CN111860723B - Terminal management method based on two-dimension code - Google Patents

Terminal management method based on two-dimension code Download PDF

Info

Publication number
CN111860723B
CN111860723B CN202010714490.7A CN202010714490A CN111860723B CN 111860723 B CN111860723 B CN 111860723B CN 202010714490 A CN202010714490 A CN 202010714490A CN 111860723 B CN111860723 B CN 111860723B
Authority
CN
China
Prior art keywords
dimensional code
software
management
computer equipment
serial number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010714490.7A
Other languages
Chinese (zh)
Other versions
CN111860723A (en
Inventor
黄国滨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Tax Software Technology Co ltd
Original Assignee
Jiangsu Tax Software Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Tax Software Technology Co ltd filed Critical Jiangsu Tax Software Technology Co ltd
Priority to CN202010714490.7A priority Critical patent/CN111860723B/en
Publication of CN111860723A publication Critical patent/CN111860723A/en
Application granted granted Critical
Publication of CN111860723B publication Critical patent/CN111860723B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a terminal management method, in particular to a terminal management method based on two-dimension codes. The two-dimensional code management system can produce software management two-dimensional codes by using the hardware serial numbers and the identity identification information of the computer equipment, and when the software is started, the management server compares and verifies the hardware serial numbers and the identity identification information, so that the cost of cracking the machine codes is improved by using the two-dimensional code technology, the authorization of computer equipment personnel bound on a client site (outside an enterprise) is strictly controlled, in addition, the product requirement is conveniently fed back by a client, the terminal management can be realized, the effective protection of a software system in the terminal is achieved, the application range is wide, and the system is safe and reliable.

Description

Terminal management method based on two-dimension code
Technical Field
The invention relates to a terminal management method, in particular to a terminal management method based on two-dimension codes.
Background
At present, most commercial software and shared software adopt a registration code authorization mode to ensure that the software is not stolen so as to ensure the benefit of the software. Although some versions of many commonly used software systems have been hacked by others, the manner in which registration codes are authorized is an effective means of protecting the software system itself for the particular industry of software.
Typically, a so-called registration code is formed by a certain algorithm (i.e., a registrar) using a unique serial number of computer hardware as a registration source. A general program records a registration code by setting a global variable in the program.
But the serial number and the registration code in the prior art can be bypassed, forged, cracked and the like by a certain technical means; in addition, individuals may fraudster the user through the registrar, causing loss to the user and reputation loss to the product provider.
In addition, when an enterprise product binds a computer device, there are two scenarios: 1. installing a binding computer device from the enterprise by the computer; 2. a customer site self-contained computer (external to the enterprise) performs product binding work by an installation engineer at the customer site.
Therefore, how to more effectively protect a software system has become a technical problem to be solved.
Disclosure of Invention
The invention aims to overcome the defects in the prior art and provides a terminal management method based on a two-dimension code, which can realize terminal management, achieve effective protection of a software system in a terminal, and has the advantages of wide application range, safety and reliability.
According to the technical scheme provided by the invention, the terminal management method based on the two-dimension code comprises the following steps:
Step 1, providing computer equipment for installing software to be protected and a management server for managing the computer equipment; generating a software management two-dimensional code in the computer equipment by using a hardware serial number of the computer equipment and identity identification information of personnel related to the computer equipment, wherein the software management two-dimensional code is associated with software to be protected, and transmitting the hardware serial number and the identity identification information for generating the software management two-dimensional code into a management server by the computer equipment so as to be stored by the management server;
Step 2, on a computer device with a software management two-dimensional code, when software of the software management two-dimensional code is started, jumping out of the software management two-dimensional code to control the starting of the software by using the software management two-dimensional code;
Step 3, scanning or identifying the software management two-dimensional code by using a user terminal, connecting the computer equipment with a management server after scanning or identifying the software management two-dimensional code, and transmitting the hardware serial number of the computer equipment and the identity identification information input by the user terminal to the management server;
And 4, the management server checks the received hardware serial number and the received identity identification information by using the stored hardware serial number and the stored identity identification information respectively, if the verification is passed, the management server allows the starting work of the software, otherwise, the management server outputs a prompt needing to be activated.
In step 1, the hardware serial number of the computer device includes one or more of serial numbers of a motherboard, a network card and a hard disk; the identification information comprises one or more of an identification card number, a mobile phone number and a staff number.
In step 1, the specific process of generating the software management two-dimensional code comprises the following steps:
Step 1.1, encrypting a hardware serial number and identity identification information of computer equipment by using a preset encryption key and an encryption algorithm to generate a license information character string;
And 1.2, packaging the license information character string into a two-dimensional code protocol according to a preset protocol rule, and converting the two-dimensional code protocol by utilizing a preset two-dimensional code generating component to obtain a software management two-dimensional code.
In step 3, the user terminal for scanning or identifying the software management two-dimensional code comprises a smart phone, a smart tablet and/or the computer equipment for generating the software management two-dimensional code.
In step 3, the computer device can allow writing in the user feedback information, and transmit the user feedback information to the management server along with the hardware serial number and the identity identification information input by the user terminal, and the management server stores the received user feedback information in association with the hardware serial number.
The invention has the advantages that: the two-dimensional code management method has the advantages that the software management two-dimensional code can be produced by using the hardware serial number and the identity identification information of the computer equipment, and when the software is started, the management server compares and verifies the hardware serial number and the identity identification information, so that the cost of decoding the machine code is improved by using the two-dimensional code technology, the authorization of computer equipment personnel bound on a client site (outside an enterprise) is strictly controlled, in addition, the product requirement is conveniently fed back by a client, the terminal management can be realized, the effective protection of a software system in the terminal is achieved, the application range is wide, and the method is safe and reliable.
Detailed Description
The invention will be further illustrated with reference to specific examples.
In order to realize terminal management and achieve effective protection of a software system in a terminal, the terminal management method of the invention comprises the following steps:
Step 1, providing computer equipment for installing software to be protected and a management server for managing the computer equipment; generating a software management two-dimensional code in the computer equipment by using a hardware serial number of the computer equipment and identity identification information of personnel related to the computer equipment, wherein the software management two-dimensional code is associated with software to be protected, and transmitting the hardware serial number and the identity identification information for generating the software management two-dimensional code into a management server by the computer equipment so as to be stored by the management server;
specifically, the computer device and the management server may take the form of conventional common usage, generally, the computer device is a hardware device to be protected, the management server is a server related to the software to be protected, the management server can control the running of the software on the computer device, and the specific coordination relationship among the management server, the computer device and the software to be protected is consistent with the conventional usage, which is well known in the art and is not repeated herein.
The hardware serial number of the computer equipment comprises one or more of the serial number of the main board, the serial number of the network card and the serial number of the hard disk; the identification information comprises one or more of an identification card number, a mobile phone number and a staff number. In the embodiment of the present invention, the personnel related to the computer device, specifically, the personnel using the computer device, the personnel managing the computer device, or other personnel actually designated to be related, which are specifically known to those skilled in the art, and are not described herein again.
The software management two-dimensional code is associated with the software to be protected, and particularly, when the software is started, the associated software management two-dimensional code can be automatically jumped out, or the software management two-dimensional code is directly displayed on a software starting interface.
Specifically, the specific process of generating the software management two-dimensional code comprises the following steps:
Step 1.1, encrypting a hardware serial number and identity identification information of computer equipment by using a preset encryption key and an encryption algorithm to generate a license information character string;
in the embodiment of the invention, the encryption steps are as follows: encrypting the read hardware serial number of the computer equipment, the mobile phone number of an implementation person, the personnel number or the identity identification information of the personnel enterprise mailbox combination into a permission information character string by utilizing a preset encryption key and an encryption algorithm; specifically, there are various processing schemes for encrypting the verified combined authentication information using a preset encryption key and an encryption algorithm, for example, the encryption algorithm may employ a 3DES symmetric encryption algorithm, and the preset encryption key is a 24-bit key required for employing the 3DES symmetric encryption algorithm, which may be generated and provided by a designated system or manager.
And 1.2, packaging the license information character string into a two-dimensional code protocol according to a preset protocol rule, and converting the two-dimensional code protocol by utilizing a preset two-dimensional code generating component to obtain a software management two-dimensional code.
In the embodiment of the invention, the encrypted product information is packaged into a two-dimensional code protocol according to a preset protocol rule, wherein the two-dimensional code protocol can adopt an XML message, and the specific format is as follows:
< R < X > encryption mode < T > product type < P > product code < P > M > product name < S > implementation personnel code < S > client area code < D > R;
Wherein R represents a two-dimensional code protocol message root node; x represents an encryption mode, and the label value of the two-dimensional code of the product is 1, which represents a 3DES encryption algorithm; t represents the product type, the label value of the product two-dimensional code is the product type encrypted by 3DES, and the encrypted product two-dimensional code is only a numerical value or a letter; p represents a product code, the label value of the product two-dimensional code is the product code encrypted by 3DES, and the encrypted product two-dimensional code is only a numerical value or a letter; m represents the product name, the label value of the product two-dimensional code is the product name encrypted by 3DES, and the encrypted product is only a numerical value or letter; s represents the implementation personnel code, the label value of the product two-dimensional code is the implementation personnel code after 3DES encryption, and the encrypted product two-dimensional code is only a numerical value or a letter; d represents the customer region code, the label value of the special product two-dimension code is the customer region code encrypted by 3DES, and the encrypted label value is only a numerical value or a letter.
And converting the two-dimensional code protocol into a two-dimensional code picture by using a preset two-dimensional code generating component. The preset two-dimension code generating component can be selected and used in various embodiments, for example, an open source component ZXing based on Google company can be selected and used, and a QuickResponse quick response matrix code is generated according to the text content of a two-dimension code protocol, so that a software management two-dimension code is generated, and the software management two-dimension code is displayed for a user to scan.
Step 2, on a computer device with a software management two-dimensional code, when software of the software management two-dimensional code is started, jumping out of the software management two-dimensional code to control the starting of the software by using the software management two-dimensional code;
in the embodiment of the invention, when the software management two-dimensional code is jumped out or displayed, the key management two-dimensional code is required to be subjected to processing such as code scanning, identification and the like, and then the subsequent software can be started and operated.
Step 3, scanning or identifying the software management two-dimensional code by using a user terminal, connecting the computer equipment with a management server after scanning or identifying the software management two-dimensional code, and transmitting the hardware serial number of the computer equipment and the identity identification information input by the user terminal to the management server;
In the embodiment of the invention, the user terminal for scanning or identifying the software management two-dimensional code comprises a smart phone, a smart tablet and/or the computer equipment for generating the software management two-dimensional code. Generally, after the two-dimensional code is scanned or identified, the identity information needs to be input, and at the same time, the computer device transmits its hardware serial number and the identity information input by the user terminal to the management server, so that the management server performs a subsequent verification step. Specifically, after the two-dimensional code is scanned or managed by the identification software, the hardware serial number of the computer equipment can be automatically collected by the software, so that the hardware serial number and the identity identification information input by the user terminal are transmitted to the management server under the condition that the hardware serial number of the current computer equipment is not required to be input.
And 4, the management server checks the received hardware serial number and the received identity identification information by using the stored hardware serial number and the stored identity identification information respectively, if the verification is passed, the management server allows the starting work of the software, otherwise, the management server outputs a prompt needing to be activated.
As is clear from the above description, the management server stores therein the hardware serial number of the computer device and the identification information used when generating the software management two-dimensional code. After receiving the hardware serial number of the computer equipment transmitted after the terminal equipment scans the code or identifies the software to manage the two-dimension code and the identity identification information input by the user terminal, the management server needs to compare the hardware serial number with the identity identification information, and only after the comparison is passed, the management server can allow the software to start and run, otherwise, the management server prohibits the software from starting and returns a prompt needing to be activated to the computer equipment.
In the embodiment of the invention, the software can be prevented from being stolen or cracked by comparing the hardware serial numbers, and computer equipment can be prevented from being used by non-relevant personnel when the identity identification information is compared and checked.
In specific implementation, the computer device can allow writing in user feedback information, and transmit the user feedback information to the management server along with the hardware serial number and the identity identification information input by the user terminal, and the management server stores the received user feedback information in association with the hardware serial number. Of course, the user feedback information can also be written in and fed back to the management server in normal use of the software, and the specific mode can be selected according to actual needs, which is not repeated here.

Claims (2)

1. The terminal management method based on the two-dimension code is characterized by comprising the following steps of:
Step 1, providing computer equipment for installing software to be protected and a management server for managing the computer equipment; generating a software management two-dimensional code in the computer equipment by using a hardware serial number of the computer equipment and identity identification information of personnel related to the computer equipment, wherein the software management two-dimensional code is associated with software to be protected, and transmitting the hardware serial number and the identity identification information for generating the software management two-dimensional code into a management server by the computer equipment so as to be stored by the management server;
Step 2, on a computer device with a software management two-dimensional code, when software of the software management two-dimensional code is started, jumping out of the software management two-dimensional code to control the starting of the software by using the software management two-dimensional code;
Step 3, scanning or identifying the software management two-dimensional code by using a user terminal, connecting the computer equipment with a management server after scanning or identifying the software management two-dimensional code, and transmitting the hardware serial number of the computer equipment and the identity identification information input by the user terminal to the management server;
step 4, the management server checks the received hardware serial number and the received identity identification information by using the stored hardware serial number and the stored identity identification information respectively, if the verification is passed, the management server allows the starting work of the software, otherwise, a prompt needing to be activated is output;
In step 1, the hardware serial number of the computer device includes one or more of serial numbers of a motherboard, a network card and a hard disk; the identity identification information comprises one or more of an identity card number, a mobile phone number and a staff number;
In step 1, the specific process of generating the software management two-dimensional code comprises the following steps:
Step 1.1, encrypting a hardware serial number and identity identification information of computer equipment by using a preset encryption key and an encryption algorithm to generate a license information character string;
Step 1.2, packaging a license information character string into a two-dimensional code protocol according to a preset protocol rule, and converting the two-dimensional code protocol by utilizing a preset two-dimensional code generating component to obtain a software management two-dimensional code;
In step 3, the computer device can allow writing in the user feedback information, and transmit the user feedback information to the management server along with the hardware serial number and the identity identification information input by the user terminal, and the management server stores the received user feedback information in association with the hardware serial number.
2. The two-dimensional code-based terminal management method as set forth in claim 1, wherein: in step 3, the user terminal for scanning or identifying the software management two-dimensional code comprises a smart phone, a smart tablet and/or the computer equipment for generating the software management two-dimensional code.
CN202010714490.7A 2020-07-23 2020-07-23 Terminal management method based on two-dimension code Active CN111860723B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010714490.7A CN111860723B (en) 2020-07-23 2020-07-23 Terminal management method based on two-dimension code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010714490.7A CN111860723B (en) 2020-07-23 2020-07-23 Terminal management method based on two-dimension code

Publications (2)

Publication Number Publication Date
CN111860723A CN111860723A (en) 2020-10-30
CN111860723B true CN111860723B (en) 2024-07-12

Family

ID=72950789

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010714490.7A Active CN111860723B (en) 2020-07-23 2020-07-23 Terminal management method based on two-dimension code

Country Status (1)

Country Link
CN (1) CN111860723B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112738059B (en) * 2020-12-23 2022-02-22 迈普通信技术股份有限公司 Terminal access validity verification method and device, electronic equipment and storage medium
CN112699422A (en) * 2020-12-29 2021-04-23 湖北省楚天云有限公司 Cloud platform terminal management method and system based on two-dimensional code
CN115865539B (en) * 2023-03-03 2023-06-09 新云网科技集团股份有限公司 Security binding method, device, equipment and storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105933353A (en) * 2016-07-05 2016-09-07 北京万维星辰科技有限公司 Method and system for realizing secure login

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102685093B (en) * 2011-12-08 2015-12-09 陈易 A kind of identity authorization system based on mobile terminal and method
CN104917766B (en) * 2015-06-10 2018-01-05 飞天诚信科技股份有限公司 A kind of two-dimension code safe authentication method
CN110611685B (en) * 2019-10-30 2021-11-30 南宁市指搜信息技术有限公司 Internet site login system based on intelligent equipment monitoring and user identity recognition
CN110768839B (en) * 2019-10-30 2022-07-22 南宁市指搜信息技术有限公司 Third-party software authorization system based on intelligent equipment monitoring and user identity binding

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105933353A (en) * 2016-07-05 2016-09-07 北京万维星辰科技有限公司 Method and system for realizing secure login

Also Published As

Publication number Publication date
CN111860723A (en) 2020-10-30

Similar Documents

Publication Publication Date Title
CN111860723B (en) Terminal management method based on two-dimension code
US10146957B1 (en) Sensitive data aliasing
US7587608B2 (en) Method and apparatus for storing data on the application layer in mobile devices
CN110149328B (en) Interface authentication method, device, equipment and computer readable storage medium
CN101305375A (en) System and method for controlling distribution of electronic information
US20040003248A1 (en) Protection of web pages using digital signatures
US20100154066A1 (en) System and Method for Managing Security Testing
CN108965222B (en) Identity authentication method, system and computer readable storage medium
CN110889130B (en) Database-based fine-grained data encryption method, system and device
CN101329787A (en) Terminal device, secure device and application authentication system
CN104756127A (en) Secure data handling by a virtual machine
US20160337358A1 (en) Method for encoding an access to a computer resource
US11303451B2 (en) System for authentication
CN101965574A (en) Authentication information generation system, authentication information generation method, and authentication information generation program utilizing a client device and said method
US7340773B2 (en) Multi-stage authorisation system
US20010048359A1 (en) Restriction method for utilization of computer file with use of biometrical information, method of logging in computer system and recording medium
CN109598104A (en) Soft ware authorization based on timestamp and secret authentication file protects system and method
CN112464212A (en) Data authority control reconstruction method based on mature complex service system
JPH11184818A (en) Authentication system, its method and client machine for the certification system
CN108650214B (en) Dynamic page encryption anti-unauthorized method and device
CN113254986B (en) Data processing method, device and computer readable storage medium
JP2005065035A (en) Substitute person authentication system using ic card
JP2007179357A (en) Method for installing computer program
JP4565827B2 (en) Information processing apparatus for reading ID tag, program for reading ID tag, and program for writing to ID tag
JP5167795B2 (en) Database maintenance method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant