CN111881424A - License authorization method and device based on machine identification code - Google Patents

License authorization method and device based on machine identification code Download PDF

Info

Publication number
CN111881424A
CN111881424A CN202010767742.2A CN202010767742A CN111881424A CN 111881424 A CN111881424 A CN 111881424A CN 202010767742 A CN202010767742 A CN 202010767742A CN 111881424 A CN111881424 A CN 111881424A
Authority
CN
China
Prior art keywords
identification code
authorization
machine
mac address
machine identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010767742.2A
Other languages
Chinese (zh)
Inventor
贾鑫鑫
陈勇铨
朱黎娟
龚欢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yingfang Software Co ltd
Original Assignee
Shanghai Yingfang Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yingfang Software Co ltd filed Critical Shanghai Yingfang Software Co ltd
Priority to CN202010767742.2A priority Critical patent/CN111881424A/en
Publication of CN111881424A publication Critical patent/CN111881424A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1011Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a permission authorization method and a device based on a machine identification code, wherein the method comprises the following steps: step S1, acquiring the physical address, the system serial number and the system UUID number of the host to be authorized, and generating a machine identification code; step S2, adding the generated machine identification code as a necessary element into an authorization file of the software to be authorized, and encrypting the authorization file according to a preset encryption algorithm; step S3, in the authorization process, obtaining the physical address, system serial number and system UUID number of the host to be verified, generating the identification code to be verified, obtaining the authorization file, comparing the identification code to be verified with the machine identification code in each authorization file, and authorizing according to the comparison result.

Description

License authorization method and device based on machine identification code
Technical Field
The invention relates to the technical field of computer software license authorization, in particular to a license authorization method and device based on a machine identification code.
Background
Because software products are characterized by easy copying, easy transmission, easy piracy and the like, the use of software products generally needs to be protected by authorized licenses.
At present, the software function authorization and permission method mainly includes two types of permission code permission and account login:
1. the license code authorization means that the function license authorization is completed by inputting the license code in the process of installing the software. However, the method has the defects that the license is easy to steal, reuse and crack;
2. the login account authorization refers to a process of obtaining an authorization function by logging in an account at a user side through registering the account and purchasing the authority. However, this method firstly requires networking and online to be able to acquire the function right through the login account, and secondly, this login service is relatively complex to implement, and for small and medium-sized companies, it is impractical to implement due to its high cost.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention aims to provide a license authorization method and a device based on a machine identification code, so as to realize the authorization verification of software functions by combining mechanical identification and authorization verification.
To achieve the above object, the present invention provides a license authorization method based on machine identification code, comprising the following steps:
step S1, acquiring the physical address, the system serial number and the system UUID number of the host to be authorized, and generating a machine identification code;
step S2, adding the generated machine identification code as a necessary element into an authorization file of the software to be authorized, and encrypting the authorization file according to a preset encryption algorithm;
step S3, in the authorization process, obtaining the physical address, system serial number and system UUID number of the host to be verified, generating the identification code to be verified, obtaining the authorization file, comparing the identification code to be verified with the machine identification code in each authorization file, and authorizing according to the comparison result.
Preferably, the step S1 further includes:
step S100, obtaining MAC address encryption string information of the host to be authorized;
step S102, obtaining a system serial number of a host to be authorized;
step S103, acquiring a system UUID number of a host to be authorized;
and step S104, splicing the obtained MAC address encryption string information, the system serial number and the system UUID number into a character string, and encrypting by using a preset encryption algorithm to generate an initial machine identification code.
Preferably, in step S100, a registry of the host to be authorized is obtained, and the registry is checked to check whether the registry adds the MAC address encryption string information; if the registry has the MAC address encryption string information, acquiring the MAC address encryption string information in the registry as the MAC address part of the machine identification code to be generated, and if the registry does not have the MAC address encryption string information, acquiring the MAC address of the host to be authorized again and encrypting the MAC address encryption string information into a string to form the MAC address encryption string information as the MAC address part of the machine identification code to be generated.
Preferably, in step S100, MAC address encryption string information obtained by encrypting the acquired MAC address is added to the registry.
Preferably, after step S104, the method further includes the following steps:
step S105, adding a specification number and a version number into the initial machine identification code to form the final machine identification code.
Preferably, the machine identification code consists of a specification number, a main part and a version number, the main part is formed by splicing, encrypting and formatting an acquired MAC address, a system serial number and a system UUID number, the specification number is determined by the acquisition conditions of the MAC address, the system serial number and the system UUID number, and the version number is used for distinguishing the machine identification code version.
Preferably, in step S2, the authorization file is generated by combining information such as machine identification code, serial number, function to be authorized, and validity period.
Preferably, in step S2, the generated final authorization file is stored in the authorization service area of the authorization server.
Preferably, in step S3, if the comparison result is that the two are the same, the corresponding authorization file is obtained, the function in the authorization file is authorized to the host to be authenticated, the authorization is successful, and the authorization process is ended; and if the comparison result is that the two conditions are not the same, prompting error information and failing to authorize.
In order to achieve the above object, the present invention further provides a license authorization apparatus based on a machine identification code, including:
the machine identification code generating unit is used for acquiring the physical address, the system serial number and the system UUID number of the host to be authorized and generating a machine identification code;
the authorization file generation unit is used for adding the generated machine identification code as a necessary element into an authorization file of the software to be authorized and encrypting the authorization file according to a preset encryption algorithm;
and the authorization verification unit is used for acquiring the physical address, the system serial number and the system UUID number of the host to be verified in the authorization process, generating an identification code to be verified, acquiring the authorization file, comparing the identification code to be verified with the machine identification code in each authorization file, and performing authorization permission according to the comparison result.
Compared with the prior art, the license authorization method and device based on the machine identification code achieve the purpose of authorization and verification of software functions by acquiring the physical address, the system serial number and the system UUID number of a host to be authorized, generating the machine identification code, adding the generated machine identification code into an authorization file of software to be authorized as a necessary element, encrypting the authorization file according to a preset encryption algorithm, finally acquiring the physical address, the SN system serial number and the system UUID number of the host to be verified, generating the identification code to be verified, comparing the identification code to be verified with the machine identification code in the authorization file, performing authorization and authorization according to a comparison result, and combining mechanical identification with authorization and verification.
Drawings
FIG. 1 is a flowchart illustrating the steps of a license authorization method based on machine identification codes according to the present invention;
FIG. 2 is a schematic diagram of a machine identification code according to an embodiment of the present invention;
FIG. 3 is a system diagram of a license authority based on machine ID of the present invention;
FIG. 4 is a flowchart illustrating the generation of a machine identifier according to an embodiment of the present invention;
FIG. 5 is a diagram illustrating a process of generating an authorization file according to an embodiment of the present invention;
FIG. 6 is a diagram illustrating a process of verifying an authorization file according to the present embodiment;
fig. 7 is a flowchart illustrating compatibility processing for an identifier version according to an embodiment of the present invention.
Detailed Description
Other advantages and capabilities of the present invention will be readily apparent to those skilled in the art from the present disclosure by describing the embodiments of the present invention with specific embodiments thereof in conjunction with the accompanying drawings. The invention is capable of other and different embodiments and its several details are capable of modification in various other respects, all without departing from the spirit and scope of the present invention.
FIG. 1 is a flowchart illustrating steps of a license authorization method based on a machine identification code according to the present invention. As shown in fig. 1, the present invention relates to a license authorization method based on machine identification code, which comprises the following steps:
step S1, obtaining the physical address, system Serial Number (SN) and system UUID number of the host to be authorized, and generating the machine identification code.
The invention utilizes the uniqueness and invariance of the mechanical code and grants the characteristics to the authorization file, thereby overcoming the defects that the traditional mode is easy to embezzle, is repeatedly used and the like. Specifically, in step S1, the physical address of the host to be authorized, the SN system serial number, and the system UUID number are used as three elements to generate the machine identifier. Because some special models may not guarantee that all elements are acquired simultaneously, or some elements are not unique after being acquired, the problem of dilution by adopting a multi-element method occurs in the invention. Generally, an SN system serial number and a system UUID number are used as information identifiers of a system, and are generally unchangeable, and a MAC physical address exists as long as a network card exists, and the three elements are generally unique, so that the invention can ensure that each host generates a unique identification code by using the three elements as the identification code, thereby ensuring the reliability of the identification code verification process.
Specifically, step S1 further includes:
step S100, acquiring a registry of a host to be authorized, and checking whether MAC address encryption string information is added to the registry;
step S101, if the register table has MAC address encryption string information, acquiring the MAC address encryption string information in the register table as the MAC address part of the machine identification code to be generated; if the registry does not have MAC address encryption string information, the MAC address of the host to be authorized is obtained again, encrypted into a string and added into the registry. In the invention, the acquired MAC address needs to be encrypted into the MAC address encryption string information and added into the registry, because the MAC address of the network card or the virtual machine network card is variable, the MAC address encryption string information is added into the registry, so that when the identification code is acquired and identified later, the registry information is not changed, and the identification code can still pass verification even if the MAC address is changed.
Step S102, obtaining a system serial number (SN number) of a host to be authorized;
step S103, acquiring a system UUID number of a host to be authorized;
and step S104, splicing the obtained MAC address encryption string information, the system serial number and the system UUID number into a character string, and encrypting by using a preset encryption algorithm to generate an initial machine identification code. In the specific embodiment of the invention, the obtained MAC address encryption string information, the system serial number and the system UUID number are spliced according to a preset sequence, and are encrypted by using an MD5 algorithm to generate an initial machine identification code.
Preferably, after step S104, the method further includes the following steps:
step S105, adding the specification number and the version number into the initial machine identification code to form a final machine identification code. The invention adds the version number and the specification number into the generated machine identification code, wherein the addition of the version number is beneficial to the iterative work of the machine identification code in the future and is also beneficial to ensuring the forward compatibility of the machine identification code, and the specification number is beneficial to distinguishing the composition condition of the current identification code so as to judge whether the currently obtained machine identification code meets the standard or not and screen out the machine identification code which does not meet the standard.
Fig. 2 is a schematic structural diagram of a machine identification code generated in an embodiment of the present invention. In the embodiment of the invention, the machine identification code consists of three parts, namely a specification number, a main part and a version number, wherein the specification number is determined by the acquisition conditions of a MAC address, an SN serial number and a UUID number, namely the specification number is used for indicating the acquisition conditions of the MAC address, the SN serial number and the UUID number, for example, as shown in FIG. 2, the specification number is 1(0001) if only the MAC address can be acquired, and the specification number is 2(0010) if only the SN serial number can be acquired, because some characteristic values in the MAC address, the SN serial number and the UUID number cannot be acquired necessarily in some specific systems, for example, only the MAC address is normal, other values are default values, the characteristic value of the machine characteristic cannot be identified (at this time, the specification number needs to be modified in the front to play the role of identifying the characteristic, and after the specification number is modified, the permission authorization can be verified), therefore, in order to construct the machine identification code, the specification number is added in the identification code, and the length of the specification number is determined according to the actual situation; the middle part is the main part of the machine identification code, which is formed by splicing, encrypting and formatting the acquired MAC address, the system SN number and the system UUID number, is the main part of the identification code recording computer characteristics and is used for machine identification; finally, the version number is used for distinguishing the version of the identification code through the version number when a developer intentionally modifies the program identification code acquisition mode so as to ensure that the purpose that an authorization file generated by the identification code of the previous version is still usable is achieved, namely, the machine identification code of the corresponding previous version can be acquired through the version number to judge the authorization permission, and the version number can be generally determined by developers.
And step S2, adding the generated machine identification code as a necessary element into an authorization file of the software to be authorized, and encrypting the authorization file according to a preset encryption algorithm so as to avoid the tampering of the machine identification code by a user. That is, after the machine identification code is generated, the authorization file is generated by combining the machine identification code, the serial number, the function to be authorized, the validity period and other information, and finally the authorization file is stored in the authorization service area of the authorization server.
Step S3, in the authorization process, the physical address of the host to be verified, the SN system serial number and the system UUID number are obtained to generate the identification code to be verified, the authorization file is obtained, the identification code to be verified is compared with the machine identification code in the authorization file, and authorization permission is carried out according to the comparison result. Specifically, after the identification code to be verified is generated, all authorization files are obtained from the authorization server, the identification code to be verified is compared with the machine identification code in each authorization file, if the comparison result is that the identification code to be verified is the same as the machine identification code in each authorization file, the corresponding authorization file is obtained, the function in the authorization file is authorized to the host to be verified, the authorization is successful, and the authorization process is finished; if the machine identification code without the authorization file is the same as the identification code to be verified, the wrong information of 'different identification codes and failed authorization' is prompted, and the authorization fails, so that the conditions that the license is stolen or reused can be effectively avoided through the method and the device.
Fig. 3 is a system configuration diagram of a license authority device based on a machine identification code according to the present invention. As shown in fig. 3, the present invention relates to a license authorization apparatus based on machine identification code, including:
and a machine identifier generating unit 301, configured to obtain a physical address of the host to be authorized, an SN system serial number, and a system UUID number, and generate a machine identifier.
In the invention, the uniqueness and invariance of the mechanical code are utilized, and the characteristics of the mechanical code are granted to the authorization file, so that the defects that the traditional mode is easy to embezzle, is repeatedly used and the like are overcome. Specifically, in step S1, the physical address of the host to be authorized, the SN system serial number, and the system UUID number are used as three elements to generate the machine identifier. Because some special models may not guarantee that all elements are acquired simultaneously, or some elements are not unique after being acquired, the problem of dilution by adopting a multi-element method occurs in the invention. Generally, an SN system serial number and a system UUID number are used as information identifiers of a system, and are generally unchangeable, and a MAC physical address exists as long as a network card exists, and the three elements are generally unique, so that the present invention can ensure that each host generates a unique identification code by using the three elements as the identification code, thereby ensuring the reliability of the identification code verification process.
Specifically, the machine identification code generation unit 301 further includes:
the registry acquisition detection module is used for acquiring a registry of a host to be authorized, and checking the registry to check whether the registry adds MAC address encryption string information;
the MAC address encryption string information acquisition module is used for acquiring the MAC address encryption string information in the registry as the MAC address part of the machine identification code to be generated when the MAC address encryption string information exists in the registry; and when the registry does not have MAC address encryption string information, the MAC address of the host to be authorized is obtained again, encrypted into a string and added into the registry. In the invention, the acquired MAC address needs to be encrypted into the MAC address encryption string information and added into the registry, because the MAC address of the network card or the virtual machine network card is variable, the network card or the virtual machine network card needs to be encrypted into the MAC address encryption string information and added into the registry, so that the registry information can still be verified and passed when the identification code is acquired and identified later and even if the MAC address changes, the registry information cannot be changed.
The system serial number acquisition module is used for acquiring a system serial number (SN number) of the host to be authorized;
the system UUID number acquisition module is used for acquiring a system UUID number of a host to be authorized;
and the splicing module is used for splicing the obtained MAC address encryption string information, the system serial number and the system UUID number into a character string, encrypting by using a preset encryption algorithm and generating an initial machine identification code. In the specific embodiment of the invention, the splicing module splices the obtained MAC address encryption string information, the system serial number and the system UUID number in a certain sequence, and encrypts by using an MD5 algorithm to generate an initial machine identification code.
Preferably, the machine identification code generating unit 301 further includes:
and the identification code generation module is used for adding the specification number and the version number into the initial machine identification code to form a final machine identification code. The invention adds the version number and the specification number into the generated machine identification code, wherein the addition of the version number is beneficial to the iterative work of the identification code in the future and is also beneficial to ensuring the forward compatibility of the identification code, and the specification number is beneficial to distinguishing the composition condition of the current identification code so as to judge whether the currently obtained identification code meets the standard or not and screen out the non-compliant identification code.
The authorization file generating unit 302 is configured to add the generated machine identifier as a necessary element to an authorization file of the software to be authorized, and encrypt the authorization file according to a preset encryption algorithm, so as to avoid tampering of the machine identifier by a user. That is, after the machine identification code is generated, the authorization file is generated by combining the machine identification code, the serial number, the function to be authorized, the validity period and other information, and finally the authorization file is stored in the authorization service area of the authorization server.
And the authorization verification unit 303 is configured to obtain a physical address of the host to be verified, an SN system serial number, and a system UUID number to generate an identification code to be verified, obtain an authorization file from an authorization server, compare the identification code to be verified with a machine identification code in the authorization file, and perform authorization permission according to a comparison result. Specifically, after the identification code to be authenticated is generated, the authorization authentication unit 303 obtains all authorization files from the authorization server, compares the identification code to be authenticated with the machine identification codes in the authorization files, if the comparison result is that the identification code to be authenticated and the machine identification codes in the authorization files are the same, obtains the corresponding authorization file, authorizes the function in the authorization file to the host to be authenticated, succeeds in authorization, and ends the authorization process; if the machine identification code without the authorization file is the same as the identification code to be verified, the wrong information of 'different identification codes and failed authorization' is prompted, and the authorization fails, so that the conditions that the license is stolen or reused can be effectively avoided through the method and the device.
Practice ofExample (b)
FIG. 4 is a flowchart illustrating a process of generating a machine identifier according to an embodiment of the present invention. As shown in fig. 4, in the present embodiment, the generation process of the machine identification code includes the following steps:
the method comprises the steps of firstly, obtaining a registry of a host to be authorized, checking whether MAC address encryption string information is added to the registry, if so, obtaining the value of the MAC address encryption string information as the MAC address part of a machine identification code, and if not, obtaining the MAC address of the host to be authorized again, encrypting the MAC address into a string and adding the MAC address into the registry;
secondly, acquiring the value of a system serial number (SN number is marked in the figure) of the host to be authorized;
thirdly, acquiring a system UUID number of the host to be authorized;
and fourthly, splicing and encrypting the MAC address encryption string information, the system serial number and the system UUID number to generate an initial string.
And fifthly, adding the specification number and the version number into the initial string, and formatting the string into an identification code with a string format of 32 to form a final machine identification code.
Fig. 5 is a schematic diagram of a generation process of an authorization file in the embodiment of the present invention. As shown in fig. 5, after the machine identification code of the host to be authorized (e.g. the client host or the portable computer) is successfully generated, the information such as the identification code, the serial number, the function to be authorized, the validity period, etc. is combined to verify (mainly verify whether the machine identification code format is valid) and generate the authorization file (license), and the final authorization information is stored in the authorization service area of the authorization server.
Fig. 6 is a diagram of a verification process of the authorization file in this embodiment, where the generation process of the machine identification code in fig. 4 needs to be repeated to obtain the identification code to be verified, after the identification code to be verified is successfully obtained, the authorization file is obtained from the authorization server, and compared with the machine identification code in the authorization file, if the two are the same, the function in the authorization file is authorized to the current computer, the authorization is successful, and the authorization process is ended; if the two are different, the wrong information of 'different identification codes and failed authorization' is prompted, the authorization fails, and the conditions that the license is stolen and reused are effectively avoided.
Fig. 7 is a flowchart illustrating compatibility processing for an identifier version according to an embodiment of the present invention. In the invention, the machine identification code contains a version number which is used for distinguishing the machine identification code version when the machine identification code is modified so as to ensure the purpose that the authorization file generated by the previous version identification code is still usable. Assuming that the last version number of the machine identification code is 01, at this time, the identification code algorithm on the server is upgraded (i.e., the procedure for upgrading and acquiring the identification code, i.e., step S1), assuming that the developer modifies the identification code algorithm, the version number may change, so that a command is needed to introduce the old machine identification code to determine the version of the machine identification code, if the version number is introduced, the identification code of the corresponding version is acquired, and if the version number is not introduced in the command, the latest version identification code is acquired, so that the purpose of making the old machine identification code version compatible with the new machine identification code version is achieved, and the identification code cannot be transformed due to the change of the algorithm version.
In summary, the present invention provides a method and an apparatus for license authorization based on a machine identifier, which achieve the purpose of license verification of software functions by obtaining a physical address, a system serial number, and a system UUID number of a host to be authorized, generating the machine identifier, adding the generated machine identifier as a necessary element to an authorization file of software to be authorized, encrypting the authorization file according to a preset encryption algorithm, finally obtaining the physical address, the system serial number, and the system UUID number of the host to be verified, generating an identifier to be verified, comparing the identifier to be verified with the machine identifier in the authorization file, performing license authorization according to a comparison result, and combining mechanical identification with authorization verification.
The foregoing embodiments are merely illustrative of the principles and utilities of the present invention and are not intended to limit the invention. Modifications and variations can be made to the above-described embodiments by those skilled in the art without departing from the spirit and scope of the present invention. Therefore, the scope of the invention should be determined from the following claims.

Claims (10)

1. A license authorization method based on machine identification code includes the following steps:
step S1, acquiring the physical address, the system serial number and the system UUID number of the host to be authorized, and generating a machine identification code;
step S2, adding the generated machine identification code as a necessary element into an authorization file of the software to be authorized, and encrypting the authorization file according to a preset encryption algorithm;
step S3, in the authorization process, obtaining the physical address, system serial number and system UUID number of the host to be verified, generating the identification code to be verified, obtaining the authorization file, comparing the identification code to be verified with the machine identification code in each authorization file, and authorizing according to the comparison result.
2. The machine-identifier-based license authorization method of claim 1, wherein the step S1 further comprises:
step S100, obtaining MAC address encryption string information of the host to be authorized;
step S102, obtaining a system serial number of a host to be authorized;
step S103, acquiring a system UUID number of a host to be authorized;
and step S104, splicing the obtained MAC address encryption string information, the system serial number and the system UUID number into a character string, and encrypting by using a preset encryption algorithm to generate an initial machine identification code.
3. The machine-identifier-based license authorization method of claim 2, wherein: in step S100, a registry of the host to be authorized is obtained, and the registry is checked to check whether the registry adds MAC address encryption string information; if the registry has the MAC address encryption string information, acquiring the MAC address encryption string information in the registry as the MAC address part of the machine identification code to be generated, and if the registry does not have the MAC address encryption string information, acquiring the MAC address of the host to be authorized again and encrypting the MAC address encryption string information into a string to form the MAC address encryption string information as the MAC address part of the machine identification code to be generated.
4. A machine-identifier-based license authorization method according to claim 3, characterized in that: in step S100, MAC address encryption string information obtained by encrypting the acquired MAC address is added to the registry.
5. The machine-identifier-based license authorization method of claim 3, further comprising, after the step S104, the steps of:
step S105, adding a specification number and a version number into the initial machine identification code to form the final machine identification code.
6. The machine-identifier-based license authorization method of claim 5, wherein: the machine identification code consists of a specification number, a main body part and a version number, wherein the main body part is formed by splicing, encrypting and formatting an acquired MAC address, a system serial number and a system UUID number, the specification number is determined by the acquisition conditions of the MAC address, the system serial number and the system UUID number, and the version number is used for distinguishing the machine identification code version.
7. The machine-identifier-based license authorization method of claim 5, wherein: in step S2, the machine identifier, the serial number, the function to be authorized, and the validity period are combined to generate the authorization file.
8. The machine-identifier-based license authorization method of claim 7, wherein: in step S2, the generated final authorization file is stored in the authorization service area of the authorization server.
9. The machine-identifier-based license authorization method of claim 7, wherein: in step S3, if the comparison result is that the two are the same, acquiring the corresponding authorization file, authorizing the function in the authorization file to the host to be verified, and if the authorization is successful, ending the authorization process; and if the comparison result is that the two conditions are not the same, prompting error information and failing to authorize.
10. A machine-identifier-based license authority comprising:
the machine identification code generating unit is used for acquiring the physical address, the system serial number and the system UUID number of the host to be authorized and generating a machine identification code;
the authorization file generation unit is used for adding the generated machine identification code as a necessary element into an authorization file of the software to be authorized and encrypting the authorization file according to a preset encryption algorithm;
and the authorization verification unit is used for acquiring the physical address, the system serial number and the system UUID number of the host to be verified in the authorization process, generating an identification code to be verified, acquiring the authorization file, comparing the identification code to be verified with the machine identification code in each authorization file, and performing authorization permission according to the comparison result.
CN202010767742.2A 2020-08-03 2020-08-03 License authorization method and device based on machine identification code Pending CN111881424A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010767742.2A CN111881424A (en) 2020-08-03 2020-08-03 License authorization method and device based on machine identification code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010767742.2A CN111881424A (en) 2020-08-03 2020-08-03 License authorization method and device based on machine identification code

Publications (1)

Publication Number Publication Date
CN111881424A true CN111881424A (en) 2020-11-03

Family

ID=73205415

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010767742.2A Pending CN111881424A (en) 2020-08-03 2020-08-03 License authorization method and device based on machine identification code

Country Status (1)

Country Link
CN (1) CN111881424A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112528236A (en) * 2020-12-18 2021-03-19 深圳竹云科技有限公司 Application software authorization method based on virtual machine
CN113794787A (en) * 2021-09-02 2021-12-14 北京奕斯伟计算技术有限公司 Number writing method and system
CN115802352A (en) * 2022-11-04 2023-03-14 广州爱浦路网络技术有限公司 Processing method, system, device and storage medium for 5GC (gas chromatography) equipment authorization
CN115859389A (en) * 2023-02-17 2023-03-28 浪潮通用软件有限公司 Software serial number authorization method and system based on privatized deployment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010034712A1 (en) * 1998-06-04 2001-10-25 Colvin David S. System and method for monitoring software
CN108924087A (en) * 2018-05-28 2018-11-30 国网福建省电力有限公司 Cloud virtual machine intellectual property method for effective protecting is realized based on No. UUID and MAC Address
CN109460639A (en) * 2018-12-04 2019-03-12 郑州云海信息技术有限公司 A kind of license authentication control method, device, terminal and storage medium
CN109858202A (en) * 2018-12-27 2019-06-07 江苏博智软件科技股份有限公司 A kind of safe and secret offline software registration authorization method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010034712A1 (en) * 1998-06-04 2001-10-25 Colvin David S. System and method for monitoring software
CN108924087A (en) * 2018-05-28 2018-11-30 国网福建省电力有限公司 Cloud virtual machine intellectual property method for effective protecting is realized based on No. UUID and MAC Address
CN109460639A (en) * 2018-12-04 2019-03-12 郑州云海信息技术有限公司 A kind of license authentication control method, device, terminal and storage medium
CN109858202A (en) * 2018-12-27 2019-06-07 江苏博智软件科技股份有限公司 A kind of safe and secret offline software registration authorization method

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112528236A (en) * 2020-12-18 2021-03-19 深圳竹云科技有限公司 Application software authorization method based on virtual machine
CN113794787A (en) * 2021-09-02 2021-12-14 北京奕斯伟计算技术有限公司 Number writing method and system
CN115802352A (en) * 2022-11-04 2023-03-14 广州爱浦路网络技术有限公司 Processing method, system, device and storage medium for 5GC (gas chromatography) equipment authorization
CN115802352B (en) * 2022-11-04 2023-07-25 广州爱浦路网络技术有限公司 Processing method, system, device and storage medium for 5GC equipment authorization
CN115859389A (en) * 2023-02-17 2023-03-28 浪潮通用软件有限公司 Software serial number authorization method and system based on privatized deployment
CN115859389B (en) * 2023-02-17 2023-04-28 浪潮通用软件有限公司 Software serial number authorization method and system based on privately-distributed deployment

Similar Documents

Publication Publication Date Title
CN111881424A (en) License authorization method and device based on machine identification code
EP2863303B1 (en) Method for confirming correction program, confirming program for confirming correction program, and information processing apparatus
US9311470B2 (en) Method and system for authenticating a user
CN110138562B (en) Certificate issuing method, device and system of intelligent equipment
JP2017215808A (en) Information-processing equipment, data processing system, data processing method, and computer program
CN110401613B (en) Authentication management method and related equipment
US20090287917A1 (en) Secure software distribution
JPWO2007108127A1 (en) System program download system
KR20120051662A (en) A method for controlling unauthorized software application usage
CN103634328A (en) Authentication method, device and system for network platform authentication server
CN105577644A (en) Encryption and authentication method and system
WO2015191933A1 (en) Restricted code signing
JP5183517B2 (en) Information processing apparatus and program
CN105391705A (en) Method of carrying out authentication on application service and device
CN112689285A (en) Authorization authentication method and system for mobile terminal SDK
US20140230052A1 (en) System and method for testing a secured manufactured device
CN107968764B (en) Authentication method and device
US20130067533A1 (en) Generating a test license for a developer application
CN107704756B (en) Security verification method and system before system upgrade
JP4814993B2 (en) Device to be debugged, authentication program, and debug authentication method
KR100899638B1 (en) Method for providing service using device identity information, system thereof and computer-readable medium recoded the program for executing the method
CN109120642B (en) Detection and verification method, device and system for emulational equipment
JP2013511090A (en) Content merge at first access
CN109977631B (en) Software authorization method and system based on cluster deployment
JP2010160765A (en) System lsi and debugging method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination