardware serial number and the identity identification information of the computer equipment, and when the software is started, the management server compares and verifies the hardware serial number and the identity identification information, so that the cost of decoding the machine code is improved by using the two-dimensional code technology, the authorization of computer equipment personnel bound on a client site (outside an enterprise) is strictly controlled, in addition, the product requirement is conveniently fed back by a client, the terminal management can be realized, the effective protection of a software system in the terminal is achieved, the application range is wide, and the method is safe and reliable.
Detailed Description
The invention will be further illustrated with reference to specific examples.
In order to realize terminal management and achieve effective protection of a software system in a terminal, the terminal management method of the invention comprises the following steps:
Step 1, providing computer equipment for installing software to be protected and a management server for managing the computer equipment; generating a software management two-dimensional code in the computer equipment by using a hardware serial number of the computer equipment and identity identification information of personnel related to the computer equipment, wherein the software management two-dimensional code is associated with software to be protected, and transmitting the hardware serial number and the identity identification information for generating the software management two-dimensional code into a management server by the computer equipment so as to be stored by the management server;
specifically, the computer device and the management server may take the form of conventional common usage, generally, the computer device is a hardware device to be protected, the management server is a server related to the software to be protected, the management server can control the running of the software on the computer device, and the specific coordination relationship among the management server, the computer device and the software to be protected is consistent with the conventional usage, which is well known in the art and is not repeated herein.
The hardware serial number of the computer equipment comprises one or more of the serial number of the main board, the serial number of the network card and the serial number of the hard disk; the identification information comprises one or more of an identification card number, a mobile phone number and a staff number. In the embodiment of the present invention, the personnel related to the computer device, specifically, the personnel using the computer device, the personnel managing the computer device, or other personnel actually designated to be related, which are specifically known to those skilled in the art, and are not described herein again.
The software management two-dimensional code is associated with the software to be protected, and particularly, when the software is started, the associated software management two-dimensional code can be automatically jumped out, or the software management two-dimensional code is directly displayed on a software starting interface.
Specifically, the specific process of generating the software management two-dimensional code comprises the following steps:
Step 1.1, encrypting a hardware serial number and identity identification information of computer equipment by using a preset encryption key and an encryption algorithm to generate a license information character string;
in the embodiment of the invention, the encryption steps are as follows: encrypting the read hardware serial number of the computer equipment, the mobile phone number of an implementation person, the personnel number or the identity identification information of the personnel enterprise mailbox combination into a permission information character string by utilizing a preset encryption key and an encryption algorithm; specifically, there are various processing schemes for encrypting the verified combined authentication information using a preset encryption key and an encryption algorithm, for example, the encryption algorithm may employ a 3DES symmetric encryption algorithm, and the preset encryption key is a 24-bit key required for employing the 3DES symmetric encryption algorithm, which may be generated and provided by a designated system or manager.
And 1.2, packaging the license information character string into a two-dimensional code protocol according to a preset protocol rule, and converting the two-dimensional code protocol by utilizing a preset two-dimensional code generating component to obtain a software management two-dimensional code.
In the embodiment of the invention, the encrypted product information is packaged into a two-dimensional code protocol according to a preset protocol rule, wherein the two-dimensional code protocol can adopt an XML message, and the specific format is as follows:
< R < X > encryption mode < T > product type < P > product code < P > M > product name < S > implementation personnel code < S > client area code < D > R;
Wherein R represents a two-dimensional code protocol message root node; x represents an encryption mode, and the label value of the two-dimensional code of the product is 1, which represents a 3DES encryption algorithm; t represents the product type, the label value of the product two-dimensional code is the product type encrypted by 3DES, and the encrypted product two-dimensional code is only a numerical value or a letter; p represents a product code, the label value of the product two-dimensional code is the product code encrypted by 3DES, and the encrypted product two-dimensional code is only a numerical value or a letter; m represents the product name, the label value of the product two-dimensional code is the product name encrypted by 3DES, and the encrypted product is only a numerical value or letter; s represents the implementation personnel code, the label value of the product two-dimensional code is the implementation personnel code after 3DES encryption, and the encrypted product two-dimensional code is only a numerical value or a letter; d represents the customer region code, the label value of the special product two-dimension code is the customer region code encrypted by 3DES, and the encrypted label value is only a numerical value or a letter.
And converting the two-dimensional code protocol into a two-dimensional code picture by using a preset two-dimensional code generating component. The preset two-dimension code generating component can be selected and used in various embodiments, for example, an open source component ZXing based on Google company can be selected and used, and a QuickResponse quick response matrix code is generated according to the text content of a two-dimension code protocol, so that a software management two-dimension code is generated, and the software management two-dimension code is displayed for a user to scan.
Step 2, on a computer device with a software management two-dimensional code, when software of the software management two-dimensional code is started, jumping out of the software management two-dimensional code to control the starting of the software by using the software management two-dimensional code;
in the embodiment of the invention, when the software management two-dimensional code is jumped out or displayed, the key management two-dimensional code is required to be subjected to processing such as code scanning, identification and the like, and then the subsequent software can be started and operated.
Step 3, scanning or identifying the software management two-dimensional code by using a user terminal, connecting the computer equipment with a management server after scanning or identifying the software management two-dimensional code, and transmitting the hardware serial number of the computer equipment and the identity identification information input by the user terminal to the management server;
In the embodiment of the invention, the user terminal for scanning or identifying the software management two-dimensional code comprises a smart phone, a smart tablet and/or the computer equipment for generating the software management two-dimensional code. Generally, after the two-dimensional code is scanned or identified, the identity information needs to be input, and at the same time, the computer device transmits its hardware serial number and the identity information input by the user terminal to the management server, so that the management server performs a subsequent verification step. Specifically, after the two-dimensional code is scanned or managed by the identification software, the hardware serial number of the computer equipment can be automatically collected by the software, so that the hardware serial number and the identity identification information input by the user terminal are transmitted to the management server under the condition that the hardware serial number of the current computer equipment is not required to be input.
And 4, the management server checks the received hardware serial number and the received identity identification information by using the stored hardware serial number and the stored identity identification information respectively, if the verification is passed, the management server allows the starting work of the software, otherwise, the management server outputs a prompt needing to be activated.
As is clear from the above description, the management server stores therein the hardware serial number of the computer device and the identification information used when generating the software management two-dimensional code. After receiving the hardware serial number of the computer equipment transmitted after the terminal equipment scans the code or identifies the software to manage the two-dimension code and the identity identification information input by the user terminal, the management server needs to compare the hardware serial number with the identity identification information, and only after the comparison is passed, the management server can allow the software to start and run, otherwise, the management server prohibits the software from starting and returns a prompt needing to be activated to the computer equipment.
In the embodiment of the invention, the software can be prevented from being stolen or cracked by comparing the hardware serial numbers, and computer equipment can be prevented from being used by non-relevant personnel when the identity identification information is compared and checked.
In specific implementation, the computer device can allow writing in user feedback information, and transmit the user feedback information to the management server along with the hardware serial number and the identity identification information input by the user terminal, and the management server stores the received user feedback information in association with the hardware serial number. Of course, the user feedback information can also be written in and fed back to the management server in normal use of the software, and the specific mode can be selected according to actual needs, which is not repeated here.
Claims (2)
1. The terminal management method based on the two-dimension code is characterized by comprising the following steps of:
Step 1, providing computer equipment for installing software to be protected and a management server for managing the computer equipment; generating a software management two-dimensional code in the computer equipment by using a hardware serial number of the computer equipment and identity identification information of personnel related to the computer equipment, wherein the software management two-dimensional code is associated with software to be protected, and transmitting the hardware serial number and the identity identification information for generating the software management two-dimensional code into a management server by the computer equipment so as to be stored by the management server;
Step 2, on a computer device with a software management two-dimensional code, when software of the software management two-dimensional code is started, jumping out of the software management two-dimensional code to control the starting of the software by using the software management two-dimensional code;
Step 3, scanning or identifying the software management two-dimensional code by using a user terminal, connecting the computer equipment with a management server after scanning or identifying the software management two-dimensional code, and transmitting the hardware serial number of the computer equipment and the identity identification information input by the user terminal to the management server;
step 4, the management server checks the received hardware serial number and the received identity identification information by using the stored hardware serial number and the stored identity identification information respectively, if the verification is passed, the management server allows the starting work of the software, otherwise, a prompt needing to be activated is output;
In step 1, the hardware serial number of the computer device includes one or more of serial numbers of a motherboard, a network card and a hard disk; the identity identification information comprises one or more of an identity card number, a mobile phone number and a staff number;
In step 1, the specific process of generating the software management two-dimensional code comprises the following steps:
Step 1.1, encrypting a hardware serial number and identity identification information of computer equipment by using a preset encryption key and an encryption algorithm to generate a license information character string;
Step 1.2, packaging a license information character string into a two-dimensional code protocol according to a preset protocol rule, and converting the two-dimensional code protocol by utilizing a preset two-dimensional code generating component to obtain a software management two-dimensional code;
In step 3, the computer device can allow writing in the user feedback information, and transmit the user feedback information to the management server along with the hardware serial number and the identity identification information input by the user terminal, and the management server stores the received user feedback information in association with the hardware serial number.
2. The two-dimensional code-based terminal management method as set forth in claim 1, wherein: in step 3, the user terminal for scanning or identifying the software management two-dimensional code comprises a smart phone, a smart tablet and/or the computer equipment for generating the software management two-dimensional code.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010714490.7A CN111860723B (en) | 2020-07-23 | 2020-07-23 | Terminal management method based on two-dimension code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010714490.7A CN111860723B (en) | 2020-07-23 | 2020-07-23 | Terminal management method based on two-dimension code |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111860723A CN111860723A (en) | 2020-10-30 |
CN111860723B true CN111860723B (en) | 2024-07-12 |
Family
ID=72950789
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010714490.7A Active CN111860723B (en) | 2020-07-23 | 2020-07-23 | Terminal management method based on two-dimension code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111860723B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112738059B (en) * | 2020-12-23 | 2022-02-22 | 迈普通信技术股份有限公司 | Terminal access validity verification method and device, electronic equipment and storage medium |
CN112699422A (en) * | 2020-12-29 | 2021-04-23 | 湖北省楚天云有限公司 | Cloud platform terminal management method and system based on two-dimensional code |
CN115865539B (en) * | 2023-03-03 | 2023-06-09 | 新云网科技集团股份有限公司 | Security binding method, device, equipment and storage medium |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105933353A (en) * | 2016-07-05 | 2016-09-07 | 北京万维星辰科技有限公司 | Method and system for realizing secure login |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102685093B (en) * | 2011-12-08 | 2015-12-09 | 陈易 | A kind of identity authorization system based on mobile terminal and method |
CN104917766B (en) * | 2015-06-10 | 2018-01-05 | 飞天诚信科技股份有限公司 | A kind of two-dimension code safe authentication method |
CN110611685B (en) * | 2019-10-30 | 2021-11-30 | 南宁市指搜信息技术有限公司 | Internet site login system based on intelligent equipment monitoring and user identity recognition |
CN110768839B (en) * | 2019-10-30 | 2022-07-22 | 南宁市指搜信息技术有限公司 | Third-party software authorization system based on intelligent equipment monitoring and user identity binding |
-
2020
- 2020-07-23 CN CN202010714490.7A patent/CN111860723B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105933353A (en) * | 2016-07-05 | 2016-09-07 | 北京万维星辰科技有限公司 | Method and system for realizing secure login |
Also Published As
Publication number | Publication date |
---|---|
CN111860723A (en) | 2020-10-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111860723B (en) | Terminal management method based on two-dimension code | |
US10146957B1 (en) | Sensitive data aliasing | |
US7587608B2 (en) | Method and apparatus for storing data on the application layer in mobile devices | |
CN110149328B (en) | Interface authentication method, device, equipment and computer readable storage medium | |
CN101305375A (en) | System and method for controlling distribution of electronic information | |
US20040003248A1 (en) | Protection of web pages using digital signatures | |
US20100154066A1 (en) | System and Method for Managing Security Testing | |
CN108965222B (en) | Identity authentication method, system and computer readable storage medium | |
CN110889130B (en) | Database-based fine-grained data encryption method, system and device | |
CN101329787A (en) | Terminal device, secure device and application authentication system | |
CN104756127A (en) | Secure data handling by a virtual machine | |
US20160337358A1 (en) | Method for encoding an access to a computer resource | |
US11303451B2 (en) | System for authentication | |
CN101965574A (en) | Authentication information generation system, authentication information generation method, and authentication information generation program utilizing a client device and said method | |
US7340773B2 (en) | Multi-stage authorisation system | |
US20010048359A1 (en) | Restriction method for utilization of computer file with use of biometrical information, method of logging in computer system and recording medium | |
CN109598104A (en) | Soft ware authorization based on timestamp and secret authentication file protects system and method | |
CN112464212A (en) | Data authority control reconstruction method based on mature complex service system | |
JPH11184818A (en) | Authentication system, its method and client machine for the certification system | |
CN108650214B (en) | Dynamic page encryption anti-unauthorized method and device | |
CN113254986B (en) | Data processing method, device and computer readable storage medium | |
JP2005065035A (en) | Substitute person authentication system using ic card | |
JP2007179357A (en) | Method for installing computer program | |
JP4565827B2 (en) | Information processing apparatus for reading ID tag, program for reading ID tag, and program for writing to ID tag | |
JP5167795B2 (en) | Database maintenance method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |