CN106503492A - A kind of authorization management method, server, customer equipment and system - Google Patents
A kind of authorization management method, server, customer equipment and system Download PDFInfo
- Publication number
- CN106503492A CN106503492A CN201610954690.3A CN201610954690A CN106503492A CN 106503492 A CN106503492 A CN 106503492A CN 201610954690 A CN201610954690 A CN 201610954690A CN 106503492 A CN106503492 A CN 106503492A
- Authority
- CN
- China
- Prior art keywords
- customer
- client
- customer equipment
- server
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
- G06F21/1011—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to devices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/105—Arrangements for software license management or administration, e.g. for managing licenses at corporate level
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention discloses a kind of authorization management method, server, customer equipment and system, for improving the safety of empowerment management.Present invention method includes:Server generates client's serial number according to customer information, and wherein customer information is corresponding with target software;Server sends client's serial number to customer equipment, so that client's serial number is bound by customer equipment with the customer equipment, and generates customer ID code according to the information of the customer equipment that is bound by client's serial number;Server obtains the customer ID code;Server generates authorization code according to customer ID code;Server sends authorization code to customer equipment, so that customer equipment activates the target software according to authorization code.So, the authorization code has one-to-one relationship with customer equipment, and passes through to generate authorization code in server end according to the customer ID code, and authorization code is illegally used for the possibility of illegality equipment to reduce client, so as to improve safety.
Description
Technical field
The present invention relates to communication technical field, more particularly to a kind of authorization management method, server, customer equipment and mandate
Management system.
Background technology
As operation of the software on equipment is used, the executable function of equipment is more and more, so as to meet user more
Many demands.
The exploitation of software consumes plenty of time and the money of development organizations, in order to reduce the use and more preferably of piracy software
Allow software service in consumer, can be by ticket for authorization mode come the use of management software.
But, it was found by the inventors of the present invention that prior art has the disadvantages that:
The mandate of licence be mostly by soft ware authorization server direct under license to client, client is by license
Card directly activates corresponding software on the client device, this is done so that the licence can be used on multiple devices, is unfavorable for preventing
Only software is usurped.
Content of the invention
Embodiments provide a kind of safe authorization management method, server, customer equipment and authorize pipe
Reason system.
In order to solve above-mentioned technical problem, the embodiment of the present invention provides technical scheme below:
A kind of authorization management method, including:
Server generates client's serial number according to customer information, and wherein described customer information is corresponding with target software;
The server sends client's serial number to customer equipment, so that the customer equipment is by client's sequence
Number bound with the customer equipment, and generated according to the information of the customer equipment that is bound by client's serial number
Customer ID code;
The server obtains the customer ID code;
The server generates authorization code according to the customer ID code;
The server sends the authorization code to the customer equipment, so that the customer equipment is according to the authorization code
Activate the target software.
In order to solve above-mentioned technical problem, the embodiment of the present invention also provides technical scheme below:
A kind of authorization management method, including:
Customer equipment obtains client's serial number, and wherein described client's serial number is according to customer information corresponding with target software
Generate;
Client's serial number and the customer equipment are bound by the customer equipment;
The customer equipment generates customer ID according to the information of the customer equipment that is bound by client's serial number
Code;
The customer equipment sends the customer ID code to server, so that the server is according to the customer ID
Code generates authorization code;
The customer equipment obtains the authorization code;
The customer equipment activates the target software according to the authorization code.
In order to solve above-mentioned technical problem, the embodiment of the present invention also provides technical scheme below:
A kind of server, including:
Serial number generation module, for generating client's serial number, wherein described customer information and target according to customer information
Software is corresponding;
First sending module, for sending client's serial number to customer equipment, so that the customer equipment will be described
Client's serial number is bound with the customer equipment, and according to the customer equipment that is bound by client's serial number
Information generates customer ID code;
First acquisition module, for obtaining the customer ID code;
Authorization code generation module, for generating authorization code according to the customer ID code;
Second sending module, for sending the authorization code to the customer equipment, so that the customer equipment is according to institute
State authorization code and activate the target software.
In order to solve above-mentioned technical problem, the embodiment of the present invention also provides technical scheme below:
A kind of customer equipment, including:
Second acquisition module, for obtaining client's serial number, wherein described client's serial number is according to corresponding with target software
Customer information generate;
Binding module, for being bound client's serial number and the customer equipment;
Identification code generating module, for generating visitor according to the information of the customer equipment that is bound by client's serial number
Family identification code;
3rd sending module, for sending the customer ID code to server, so that the server is according to the visitor
Family identification code generates authorization code;
3rd acquisition module, for obtaining the authorization code;
Active module, for activating the target software according to the authorization code.
In order to solve above-mentioned technical problem, the embodiment of the present invention also provides technical scheme below:
A kind of authentication management system, including:Server and customer equipment;
Wherein, the server is above-described server;
The customer equipment is above-described customer equipment.
As can be seen from the above technical solutions, the embodiment of the present invention has advantages below:
Server is generated after client's serial number according to customer information, sends client's serial number to customer equipment, so that should
Client's serial number and the customer equipment are bound by customer equipment, and are generated according to the information of bound customer equipment
Customer ID code;Server generates authorization code further according to the customer ID code;So as to the customer equipment can be swashed according to the authorization code
Target software living.So, first client's serial number is bound with customer equipment, the information further according to the customer equipment generates client's mark
Know code, and authorization code is generated according to the customer ID code in server end so that the authorization code and customer equipment have one a pair
Should be related to, and pass through authorization code to be generated in server end according to the customer ID code, reducing client is illegally used for authorization code
The possibility of illegality equipment, so that improve safety.
Description of the drawings
Fig. 1 is the use environment schematic diagram of the embodiment of the present invention;
Fig. 2 is a kind of method flow diagram of an embodiment of authorization management method of the embodiment of the present invention;
Fig. 3 is a kind of method flow diagram of another embodiment of authorization management method of the embodiment of the present invention;
Fig. 4 is a kind of method flow diagram of another embodiment of authorization management method of the embodiment of the present invention;
Fig. 5 is a kind of structural representation of server of the embodiment of the present invention;
Fig. 6 is a kind of structural representation of customer equipment of the embodiment of the present invention;
Fig. 7 is a kind of structural representation of authentication management system of the embodiment of the present invention.
Specific embodiment
A kind of authorization management method, server, customer equipment and authentication management system is embodiments provided, is used for
Improve the safety of empowerment management.
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention in
Accompanying drawing, to the embodiment of the present invention in technical scheme be clearly and completely described, it is clear that described embodiment is only
The embodiment of a part of the invention, rather than whole embodiments.Embodiment in based on the present invention, ordinary skill people
The every other embodiment obtained under the premise of creative work is not made by member, should all belong to the model of present invention protection
Enclose.
Term " first ", " second ", " the 3rd " in description and claims of this specification and above-mentioned accompanying drawing, "
Four " etc. (if present) is for distinguishing similar object, without for describing specific order or precedence.Should manage
The data that solution is so used can be exchanged in the appropriate case, so that the embodiments described herein can be with except illustrating here
Or the order beyond the content of description is implemented.Additionally, term " comprising " and " having " and their any deformation, it is intended that
Covering is non-exclusive to be included, and for example, the process, method, system, product or the equipment that contain series of steps or unit need not be limited
In those steps or unit for clearly listing, but may include clearly not list or for these processes, method, product
Other intrinsic steps of product or equipment or unit.
Refering to Fig. 1, a kind of implementation environment involved by the authorization management method of section Example of the present invention is it illustrates, should
Implementation environment at least includes following network entity:Server 101 and customer equipment 102.
Wherein, the server can be the server that can issue authorization code, i.e. authorization server, and the customer equipment can be to wait to swash
The equipment that the client of software living uses, the customer equipment 102 are included but is not limited to:Handheld computer, personal digital assistant
(PDA), panel computer, laptop computer, desk computer, cell phone, smart phone, portable multifunction device or
The arbitrarily combination of two or more or other data handling equipment in these data handling equipment.The server 101 and client
Equipment 102 can be by wired or wireless network connection, as shown in figure 1, now server 101 and customer equipment 102 can pass through net
Network enters row data communication.The server 101 and customer equipment 102 can not also have annexation, the present invention not to limit this
Fixed, now, server 101 and customer equipment can carry out data transfer by modes such as artificial local inputs.
In the mandate code management method of the embodiment of the present invention, server is generated after client's serial number according to customer information, to
Customer equipment sends client's serial number, so that client's serial number and the customer equipment are bound by the customer equipment, with
And customer ID code is generated according to the information of bound customer equipment;Server is generated further according to the customer ID code and is authorized
Code;So as to the customer equipment can be according to the authorization code activation target software.So, first client's serial number and customer equipment are tied up
Fixed, the information further according to the customer equipment generates customer ID code, and authorization code is given birth to according to the customer ID code in server end
Into so that the authorization code has one-to-one relationship with customer equipment, and passes through in server end according to the customer ID code life
Into authorization code, authorization code is illegally used for the possibility of illegality equipment to reduce client, so as to improve safety.
With reference to Fig. 2, a kind of method flow diagram of authorization management method is it illustrates, the method can be used for the reality shown in Fig. 1
Apply in environment, it is also possible in the implementation environment for server and customer equipment without network connection, the present invention is executed with server
As a example by the angle of the method that embodiment is provided, referring to Fig. 2, method flow provided in an embodiment of the present invention includes:
Step 201:Client's serial number is generated according to customer information.
Wherein, customer information is corresponding with target software;
Optionally, customer information includes that client company title, the software module of client's application purchase, client's application are bought
At least one in customer equipment quantity, the natural law of purchase, the equipment region mark of purchase.
Optionally, server generates client's serial number according to customer information, specifically includes:
Server cryptographically generates client's serial number according to customer information.
Step 202:Client's serial number is sent to customer equipment.
Server sends client's serial number to customer equipment, so that client's serial number is carried out by customer equipment with customer equipment
Binding, and customer ID code is generated according to the information of the customer equipment that is bound by client's serial number;
Step 203:Obtain customer ID code;
Optionally, server obtains customer ID code, specifically includes:
When server is networked with customer equipment, server passes through Network Capture customer ID code;
When server is not networked with customer equipment, server obtains customer ID code by user's local input.
Step 204:Authorization code is generated according to customer ID code;
Step 205:Authorization code is sent to customer equipment,
Server sends authorization code to customer equipment, so that customer equipment activates target software according to authorization code.
In sum, server is generated after client's serial number according to customer information, sends client's sequence to customer equipment
Number, so that client's serial number and the customer equipment are bound by the customer equipment, and according to bound customer equipment
Information generate customer ID code;Server generates authorization code further according to the customer ID code;So as to the customer equipment energy according to
The authorization code activation target software.So, first client's serial number is bound with customer equipment, further according to the information of the customer equipment
Customer ID code is generated, and authorization code is generated according to the customer ID code in server end so that the authorization code and customer equipment
There is one-to-one relationship, and pass through authorization code to be generated in server end according to the customer ID code, reduce client and illegally will
Authorization code is used for the possibility of illegality equipment, so as to improve safety.
With reference to Fig. 3, a kind of method flow diagram of authorization management method is it illustrates, the method can be used for the reality shown in Fig. 1
Apply in environment, it is also possible in the implementation environment for server and customer equipment without network connection, this is executed with customer equipment
As a example by the angle of the method that bright embodiment is provided, referring to Fig. 3, method flow provided in an embodiment of the present invention includes:
Step 301:Obtain client's serial number.
Wherein, client's serial number is generated according to customer information corresponding with target software;
Step 302:Client's serial number and customer equipment are bound;
Optionally, client's serial number and customer equipment are bound by customer equipment, specifically include:
The CPU of client's serial number and customer equipment, MAC Address, and/or hard disk serial number are bound by customer equipment.
Step 303:Customer ID code is generated according to the information of the customer equipment that is bound by client's serial number;
Step 304:Customer ID code is sent to server,
Customer equipment sends customer ID code to server, so that server generates authorization code according to customer ID code;
Step 305:Obtain authorization code;
Optionally, customer equipment obtains authorization code, specifically includes:
When customer equipment is networked with server, customer equipment obtains authorization code by network from server;
When customer equipment is not networked with server, customer equipment obtains authorization code by user's local input.
Step 306:Target software is activated according to authorization code.
Optionally, after customer equipment activates target software according to authorization code, method also includes:
Customer equipment judges whether to activate successfully;
If activation is unsuccessful, customer equipment will activate unsuccessful feedback of the information to the server, and hold again
The step of row obtains client's serial number.
In sum, server is generated after client's serial number according to customer information, sends client's sequence to customer equipment
Number, so that client's serial number and the customer equipment are bound by the customer equipment, and according to bound customer equipment
Information generate customer ID code;Server generates authorization code further according to the customer ID code;So as to the customer equipment energy according to
The authorization code activation target software.So, first client's serial number is bound with customer equipment, further according to the information of the customer equipment
Customer ID code is generated, and authorization code is generated according to the customer ID code in server end so that the authorization code and customer equipment
There is one-to-one relationship, and pass through authorization code to be generated in server end according to the customer ID code, reduce client and illegally will
Authorization code is used for the possibility of illegality equipment, so as to improve safety.
Fig. 4 is a kind of method flow diagram of the authorization management method according to an exemplary embodiment.In conjunction with shown in Fig. 1
Implementation environment without network connection of implementation environment schematic diagram or server and customer equipment, and shown in above-mentioned Fig. 2 or Fig. 3 real
The content of example is applied, referring to Fig. 4, method flow provided in an embodiment of the present invention includes
Step 401:Server cryptographically generates client's serial number according to customer information.
Wherein, customer information is corresponding with target software, i.e., the corresponding client of customer information is the client using target software.
The customer information includes but is not limited to customer purchase information, such as client company title, the software module of client's application purchase, client
Any two kinds in the customer equipment quantity of application purchase, the natural law of purchase, equipment region mark of purchase etc. or these information
Or more kinds of combinations or other customer informations.The equipment region mark that wherein buys can be used to identify operational objective software
Equipment is state's inner machine or overseas machine.
In order to increase the safety of client's serial number so that user does not go out corresponding client's letter from client's sequence number analysis
Breath, or allow the user for obtaining customer information illegally generate effective client's serial number, the present embodiment uses cipher mode
Generate client's serial number.Certainly, server can not also be encrypted to client's serial number, directly generate client's serial number, this
Invention is not construed as limiting to this.
For example, customer information is AA companies for buyer, and it is soft using water flow analysis on two equipment which buys contract
The institute of part is functional, and use time is 3 years, then server generates initial sequence number " AA-2-fluent- according to the customer information
All-3 ", reuses default AES, generates unique client's serial number " 123123 ".
Step 402:Server sends client's serial number to customer equipment.
After server generates client's serial number, server sends client's serial number to customer equipment, so that customer equipment root
Corresponding operation is executed according to client's serial number.
Wherein, in the environment of networking, server sends the visitor by network to customer equipment for server and customer equipment
Family serial number.In the environment of not networking, server can send client's serial number, example to customer equipment by other means
Such as, server sends client's serial number to communication terminal, and the communication terminal sends client's serial number to client and presets
Client handset, after client reads the client's serial number on the Client handset, be locally manually entered client's serial number and set to client
Standby.It is of course also possible to pass through storage medium transmission client's serial number of CD, USB flash disk, the embodiment of the present invention is to server to client
Equipment sends the concrete mode of client's serial number and is not construed as limiting.
Step 403:Customer equipment obtains client's serial number.
Step 404:Client's serial number and customer equipment are bound by customer equipment;
Client's serial number is bound on the client device, the target software on the customer equipment can just be authorized to code and activate into
Work(, activates successfully target software on illegality equipment so as to limit client.Because client's serial number is generated according to customer information, from
And when customer equipment and the binding of client's serial number, target software can get customer information, if target software is activated, target is soft
The service condition of part is limited by the customer information.Certainly, client's serial number and the binding of customer equipment, can only make customer equipment
Target software enter state to be activated, be authorized to when code is activated in target software and obtain customer information again, at this point it is possible to from visitor
Family serial number obtains customer information, if authorization code includes customer information, can be in the customer information of authorization code and client's serial number
Customer information matching detection correct after, target software obtains customer information from client's serial number or authorization code again, and the present invention is real
Apply example to be not construed as limiting this.
Some components on customer equipment have identification characteristics, the mark or global unique identification of some components, utilize
These components of locking customer equipment, you can the unique lock customer equipment.For example, because of CPU (central processing unit, English full name:
Central Processing Unit), MAC (media access control, English full name:Media Access Control) address
There is unique identification information with hard disk, customer equipment can be by the CPU of client's serial number and customer equipment, MAC Address, hard disk sequence
In row number, arbitrary or combination in any is bound, and the specific binding compound mode present invention is not construed as limiting.Certainly, binding
Component is more, better to improving the security impact of method of the embodiment of the present invention.
For example, the hard disk serial number of the hard disk of customer equipment is " HDS722525VLAT80 ", and customer equipment is by client's sequence
The hard disk serial number " HDS722525VLAT80 " of number " 123123 " and customer equipment is bound so that be only stored in client
Water flow analysis software on the hard disk of equipment can just be activated, if client's serial number is cryptographically generated, client's sequence
Number decryption after, water flow analysis software gets customer information, when water flow analysis software is activated, then the use of water flow analysis software
Situation be on two equipment use, can be utilized by the customer institute functional, use time is 3 years.And the water flow analysis of activation are soft
Part can only be used on hard disk of the hard disk serial number for " HDS722525VLAT80 ".
Step 405:Customer equipment generates customer ID code according to the information of the customer equipment that is bound by client's serial number.
After the completion of customer equipment is by client's serial number and customer equipment binding, customer equipment can be according to the customer equipment
Information generate customer ID code.Wherein in addition to recording the information of customer equipment, go back portability has client to the customer ID code
The information of serial number, subscriber identity information etc., the present invention are not construed as limiting to this, as long as the bound customer equipment can be identified i.e.
Can.Certainly, if client's serial number carries more information, can cause the embodiment of the present invention that there is the work(for more improving safety
Energy.
For example, customer equipment is by the hard disk serial number of client's serial number " 123123 " and customer equipment
After " HDS722525VLAT80 " binding, customer equipment determines bound customer equipment under the restriction of water flow analysis software
Customer ID code is " AA-HDS722525VLAT80 ".
Step 406:Customer equipment sends customer ID code to server.
Customer equipment sends customer ID code to server, so that server generates authorization code according to customer ID code.
Step 407:Server obtains customer ID code.
Wherein, the specific implementation of step 406 and step 407 can have multiple, and the embodiment of the present invention is not limited to this,
Wherein, networking mode can be divided into and not networking mode.
1) when server is networked with customer equipment, customer equipment sends customer ID code, clothes by network to server
Business device passes through Network Capture customer ID code.
2) when server is not networked with customer equipment, the data transmission of customer equipment and server has various ways, wraps
Include but be not limited to, user's local input, CD, note transmission etc..
For example, client downloads customer ID code on the client device manually, sends awarding to server by SMS
Power staff, after the staff gets the customer ID code, local input gets staff on the server
Customer ID code.
Step 408:Server generates authorization code according to customer ID code.
After server gets the customer ID code, authorization code can be generated according to the customer ID code, authorization code is used for swashing
Target software living, authorization code can be active coding form, alternatively software license License forms, and the present invention is not limited to this
Fixed.Certainly, the software license form with more information is more excellent.
Because customer ID code is generated according to the information of bound customer equipment, so being generated according to customer ID code
Authorization code just may be only used on corresponding bound customer equipment.That is, customer ID code identifies specific client and sets
Standby, and authorization code is uniquely corresponding with the customer ID code, so as to authorization code is only available for the mesh for activating the specific customer equipment
Mark software.
For example, after server gets customer ID code " AA-HDS722525VLAT80 ", according to the customer ID code life
Into authorization code " AAAA-0000-123456-HDS722525VLAT80 ".The authorization code may be only used for water flow analysis software installation
Customer equipment in the hard disk of Serial No. " HDS722525VLAT80 ".Or server is generated and can activate water flow analysis software
Software license, the software license can include customer information.The source of the customer information of software license includes but does not limit
In:The corresponding customer information of acquisition is searched from server according to customer ID code, from the customer ID code comprising customer information
Parsing obtains customer information.If customer ID code includes customer information, server can enter to the customer information of customer ID code
Row checking, to improve the safety of empowerment management.
It is customer ID code because generated on customer equipment, customer ID code identifies bound customer equipment, it is impossible to use
In activation target software, the generation of authorization code is completed in server end, and is to generate authorization code according to customer ID code, from
And complete the binding of authorization code and customer equipment, i.e., so that authorization code is only used for the customer equipment of customer ID code mark,
So, client can not participate in the generating process of authorization code and the binding procedure of authorization code and customer equipment, it is to avoid client is non-
Method changes authorization code, so that the authorization code being changed can activate the target software on illegality equipment, so as to improve the present invention
The safety of method.In addition, properly generating for customer ID code can determine that the bound success of customer equipment, this can prevent client
Illegal operation is carried out in the operation to the binding of customer equipment.In certain embodiments, in order to further improve safety, can
Customer ID code is cryptographically generated.
Step 409:Server sends authorization code to customer equipment.
Server sends authorization code to customer equipment, so that customer equipment activates target software according to authorization code.
Step 410:Customer equipment obtains authorization code.
Wherein, there are customer equipment acquisition authorization code multiple concrete modes, the embodiment of the present invention this is not construed as limiting.
For example, can be made a distinction by way of whether networking.
1) when customer equipment is networked with server, customer equipment obtains authorization code by network from server;
2) when customer equipment is not networked with server, the data transmission of customer equipment and server has various ways, wraps
Include but be not limited to, user's local input, CD, note transmission etc..Wherein, user's local input specifically includes server and will award
Weighted code manually issues client, and client manually imports in customer equipment to activate target software.
Step 411:Customer equipment activates target software according to authorization code.
After customer equipment gets authorization code, so that it may using the authorization code activation target software.Because customer ID code is corresponded to
Bound customer equipment, and authorization code is generated according to the customer ID code, i.e. authorization code uniquely to should customer ID code, from
And an authorization code is only can be used in by the customer equipment of the customer ID code binding, it is therefore prevented that target software is illegally swashed
Living.
For example, authorization code is " AAAA-0000-123456-HDS722525VLAT80 ", in the hard disk serial of customer equipment
Number for " HDS722525VLAT80 " when, water flow analysis software can just be successfully activated, if also, customer equipment
The hard disk of HDS722525VLAT80 is replaced, and water flow analysis software just can not be run on the customer equipment again.
Customer ID code in the present embodiment used hard disk serial number be comprising customer equipment information, in other realities
Apply customer ID code in example and also can use other client device informations, as long as other client device informations can be indicated by client
The customer equipment of serial number binding.
It is appreciated that authorization code can include customer information, it is also possible to not comprising customer information.When authorization code is not comprising visitor
During the information of family, on the client device, corresponding with client's serial number with the corresponding customer ID code of authorization code, on client's serial number
There is customer information, target software can read customer information from client's serial number, so as to reach authorization code in activation target
After software, according to the use of customer information control targe software.When authorization code includes customer information, the client that authorization code is carried
Information can be verified with the customer information of record on the customer equipment that is bound by client's serial number, be proved to be successful
Operation, so, further increases the safety of activation target software.
Optionally, the detection of line activating situation can in order to improve the reliability of activation manipulation, be entered on the client device, i.e.,
After customer equipment activates target software according to authorization code, the method also includes:Customer equipment judges whether to activate successfully;If
Activation is unsuccessful, then customer equipment execution step 403 again, to re-execute above-mentioned steps, so as to carry out target software again
Secondary activation, and when activating unsuccessful, customer equipment will also activate unsuccessful feedback of the information to server.Execution step again
403, it is that other operations later in order to avoid the operation and the operation of previous binding client's serial number and customer equipment occur
Mistake.
In embodiments of the present invention, the customer information in step 401 includes but is not limited to client company title, client's application
The software module of purchase, the equipment region mark of the customer equipment quantity, the natural law of purchase, and/or purchase of client's application purchase
Deng.I.e. the customer information can have multiple combination mode.Because client's serial number be according to customer information generate, client's serial number with
After customer equipment is bound, customer information is just recorded on the bound customer equipment, so as to the mesh of the customer equipment
After mark software is activated, the service condition of target software is affected by customer information.For example, if customer information includes that client applies
The software module of purchase, then can control the module objectives software that software opening is used to client;If customer information includes client Shen
The customer equipment quantity that please be bought, then control the machine quantity that client is accessed on software;If customer information includes purchase
Equipment region mark, then it is domestic or overseas machine to control the machine that client accessed on software, this prevent domestic just
Preferably machine outflow is overseas, causes overseas market chaotic.
In addition, being to execute in server end because generating client's serial number according to customer information, it is ensured that the conjunction of customer information
Method, reduces the situation of client's unauthorized use of software.
In sum, server is generated after client's serial number according to customer information, sends client's sequence to customer equipment
Number, so that client's serial number and the customer equipment are bound by the customer equipment, and according to bound customer equipment
Information generate customer ID code;Server generates authorization code further according to the customer ID code;So as to the customer equipment energy according to
The authorization code activation target software.So, first client's serial number is bound with customer equipment, further according to the information of the customer equipment
Customer ID code is generated, and authorization code is generated according to the customer ID code in server end so that the authorization code and customer equipment
There is one-to-one relationship, and pass through authorization code to be generated in server end according to the customer ID code, reduce client and illegally will
Authorization code is used for the possibility of illegality equipment, so as to improve safety.
Fig. 5 is a kind of structural representation of the server according to an exemplary embodiment, and the server is used for executing
The function that server is executed in any embodiment in the corresponding embodiment of above-mentioned Fig. 2 to Fig. 4.Referring to Fig. 5, the server includes:
Serial number generation module 501, for generating client's serial number according to customer information, wherein customer information is soft with target
Part is corresponding;
First sending module 502, for sending client's serial number to customer equipment, so that customer equipment is by client's serial number
Bound with customer equipment, and customer ID code is generated according to the information of the customer equipment that is bound by client's serial number;
Optionally, customer information includes that client company title, the software module of client's application purchase, client's application are bought
At least one in customer equipment quantity, the natural law of purchase, the equipment region mark of purchase.
First acquisition module 503, for obtaining customer ID code;
Authorization code generation module 504, for generating authorization code according to customer ID code;
Second sending module 505, for sending authorization code to customer equipment, so that customer equipment activates mesh according to authorization code
Mark software.
Optionally, first acquisition module 503, is additionally operable to:
When server is networked with customer equipment, server passes through Network Capture customer ID code;
When server is not networked with customer equipment, server obtains customer ID code by user's local input;
Optionally, the serial number generation module 501, is additionally operable to server and cryptographically generates client according to customer information
Serial number.
In sum, serial number generation module 501 is generated after client's serial number according to customer information, the first sending module
502 send client's serial number to customer equipment, so that client's serial number and the customer equipment are tied up by the customer equipment
Fixed, and customer ID code is generated according to the information of bound customer equipment;Authorization code generation module 504 is further according to the client
Identification code generates authorization code;So as to the customer equipment can be according to the authorization code activation target software.So, first by client's serial number
With customer equipment bind, further according to the customer equipment information generate customer ID code, and authorization code server end according to this
Customer ID code is generated so that the authorization code has one-to-one relationship with customer equipment, and passes through in server end according to this
Customer ID code generates authorization code, and authorization code is illegally used for the possibility of illegality equipment to reduce client, so as to improve safety
Property.
Fig. 6 is a kind of structural representation of the customer equipment according to an exemplary embodiment, and the customer equipment is used for
Execute the function that customer equipment is executed in any embodiment in the corresponding embodiments of above-mentioned Fig. 2 to Fig. 4.Referring to Fig. 6, the client sets
Standby include:
Second acquisition module 601, for obtaining client's serial number, wherein client's serial number is according to corresponding with target software
Customer information is generated;
Binding module 602, for being bound client's serial number and customer equipment;
Identification code generating module 603, for generating client's mark according to the information of the customer equipment that is bound by client's serial number
Know code;
3rd sending module 604, for sending customer ID code to server, so that server is given birth to according to customer ID code
Into authorization code;
3rd acquisition module 605, for obtaining authorization code;
Active module 606, for activating target software according to authorization code.
Optionally, the 3rd acquisition module 604, is additionally operable to:
When customer equipment is networked with server, customer equipment obtains authorization code by network from server;
When customer equipment is not networked with server, customer equipment obtains authorization code by user's local input.
Optionally, binding module 602, are additionally operable to the CPU of client's serial number and customer equipment, MAC Address, and/or hard
Disk serial number is bound.
Optionally, the customer equipment also includes:
Activation judge module 607, for judging whether to activate successfully;
Second acquisition module 601, if being additionally operable to, activation is unsuccessful, and customer equipment will activate unsuccessful feedback of the information and give
The server, and execute the step of obtaining client's serial number again.
In sum, server is generated after client's serial number according to customer information, sends client's sequence to customer equipment
Number, so that client's serial number and the customer equipment are bound by binding module 602, and identification code generating module 603
Customer ID code is generated according to the information of bound customer equipment;Server generates authorization code further according to the customer ID code;From
And active module 606 can be according to the authorization code activation target software.So, first client's serial number is bound with customer equipment, then
Customer ID code is generated according to the information of the customer equipment, and authorization code is generated according to the customer ID code in server end, is made
Obtain the authorization code, with customer equipment, there is one-to-one relationship, and pass through mandate to be generated in server end according to the customer ID code
Code, authorization code is illegally used for the possibility of illegality equipment to reduce client, so as to improve safety.
Fig. 7 is to implement a kind of authentication management system for exemplifying according to another exemplary, and the system is used for executing Fig. 2 to scheming
The method of registering based on video that any embodiment is provided in embodiment shown in 4.The system includes:Server 701 and client
Equipment 702.
Wherein, the server in embodiment of the server 701 as shown in above-mentioned Fig. 2, Fig. 4, Fig. 5 shown in any embodiment,
Above-mentioned each exemplary embodiment is referred to, here is omitted.
Wherein, the client in embodiment of the customer equipment 702 as shown in above-mentioned Fig. 3, Fig. 4 to Fig. 6 shown in any embodiment
Equipment, refers to above-mentioned each exemplary embodiment, and here is omitted.
The system that the present embodiment is provided, server 701 are generated after client's serial number, to customer equipment according to customer information
702 send client's serial number, so that client's serial number and the customer equipment are bound by the customer equipment 702, and
Customer ID code is generated according to the information of bound customer equipment 702;Server 701 is generated further according to the customer ID code and is awarded
Weighted code;So as to the customer equipment 702 can be according to the authorization code activation target software.So, first client's serial number is set with client
Standby binding, the information further according to the customer equipment generate customer ID code, and authorization code in server end according to the customer ID
Code is generated so that the authorization code has one-to-one relationship with customer equipment, and passes through in server end according to the customer ID
Code generates authorization code, and authorization code is illegally used for the possibility of illegality equipment to reduce client, so as to improve safety.
Those skilled in the art can be understood that, for convenience and simplicity of description, the system of foregoing description,
Device and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method can be with
Realize by another way.For example, device embodiment described above is only schematic, for example, the unit
Divide, only a kind of division of logic function can have other dividing mode, for example multiple units or component when actually realizing
Can in conjunction with or be desirably integrated into another system, or some features can be ignored, or not execute.Another, shown or
The coupling each other for discussing or direct-coupling or communication connection can be the indirect couplings by some interfaces, device or unit
Close or communicate to connect, can be electrical, mechanical or other forms.
The unit that illustrates as separating component can be or may not be physically separate, aobvious as unit
The part for showing can be or may not be physical location, you can be located at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme
's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.Above-mentioned integrated list
Unit both can be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit is realized and as independent production marketing or use using in the form of SFU software functional unit
When, can be stored in a computer read/write memory medium.Such understanding is based on, technical scheme is substantially
The part that in other words prior art is contributed or all or part of the technical scheme can be in the form of software products
Embody, the computer software product is stored in a storage medium, use so that a computer including some instructions
Equipment (can be personal computer, server, or network equipment etc.) executes the complete of each embodiment methods described of the invention
Portion or part steps.And aforesaid storage medium includes:USB flash disk, portable hard drive, read only memory (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
The above, above example only in order to technical scheme to be described, rather than a limitation;Although with reference to front
State embodiment to be described in detail the present invention, it will be understood by those within the art that:Which still can be to front
State the technical scheme described in each embodiment to modify, or equivalent is carried out to which part technical characteristic;And these
Modification is replaced, and does not make the essence of appropriate technical solution depart from the spirit and scope of various embodiments of the present invention technical scheme.
Claims (15)
1. a kind of authorization management method, it is characterised in that include:
Server generates client's serial number according to customer information, and wherein described customer information is corresponding with target software;
The server sends client's serial number to customer equipment so that the customer equipment by client's serial number with
The customer equipment is bound, and generates client according to the information of the customer equipment that is bound by client's serial number
Identification code;
The server obtains the customer ID code;
The server generates authorization code according to the customer ID code;
The server sends the authorization code to the customer equipment, so that the customer equipment is activated according to the authorization code
The target software.
2. method according to claim 1, it is characterised in that the server obtains the customer ID code, concrete wraps
Include:
When the server is networked with the customer equipment, the server passes through customer ID code described in Network Capture;
When the server is not networked with the customer equipment, the server obtains the client by user's local input
Identification code.
3. method according to claim 1, it is characterised in that the server generates client's sequence according to customer information
Number, specifically include:
The server cryptographically generates client's serial number according to customer information.
4. the method according to any one of claims 1 to 3, it is characterised in that the customer information includes client company name
Title, the software module of client's application purchase, the customer equipment quantity of client's application purchase, the natural law that buys, the battery limits of purchase
At least one in the mark of domain.
5. a kind of authorization management method, it is characterised in that include:
Customer equipment obtains client's serial number, and wherein described client's serial number is given birth to according to customer information corresponding with target software
Into;
Client's serial number and the customer equipment are bound by the customer equipment;
The customer equipment generates customer ID code according to the information of the customer equipment that is bound by client's serial number;
The customer equipment sends the customer ID code to server, so that the server is given birth to according to the customer ID code
Into authorization code;
The customer equipment obtains the authorization code;
The customer equipment activates the target software according to the authorization code.
6. method according to claim 5, it is characterised in that
The customer equipment obtains authorization code, specifically includes:
When the customer equipment is networked with the server, the customer equipment is obtained described by network from the server
Authorization code;
When the customer equipment is not networked with the server, the customer equipment is by awarding described in the acquisition of user's local input
Weighted code.
7. method according to claim 5, it is characterised in that the customer equipment is by client's serial number and the visitor
Family equipment is bound, and specifically includes:
The CPU of client's serial number and the customer equipment, MAC Address, and/or hard disk serial number are entered by the customer equipment
Row binding.
8. the method according to any one of claim 5 to 7, it is characterised in that in the customer equipment according to the mandate
After the code activation target software, methods described also includes:
The customer equipment judges whether to activate successfully;
If activation is unsuccessful, the customer equipment will activate unsuccessful feedback of the information to server, and execution is obtained again
The step of taking client's serial number.
9. a kind of server, it is characterised in that include:
Serial number generation module, for generating client's serial number, wherein described customer information and target software according to customer information
Corresponding;
First sending module, for sending client's serial number to customer equipment, so that the customer equipment is by the client
Serial number is bound with the customer equipment, and the information according to the customer equipment that is bound by client's serial number
Generate customer ID code;
First acquisition module, for obtaining the customer ID code;
Authorization code generation module, for generating authorization code according to the customer ID code;
Second sending module, for sending the authorization code to the customer equipment, so that the customer equipment is awarded according to described
Weighted code activates the target software.
10. server according to claim 9, it is characterised in that first acquisition module, is additionally operable to:
When the server is networked with the customer equipment, the server passes through customer ID code described in Network Capture;
When the server is not networked with the customer equipment, the server obtains the client by user's local input
Identification code.
11. servers according to claim 9 or 10, it is characterised in that the customer information include client company title,
The software module of client's application purchase, the equipment of the customer equipment quantity, the natural law of purchase, and/or purchase of client's application purchase
Area flag.
12. a kind of customer equipments, it is characterised in that include:
Second acquisition module, for obtaining client's serial number, wherein described client's serial number is according to visitor corresponding with target software
Family information is generated;
Binding module, for being bound client's serial number and the customer equipment;
Identification code generating module, for generating client's mark according to the information of the customer equipment that is bound by client's serial number
Know code;
3rd sending module, for sending the customer ID code to server, so that the server is marked according to the client
Know code and generate authorization code;
3rd acquisition module, for obtaining the authorization code;
Active module, for activating the target software according to the authorization code.
13. customer equipments according to claim 12, it is characterised in that the 3rd acquisition module, are additionally operable to:
When the customer equipment is networked with the server, the customer equipment is obtained described by network from the server
Authorization code;
When the customer equipment is not networked with the server, the customer equipment is by awarding described in the acquisition of user's local input
Weighted code.
14. customer equipments according to claim 12 or 13 any one, it is characterised in that the customer equipment also includes:
Activation judge module, for judging whether to activate successfully;
Second acquisition module, if being additionally operable to, activation is unsuccessful, and the customer equipment will activate unsuccessful feedback of the information to institute
Server is stated, and executes the step of obtaining client's serial number again.
15. a kind of authentication management systems, it is characterised in that include:Server and customer equipment;
Wherein, the server is the server described in any one of claim 9 to 11;
The customer equipment is the customer equipment described in any one of claim 12 to 14.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610954690.3A CN106503492A (en) | 2016-10-27 | 2016-10-27 | A kind of authorization management method, server, customer equipment and system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610954690.3A CN106503492A (en) | 2016-10-27 | 2016-10-27 | A kind of authorization management method, server, customer equipment and system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN106503492A true CN106503492A (en) | 2017-03-15 |
Family
ID=58322317
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201610954690.3A Pending CN106503492A (en) | 2016-10-27 | 2016-10-27 | A kind of authorization management method, server, customer equipment and system |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN106503492A (en) |
Cited By (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107341369A (en) * | 2017-07-17 | 2017-11-10 | 郑州云海信息技术有限公司 | A kind of anti-method for reusing of sequence number and device |
| CN107483485A (en) * | 2017-09-13 | 2017-12-15 | 深圳市屯奇尔科技有限公司 | Generation method, authorization method, relevant apparatus and the terminal device of authorization code |
| CN107566479A (en) * | 2017-08-30 | 2018-01-09 | 南京甄视智能科技有限公司 | Remote intelligent terminal authorization method and system |
| CN108304735A (en) * | 2017-12-28 | 2018-07-20 | 山东浪潮通软信息科技有限公司 | A kind of authorization sequence application method, system and delivery of cargo system, application server |
| CN108319821A (en) * | 2018-02-07 | 2018-07-24 | 北京安博通科技股份有限公司 | A kind of software activation method and device |
| CN109743412A (en) * | 2019-01-03 | 2019-05-10 | 山东浪潮通软信息科技有限公司 | A kind of sequence number control method based on user's registration number |
| CN110213248A (en) * | 2019-05-20 | 2019-09-06 | 武汉市灯塔互动文化传播有限公司 | Authorization method and device under a kind of offline environment |
| CN110601854A (en) * | 2019-09-19 | 2019-12-20 | 许继集团有限公司 | Authorization client, power distribution terminal equipment and authorization method thereof |
| CN110859046A (en) * | 2018-07-27 | 2020-03-03 | 深圳市大疆创新科技有限公司 | Information processing method, electronic device, server, and information processing system |
| CN110874455A (en) * | 2018-08-31 | 2020-03-10 | 阿里巴巴集团控股有限公司 | Authorization management method and system |
| CN110996319A (en) * | 2019-11-01 | 2020-04-10 | 北京握奇智能科技有限公司 | System and method for performing activation authorization management on software service |
| CN111625829A (en) * | 2019-02-27 | 2020-09-04 | 阿里巴巴集团控股有限公司 | Application activation method and device based on trusted execution environment |
| CN112637231A (en) * | 2020-12-29 | 2021-04-09 | 航天信息股份有限公司 | Authorization method, authorization device, storage medium and server |
| CN112632484A (en) * | 2020-12-28 | 2021-04-09 | 深圳创维-Rgb电子有限公司 | Software authorization method and device and computer equipment |
| CN113761483A (en) * | 2021-08-31 | 2021-12-07 | 山东浪潮通软信息科技有限公司 | Software product protection method, device and medium based on soft encryption application program |
| CN114465772A (en) * | 2021-12-30 | 2022-05-10 | 江苏慧眼数据科技股份有限公司 | Automatic control equipment system and method |
| CN116975794A (en) * | 2023-06-27 | 2023-10-31 | 深圳市青葡萄科技有限公司 | Software activation method, device and storage medium |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101689237A (en) * | 2007-06-25 | 2010-03-31 | 微软公司 | Activation system architecture |
| CN103258151A (en) * | 2012-10-30 | 2013-08-21 | 中国科学院沈阳自动化研究所 | Real-time authorization software License control method |
| CN104283885A (en) * | 2014-10-14 | 2015-01-14 | 中国科学院信息工程研究所 | An implementation method of multi-SP security binding based on local authentication of intelligent terminals |
-
2016
- 2016-10-27 CN CN201610954690.3A patent/CN106503492A/en active Pending
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101689237A (en) * | 2007-06-25 | 2010-03-31 | 微软公司 | Activation system architecture |
| CN103258151A (en) * | 2012-10-30 | 2013-08-21 | 中国科学院沈阳自动化研究所 | Real-time authorization software License control method |
| CN104283885A (en) * | 2014-10-14 | 2015-01-14 | 中国科学院信息工程研究所 | An implementation method of multi-SP security binding based on local authentication of intelligent terminals |
Cited By (22)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107341369A (en) * | 2017-07-17 | 2017-11-10 | 郑州云海信息技术有限公司 | A kind of anti-method for reusing of sequence number and device |
| CN107566479A (en) * | 2017-08-30 | 2018-01-09 | 南京甄视智能科技有限公司 | Remote intelligent terminal authorization method and system |
| CN107483485A (en) * | 2017-09-13 | 2017-12-15 | 深圳市屯奇尔科技有限公司 | Generation method, authorization method, relevant apparatus and the terminal device of authorization code |
| CN108304735A (en) * | 2017-12-28 | 2018-07-20 | 山东浪潮通软信息科技有限公司 | A kind of authorization sequence application method, system and delivery of cargo system, application server |
| CN108319821A (en) * | 2018-02-07 | 2018-07-24 | 北京安博通科技股份有限公司 | A kind of software activation method and device |
| CN110859046A (en) * | 2018-07-27 | 2020-03-03 | 深圳市大疆创新科技有限公司 | Information processing method, electronic device, server, and information processing system |
| CN110874455A (en) * | 2018-08-31 | 2020-03-10 | 阿里巴巴集团控股有限公司 | Authorization management method and system |
| CN109743412A (en) * | 2019-01-03 | 2019-05-10 | 山东浪潮通软信息科技有限公司 | A kind of sequence number control method based on user's registration number |
| CN111625829A (en) * | 2019-02-27 | 2020-09-04 | 阿里巴巴集团控股有限公司 | Application activation method and device based on trusted execution environment |
| CN111625829B (en) * | 2019-02-27 | 2025-05-27 | 阿里巴巴集团控股有限公司 | Application activation method and device based on trusted execution environment |
| CN110213248A (en) * | 2019-05-20 | 2019-09-06 | 武汉市灯塔互动文化传播有限公司 | Authorization method and device under a kind of offline environment |
| CN110601854A (en) * | 2019-09-19 | 2019-12-20 | 许继集团有限公司 | Authorization client, power distribution terminal equipment and authorization method thereof |
| CN110601854B (en) * | 2019-09-19 | 2023-07-14 | 许继集团有限公司 | An authorization client, a power distribution terminal device and an authorization method thereof |
| CN110996319A (en) * | 2019-11-01 | 2020-04-10 | 北京握奇智能科技有限公司 | System and method for performing activation authorization management on software service |
| CN110996319B (en) * | 2019-11-01 | 2024-05-28 | 北京握奇智能科技有限公司 | System and method for performing activation authorization management on software service |
| CN112632484A (en) * | 2020-12-28 | 2021-04-09 | 深圳创维-Rgb电子有限公司 | Software authorization method and device and computer equipment |
| CN112637231B (en) * | 2020-12-29 | 2023-12-12 | 航天信息股份有限公司 | Authorization method, device, storage medium and server |
| CN112637231A (en) * | 2020-12-29 | 2021-04-09 | 航天信息股份有限公司 | Authorization method, authorization device, storage medium and server |
| CN113761483A (en) * | 2021-08-31 | 2021-12-07 | 山东浪潮通软信息科技有限公司 | Software product protection method, device and medium based on soft encryption application program |
| CN113761483B (en) * | 2021-08-31 | 2024-08-27 | 浪潮通用软件有限公司 | Software product protection method, device and medium based on soft encryption application program |
| CN114465772A (en) * | 2021-12-30 | 2022-05-10 | 江苏慧眼数据科技股份有限公司 | Automatic control equipment system and method |
| CN116975794A (en) * | 2023-06-27 | 2023-10-31 | 深圳市青葡萄科技有限公司 | Software activation method, device and storage medium |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN106503492A (en) | A kind of authorization management method, server, customer equipment and system | |
| JP5959410B2 (en) | Payment method, payment server for executing the method, program for executing the method, and system for executing the same | |
| CN105391840B (en) | Automatically create destination application | |
| CN100533459C (en) | Data safe reading method and safe storage device thereof | |
| CN104380652B (en) | Many publisher's safety element subregion frameworks for NFC enabled devices | |
| US20180160255A1 (en) | Nfc tag-based web service system and method using anti-simulation function | |
| CN102542453B (en) | Mobile payment identity verification method | |
| WO2013155562A1 (en) | Nfc card lock | |
| US20120246075A1 (en) | Secure electronic payment methods | |
| CN109992949A (en) | Device authentication method, air card writing method and device authentication device | |
| CN108012268A (en) | A kind of mobile phone terminal SIM card and the method for safe handling App, medium | |
| CN106899552A (en) | Authentication method, certification terminal and system | |
| CN108460875A (en) | A kind of entrance guard authentication method and device based on dynamic two-dimension code | |
| JP2014529964A (en) | System and method for secure transaction processing via a mobile device | |
| CN103793815A (en) | Mobile intelligent terminal acquirer system and method suitable for bank cards and business cards | |
| CN101729502A (en) | Method and system for distributing key | |
| CN103400265A (en) | Quick payment method and system based on position information | |
| CN103609136A (en) | Method for in-situ upgrading RFID readers | |
| JP2019517229A (en) | System and method for generating, storing, managing and using digital secrets associated with portable electronic devices | |
| Cheng et al. | A secure and practical key management mechanism for NFC read-write mode | |
| CN104038924A (en) | Method and system for achieving resource exchange information processing | |
| CN106657032A (en) | System and method for realizing identity identification and data authentication based on security medium confidential short message | |
| CN107403109A (en) | Encryption method and encryption system | |
| CN106548338A (en) | The method and system of resource numerical value transfer | |
| CA2886164C (en) | Method for verifying the authenticity of a terminal, corresponding device and program |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| TA01 | Transfer of patent application right | ||
| TA01 | Transfer of patent application right |
Effective date of registration: 20170824 Address after: 361008, Xiamen three software park, Fujian Province, 8 North Street, room 2001 Applicant after: Xiamen Central Intelligent Information Technology Co., Ltd. Address before: 361000 Fujian province Xiamen software park two sunrise Road No. 32 403 unit 02 District Applicant before: XIAMEN ZHONGKONG BIOLOGICAL RECOGNITION INFORMATION TECHNOLOGY CO., LTD. |
|
| RJ01 | Rejection of invention patent application after publication | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170315 |