CN118469675B - Electronic equipment area protection method, system, intelligent terminal and storage medium - Google Patents
Electronic equipment area protection method, system, intelligent terminal and storage medium Download PDFInfo
- Publication number
- CN118469675B CN118469675B CN202410902989.9A CN202410902989A CN118469675B CN 118469675 B CN118469675 B CN 118469675B CN 202410902989 A CN202410902989 A CN 202410902989A CN 118469675 B CN118469675 B CN 118469675B
- Authority
- CN
- China
- Prior art keywords
- identity
- code
- information
- activation
- value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0639—Locating goods or services, e.g. based on physical position of the goods or services within a shopping facility
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/021—Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
Abstract
Description
技术领域Technical Field
本发明涉及电子设备技术领域,尤其是涉及一种电子设备区域保护方法、系统、智能终端及存储介质。The present invention relates to the technical field of electronic equipment, and in particular to an electronic equipment area protection method, system, intelligent terminal and storage medium.
背景技术Background Art
电子设备是指使用集成电路、晶体管、电子管等电子元器件,并通过电子技术发挥作用的设备,常见的电子设备有电视、手机、平板电脑、机器人、电话、无线设备、主板、显示器、汽车电子、医疗设备等。Electronic devices refer to devices that use electronic components such as integrated circuits, transistors, and electron tubes and function through electronic technology. Common electronic devices include televisions, mobile phones, tablets, robots, telephones, wireless devices, motherboards, monitors, automotive electronics, medical equipment, etc.
相关技术中,在需要对某些特定区域内销售或使用的电子设备进行特殊的管理和控制以确保产品的安全性、合规性或保护知识产权时,一般需要对电子设备进行区域保护。而目前为了使电子设备不容易随意在不同区域销售或使用,一般采用在指定区域激活使用功能,从而对电子设备进行区域保护。In the related art, when it is necessary to carry out special management and control on electronic devices sold or used in certain specific areas to ensure product safety, compliance or protect intellectual property rights, it is generally necessary to carry out regional protection on electronic devices. At present, in order to prevent electronic devices from being sold or used in different areas at will, the use function is generally activated in the designated area, thereby carrying out regional protection on electronic devices.
针对上述中的相关技术,当采用在指定区域激活使用功能对电子设备进行区域保护时,容易存在先将电子设备激活后再将电子设备发到其他区域的弊端,从而导致电子设备依旧能够进行跨区域销售或使用。With respect to the above-mentioned related technologies, when the regional protection of electronic devices is performed by activating and using the function in a designated area, there is a disadvantage that the electronic devices are activated first and then sent to other areas, which results in the electronic devices still being able to be sold or used across regions.
发明内容Summary of the invention
为了使电子设备不容易进行跨区域销售或使用,本发明提供一种电子设备区域保护方法、系统、智能终端及存储介质。In order to prevent electronic devices from being easily sold or used across regions, the present invention provides an electronic device regional protection method, system, intelligent terminal and storage medium.
第一方面,本发明提供一种电子设备区域保护方法,采用如下的技术方案:In a first aspect, the present invention provides a method for protecting an area of an electronic device, which adopts the following technical solution:
一种电子设备区域保护方法,包括:A method for protecting an area of an electronic device, comprising:
获取申请者申请激活或使用时所处的申请经纬度以及电子设备中激活模块唯一的身份标识码;Obtain the applicant's application latitude and longitude when applying for activation or use and the unique identification code of the activation module in the electronic device;
基于申请经纬度查询获取管理基准经纬度并计算两者之间的使用距离值;Based on the application longitude and latitude query, obtain the management base longitude and latitude and calculate the use distance value between the two;
当且仅当使用距离值小于预设的使用容许距离值时,根据身份标识码进行加密处理以形成激活密钥码;When and only when the usage distance value is less than the preset usage allowable distance value, encrypting the identity code to form an activation key code;
基于激活密钥码进行与加密处理相对应的解密处理以形成身份读取码;Performing a decryption process corresponding to the encryption process based on the activation key code to form an identity reading code;
根据身份标识码与身份读取码之间的相同情况,以确定激活控制信息并输出至电子设备以控制是否进行激活。According to the identity between the identity identification code and the identity reading code, activation control information is determined and output to the electronic device to control whether to activate.
可选的,加密处理的具体步骤包括:Optionally, the specific steps of encryption processing include:
基于身份标识码对每个字节进行单独读取以形成身份单个字节;Each byte is read individually based on the identity code to form a single byte of identity;
基于身份单个字节从预设的编码数组选取指定值进行异或处理以形成异或处理值;Based on the identity single byte, a specified value is selected from a preset encoding array for XOR processing to form an XOR processing value;
将所有身份单个字节所对应的异或处理值进行结合以形成激活密钥码。The XOR values corresponding to all the single bytes of the identity are combined to form the activation key code.
可选的,选取指定值的方法包括:Optionally, methods for selecting a specified value include:
基于身份单个字节调取字节位于身份标识码的字节位置;Based on the identity single byte, retrieve the byte located at the byte position of the identity identification code;
根据字节位置与预设的位置数组的对应关系,以确定与字节位置相对应的位置数组;According to the correspondence between the byte position and the preset position array, the position array corresponding to the byte position is determined;
获取当前时间点;Get the current time point;
根据当前时间点与预设的时间选取值的对应关系,以确定与当前时间点相对应的时间选取值;According to the correspondence between the current time point and the preset time selection value, the time selection value corresponding to the current time point is determined;
基于时间选取值以对位置数组进行选取并作为指定值。Selects a value based on time to select an array of positions as the specified value.
可选的,激活控制信息的确定方法包括:Optionally, the method for determining the activation control information includes:
判断身份标识码与身份读取码之间是否相同;Determine whether the identity identification code and the identity reading code are the same;
若为是,则获取申请者信息;If yes, then obtain the applicant information;
基于身份标识码以对电子设备绑定的使用者信息进行查询;Querying user information bound to an electronic device based on the identity code;
根据使用者信息的查询情况及申请者信息分析确定人员控制信息,并将人员控制信息作为激活控制信息;Determine personnel control information based on the query of user information and the analysis of applicant information, and use the personnel control information as activation control information;
若为否,则输出预设的身份异常预警信息并发送至管理者所持终端或电子设备绑定使用者所持终端。If not, the preset identity abnormality warning information is output and sent to the terminal held by the administrator or the terminal held by the user bound to the electronic device.
可选的,人员控制信息的确定方法包括:Optionally, the method for determining the personnel control information includes:
当未查询到使用者信息时,则基于申请者信息调取单位时间内的申请者激活个数值;When no user information is found, the number of applicant activations per unit time is retrieved based on the applicant information;
判断申请者激活个数值是否小于预设的激活基准个数值;Determine whether the activation count of the applicant is less than the preset activation benchmark count;
若为是,则输出预设的激活开启信息并作为人员控制信息,并将身份标识码与申请者信息进行绑定并上传;If yes, the preset activation information is output as personnel control information, and the identity code is bound to the applicant information and uploaded;
若为否,则输出激活上限提示信息并发送至申请者所持终端。If not, the activation upper limit prompt information is output and sent to the terminal held by the applicant.
可选的,人员控制信息的确定方法还包括:Optionally, the method for determining personnel control information further includes:
当查询到使用者信息时,则判断使用者信息与申请者信息是否一致;When the user information is found, it is determined whether the user information is consistent with the applicant information;
若为是,则输出预设的激活开启信息并作为人员控制信息;If yes, the preset activation information is output and used as personnel control information;
若为否,则基于使用者信息调取高频率使用区域及高频率使用时间段;If not, retrieve the high-frequency usage area and high-frequency usage time period based on the user information;
根据申请经纬度与高频率使用区域之间的落入情况,以确定申请位置影响值;Determine the impact value of the application location based on the location of the application and the high-frequency use area.
根据当前时间点与高频率使用时间段之间的落入情况,以确定申请时间影响值;Determine the application time impact value based on the current time point and the high-frequency usage time period;
计算申请位置影响值与申请时间影响值之间的和值并作为申请综合影响值;Calculate the sum of the application location impact value and the application time impact value and use it as the application comprehensive impact value;
根据申请综合影响值与预设的申请影响基准值的比较结果,以输出身份异常预警信息或人员控制信息。Based on the comparison result between the comprehensive application impact value and the preset application impact benchmark value, identity anomaly warning information or personnel control information is output.
可选的,还包括位于输出预设的身份异常预警信息并发送至管理者所持终端或电子设备绑定使用者所持终端之前的步骤,具体如下:Optionally, the method further includes the following steps before outputting the preset identity abnormality warning information and sending it to the terminal held by the manager or the terminal held by the user bound to the electronic device:
分析身份标识码与身份读取码之间的偏差情况并作为身份码偏差信息;Analyze the deviation between the identity code and the identity reading code and use it as the identity code deviation information;
基于身份码偏差信息调取身份码偏差位置及身份码偏差个数;Retrieve the identity code deviation position and the number of identity code deviations based on the identity code deviation information;
根据身份码偏差个数与预设的偏差个数影响值的对应关系,以确定与身份码偏差个数相对应的偏差个数影响值;According to the correspondence between the number of identity code deviations and the preset deviation number impact value, the deviation number impact value corresponding to the number of identity code deviations is determined;
根据身份码偏差位置与预设的偏差位置影响值的对应关系,以确定与身份码偏差位置相对应的偏差位置影响值;According to the correspondence between the identity code deviation position and the preset deviation position influence value, the deviation position influence value corresponding to the identity code deviation position is determined;
计算偏差个数影响值与偏差位置影响值之间的和值并作为偏差综合影响值;Calculate the sum of the deviation number impact value and the deviation position impact value and use it as the deviation comprehensive impact value;
判断偏差综合影响值是否大于预设的偏差基准影响值;Determine whether the comprehensive impact value of the deviation is greater than the preset deviation baseline impact value;
若为是,则继续输出预设的身份异常预警信息并发送至管理者所持终端或电子设备绑定使用者所持终端;If yes, continue to output the preset identity abnormality warning information and send it to the terminal held by the administrator or the terminal held by the user bound to the electronic device;
若为否,则跳转执行基于激活密钥码进行与加密处理相对应的解密处理以形成身份读取码。If not, the process jumps to executing a decryption process corresponding to the encryption process based on the activation key code to form an identity reading code.
第二方面,本发明提供一种电子设备区域保护系统,采用如下的技术方案:In a second aspect, the present invention provides an electronic equipment area protection system, which adopts the following technical solution:
一种电子设备区域保护系统,包括:An electronic equipment area protection system, comprising:
获取模块,用于获取申请经纬度、身份标识码、当前时间点及申请者信息;The acquisition module is used to obtain the application latitude and longitude, identity code, current time point and applicant information;
存储器,用于存储如第一方面中任一项的电子设备区域保护方法的程序;A memory for storing a program of the electronic device area protection method according to any one of the first aspects;
处理器,存储器中的程序能够被处理器加载执行且实现如第一方面中任一项的电子设备区域保护方法。The program in the memory can be loaded and executed by the processor to implement the electronic device area protection method as described in any one of the first aspects.
第三方面,本发明提供一种智能终端,采用如下的技术方案:In a third aspect, the present invention provides an intelligent terminal, which adopts the following technical solution:
一种智能终端,包括存储器和处理器,存储器上存储有能够被处理器加载并执行如第一方面中任一项的电子设备区域保护方法的计算机程序。An intelligent terminal comprises a memory and a processor, wherein the memory stores a computer program that can be loaded by the processor and executes any one of the electronic device area protection methods in the first aspect.
第四方面,本发明提供一种计算机存储介质,能够存储相应的程序,具有便于实现使电子设备不容易进行跨区域销售或使用的特点,采用如下的技术方案:In a fourth aspect, the present invention provides a computer storage medium capable of storing a corresponding program, which has the characteristic of facilitating the electronic device to be not easily sold or used across regions, and adopts the following technical solution:
一种计算机可读存储介质,存储有能够被处理器加载并执行如第一方面中任一项的电子设备区域保护方法的计算机程序。A computer-readable storage medium stores a computer program that can be loaded by a processor and executes the electronic device area protection method as described in any one of the first aspects.
综上所述,本发明包括以下至少一种有益技术效果:In summary, the present invention includes at least one of the following beneficial technical effects:
1.通过对申请经纬度及身份标识码进行获取并对使用距离值进行计算,当且仅当使用距离值小于预设的使用容许距离值时,通过对身份标识码进行加密处理以及解密处理后形成身份读取码,再通过对身份标识码与身份读取码之间的相同情况进行分析以确定激活控制信息并输出至电子设备以控制是否进行激活,从而使电子设备只有在距离满足要求且身份识别正确的情况下才能够进行激活或者使用,进而使电子设备不容易进行跨区域销售或使用;1. By obtaining the application longitude and latitude and the identity code and calculating the use distance value, when and only when the use distance value is less than the preset allowable use distance value, the identity code is encrypted and decrypted to form an identity reading code, and then the same situation between the identity code and the identity reading code is analyzed to determine the activation control information and output it to the electronic device to control whether to activate it, so that the electronic device can only be activated or used when the distance meets the requirements and the identity recognition is correct, so that the electronic device is not easy to be sold or used across regions;
2.通过身份标识码对每个字节进行单独读取以形成身份单个字节并进行异或处理以形成异或处理值,再将所有异或处理值结合以形成激活密钥码,从而提高获取的激活密钥码的准确性;2. Each byte is read individually through the identity code to form a single identity byte and XOR-processed to form an XOR-processed value, and then all XOR-processed values are combined to form an activation key code, thereby improving the accuracy of the activation key code obtained;
3.通过身份单个字节对字节位置进行调取并确定位置数组,再通过对当前时间点进行获取并确定时间选取值,从而通过时间选取值以对位置数组进行选取并作为指定值,进而提高获取的指定值的准确性。3. The byte position is retrieved and the position array is determined by identifying a single byte, and then the current time point is obtained and the time selection value is determined, so that the position array is selected by the time selection value and used as the specified value, thereby improving the accuracy of the obtained specified value.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
图1是本申请实施例的电子设备区域保护的方法流程图。FIG. 1 is a flow chart of a method for protecting a region of an electronic device according to an embodiment of the present application.
图2是本申请实施例的加密处理的具体步骤的方法流程图。FIG. 2 is a method flow chart of specific steps of encryption processing in an embodiment of the present application.
图3是本申请实施例的选取指定值的方法的方法流程图。FIG. 3 is a flow chart of a method for selecting a specified value according to an embodiment of the present application.
图4是本申请实施例的激活控制信息的确定方法的方法流程图。FIG. 4 is a flow chart of a method for determining activation control information according to an embodiment of the present application.
图5是本申请实施例的人员控制信息的确定方法的方法流程图一。FIG. 5 is a flowchart of a method for determining personnel control information according to an embodiment of the present application.
图6是本申请实施例的人员控制信息的确定方法的方法流程图二。FIG. 6 is a second flowchart of a method for determining personnel control information according to an embodiment of the present application.
图7是本申请实施例的位于输出预设的身份异常预警信息并发送至管理者所持终端或电子设备绑定使用者所持终端之前的步骤的方法流程图。7 is a method flow chart of the steps before outputting the preset identity abnormality warning information and sending it to the terminal held by the administrator or the terminal held by the user bound to the electronic device according to the embodiment of the present application.
图8是本申请实施例的电子设备区域保护的系统流程图。FIG8 is a system flow chart of area protection of electronic equipment according to an embodiment of the present application.
附图标记说明:1、获取模块;2、存储器;3、处理器。Explanation of the accompanying drawings: 1. Acquisition module; 2. Memory; 3. Processor.
具体实施方式DETAILED DESCRIPTION
下面结合附图与实施例对本发明作进一步详细描述。The present invention is further described in detail below in conjunction with the accompanying drawings and embodiments.
本发明实施例公开一种电子设备区域保护方法。The embodiment of the invention discloses a method for protecting a region of an electronic device.
参照图1,一种电子设备区域保护方法包括:1, a method for protecting an area of an electronic device includes:
步骤S100:获取申请者申请激活或使用时所处的申请经纬度以及电子设备中激活模块唯一的身份标识码。Step S100: Obtain the application latitude and longitude where the applicant is located when applying for activation or use and the unique identification code of the activation module in the electronic device.
其中,申请经纬度是指申请者申请激活或使用时所处位置对应的经纬度,申请经纬度通过申请者所持的移动通讯终端在进行申请或激活操作时对其位置进行查询获取。身份标识码是指需要进行激活或使用的电子设备中预设的激活模块中唯一对应用于识别身份的标识码,激活模块预设于电子设备中且用于控制激活操作。身份标识码通过申请者所持的移动通讯终端在进行申请或激活操作时通过蓝牙等手段与电子设备进行连接后从激活模块中读取后获取。Among them, the application longitude and latitude refer to the longitude and latitude corresponding to the location of the applicant when applying for activation or use. The application longitude and latitude are obtained by querying the location of the applicant through the mobile communication terminal held by the applicant when performing the application or activation operation. The identity identification code refers to the unique identification code for identifying the identity in the activation module preset in the electronic device that needs to be activated or used. The activation module is preset in the electronic device and is used to control the activation operation. The identity identification code is obtained by reading from the activation module after the mobile communication terminal held by the applicant is connected to the electronic device through Bluetooth or other means when performing the application or activation operation.
步骤S200:基于申请经纬度查询获取管理基准经纬度并计算两者之间的使用距离值。Step S200: Query and obtain the management reference longitude and latitude based on the application longitude and latitude, and calculate the usage distance value between the two.
其中,管理基准经纬度是指对电子设备进行激活或者使用时所处区域内部的基准位置所对应的经纬度,管理基准经纬度可以是该区域进行激活授权的管理员所处的位置,管理基准经纬度也可以为该区域进行激活授权的基准位置所处的位置。管理基准经纬度通过对电子设备进行激活或者使用时所处区域进行查询后获取。The management reference longitude and latitude refer to the longitude and latitude corresponding to the reference position within the area where the electronic device is activated or used. The management reference longitude and latitude may be the location of the administrator who authorizes the activation in the area, or the location of the reference position authorized for activation in the area. The management reference longitude and latitude are obtained by querying the area where the electronic device is activated or used.
使用距离值是指申请者与电子设备的激活或者使用的基准位置之间的距离值,通过申请经纬度与预设的管理基准经纬度,采用预设的距离公式进行计算后获取使用距离值。距离公式为d=R×arccos[cos(Y1)×cos(Y2)×cos(X1-X2)+sin(Y1)×sin(Y2)],其中,d为使用距离值,申请经纬度为(X1,Y1)管理基准经纬度为(X2,Y2)。距离公式从存储有距离公式的数据库中直接查询获取并进行使用。通过采用距离公式对申请经纬度与预设的管理基准经纬度之间的距离进行计算并作为使用距离值,从而方便后续进行使用。The usage distance value refers to the distance value between the applicant and the base location where the electronic device is activated or used. The usage distance value is obtained by calculating the application longitude and latitude and the preset management base longitude and latitude using the preset distance formula. The distance formula is d=R×arccos[cos(Y1)×cos(Y2)×cos(X1-X2)+sin(Y1)×sin(Y2)], where d is the usage distance value, the application longitude and latitude are (X1, Y1) and the management base longitude and latitude are (X2, Y2). The distance formula is directly queried and used from the database where the distance formula is stored. The distance between the application longitude and latitude and the preset management base longitude and latitude is calculated using the distance formula and used as the usage distance value, which is convenient for subsequent use.
步骤S300:当且仅当使用距离值小于预设的使用容许距离值时,根据身份标识码进行加密处理以形成激活密钥码。Step S300: When and only when the usage distance value is less than the preset usage allowable distance value, encrypt the identity code to form an activation key code.
其中,使用容许距离值是指对电子设备进行使用或激活时所能容许的距离值,使用容许距离值通过操作者预输入并存储于数据库中。激活密钥码是指用于对激活模块进行激活时云服务器所得到的密钥码,当且仅当使用距离值小于预设的使用容许距离值时,说明此时申请者所持的移动通讯终端所处位置满足要求,故在申请者所持的移动通讯终端获取到身份标识码后传输至云服务器中进行加密处理,从而形成激活密钥码。The use allowable distance value refers to the distance value that can be allowed when using or activating the electronic device. The use allowable distance value is pre-entered by the operator and stored in the database. The activation key code refers to the key code obtained by the cloud server when activating the activation module. If and only if the use distance value is less than the preset use allowable distance value, it means that the location of the mobile communication terminal held by the applicant meets the requirements at this time. Therefore, after the mobile communication terminal held by the applicant obtains the identity code, it is transmitted to the cloud server for encryption processing to form the activation key code.
步骤S400:基于激活密钥码进行与加密处理相对应的解密处理以形成身份读取码。Step S400: performing a decryption process corresponding to the encryption process based on the activation key code to form an identity reading code.
其中,身份读取码是指激活模块对激活密钥码进行解码处理后得到的用于指示电子设备身份的读取码,解密处理与加密处理互相对应,通过对激活密钥码进行解码处理从而形成身份读取码,方便后续进行使用。Among them, the identity reading code refers to the reading code used to indicate the identity of the electronic device obtained after the activation module decodes the activation key code. The decryption process corresponds to the encryption process. The identity reading code is formed by decoding the activation key code to facilitate subsequent use.
步骤S500:根据身份标识码与身份读取码之间的相同情况,以确定激活控制信息并输出至电子设备以控制是否进行激活。Step S500: According to the identity of the identity code and the identity reading code, activation control information is determined and output to the electronic device to control whether to activate.
其中,激活控制信息是指用于对电子设备进行激活的控制信息,通过对身份标识码与身份读取码之间的相同情况进行分析以确定激活控制信息并输出至电子设备以控制是否进行激活,从而使电子设备只有在距离满足要求且身份识别正确的情况下才能够进行激活或者使用,进而使电子设备不容易进行跨区域销售或使用。Among them, activation control information refers to control information used to activate electronic devices. The activation control information is determined by analyzing the same situation between the identity identification code and the identity reading code and output to the electronic device to control whether to activate it. In this way, the electronic device can only be activated or used when the distance meets the requirements and the identity recognition is correct, thereby making it difficult for the electronic device to be sold or used across regions.
在图1所示的步骤S300中,为了进一步确保加密处理的合理性,因此需要对加密处理作更进一步的单独分析计算,具体通过图2所示步骤进行详细说明。In step S300 shown in FIG. 1 , in order to further ensure the rationality of the encryption process, it is necessary to perform further separate analysis and calculation on the encryption process, which is specifically described in detail through the steps shown in FIG. 2 .
参照图2,加密处理的具体步骤包括如下步骤:2, the specific steps of the encryption process include the following steps:
步骤S310:基于身份标识码对每个字节进行单独读取以形成身份单个字节。Step S310: Read each byte individually based on the identity identification code to form a single identity byte.
其中,身份单个字节是指身份标识码中的各个单个字节,通过对身份标识码中的每个字节进行单独读取并作为身份单个字节,方便后续进行使用。The identity single byte refers to each single byte in the identity identification code. By reading each byte in the identity identification code separately and using it as the identity single byte, subsequent use is facilitated.
步骤S320:基于身份单个字节从预设的编码数组选取指定值进行异或处理以形成异或处理值。Step S320: Based on the identity single byte, a specified value is selected from a preset encoding array for XOR processing to form an XOR processing value.
其中,编码数组是指用于进行加密而进行编码所需要采用的数组,编码数组通过操作者预设并存储于数据库中,指定值是指对编码数组中的值进行选取的值,异或处理值是指对身份单个字节进行异或处理后的所形成的数值。Among them, the coding array refers to the array required for encoding for encryption, the coding array is preset by the operator and stored in the database, the specified value refers to the value selected from the coding array, and the XOR processing value refers to the value formed after XOR processing of a single byte of the identity.
通过身份单个字节从编码数组选取指定值并与身份单个字节进行异或处理,从而形成异或处理值,方便后续进行使用。The specified value is selected from the encoding array through the identity single byte and XORed with the identity single byte to form an XORed value for subsequent use.
步骤S330:将所有身份单个字节所对应的异或处理值进行结合以形成激活密钥码。Step S330: Combine the XOR processing values corresponding to the single bytes of all identities to form an activation key code.
其中,通过将所有身份单个字节所对应的异或处理值进行结合,从而将结合后的各个异或处理值作为激活密钥码,从而提高获取的激活密钥码的准确性。The XOR processing values corresponding to all the single bytes of the identities are combined, and the combined XOR processing values are used as the activation key code, thereby improving the accuracy of the obtained activation key code.
在图2所示的步骤S320中,为了进一步确保指定值的合理性,因此需要对指定值作更进一步的单独分析计算,具体通过图3所示步骤进行详细说明。In step S320 shown in FIG. 2 , in order to further ensure the rationality of the specified value, it is necessary to perform further separate analysis and calculation on the specified value, which is specifically described in detail through the steps shown in FIG. 3 .
参照图3,选取指定值的方法包括如下步骤:Referring to FIG. 3 , the method for selecting a specified value includes the following steps:
步骤S321:基于身份单个字节调取字节位于身份标识码的字节位置。Step S321: Retrieve the byte located at the byte position of the identity identification code based on the single byte of the identity.
其中,字节位置是指各个字节在身份标识码中所处的位置,通过对字节位置进行调取,从而方便后续进行使用。The byte position refers to the position of each byte in the identity code, and the byte position is retrieved to facilitate subsequent use.
步骤S322:根据字节位置与预设的位置数组的对应关系,以确定与字节位置相对应的位置数组。Step S322: Determine the position array corresponding to the byte position according to the correspondence between the byte position and the preset position array.
其中,位置数组是指依据字节位置在进行加密处理所需要采用的数组,位置数组从存储有位置数组及字节位置的数据库中查询获取。通过字节位置查询确定位置数组,方便后续进行使用。Among them, the position array refers to the array required for encryption processing based on the byte position, and the position array is obtained by querying the database storing the position array and the byte position. The position array is determined by the byte position query, which is convenient for subsequent use.
步骤S323:获取当前时间点。Step S323: Get the current time point.
其中,当前时间点是指当前时间所对应的时间点,当前时间点通过当前时间进行时间查询后获取。The current time point refers to the time point corresponding to the current time, and the current time point is obtained by performing a time query through the current time.
步骤S324:根据当前时间点与预设的时间选取值的对应关系,以确定与当前时间点相对应的时间选取值。Step S324: Determine the time selection value corresponding to the current time point according to the correspondence between the current time point and the preset time selection value.
其中,时间选取值是指依据时间对数组中所对应的个数进行选取的选取个数值,时间选取值通过从存储有各个时间点与时间选取值的数据库中查询获取。通过当前时间点查询确定时间选取值,方便后续进行使用。The time selection value refers to the selected value of the corresponding number in the array according to the time, and the time selection value is obtained by querying from a database storing various time points and time selection values. The time selection value is determined by querying the current time point for subsequent use.
步骤S325:基于时间选取值以对位置数组进行选取并作为指定值。Step S325: Select a value based on the time to select the position array and use it as the specified value.
其中,通过时间选取值对位置数组进行选取,并将位置数组中选取数值并作为指定值,从而提高获取的指定值的准确性。The position array is selected by selecting the time value, and the value selected in the position array is used as the designated value, thereby improving the accuracy of the acquired designated value.
在图1所示的步骤S500中,为了进一步确保激活控制信息的合理性,因此需要对激活控制信息作更进一步的单独分析计算,具体通过图4所示步骤进行详细说明。In step S500 shown in FIG. 1 , in order to further ensure the rationality of the activation control information, it is necessary to perform further separate analysis and calculation on the activation control information, which is specifically described in detail through the steps shown in FIG. 4 .
参照图4,激活控制信息的确定方法包括如下步骤:4, the method for determining activation control information includes the following steps:
步骤S510:判断身份标识码与身份读取码之间是否相同。若为是,则执行步骤S520;若为否,则执行步骤S550。Step S510: Determine whether the identity identification code and the identity reading code are the same. If yes, execute step S520; if no, execute step S550.
其中,通过对身份标识码与身份读取码之间是否相同进行判断,从而判断当前时间进行使用或激活的电子设备的身份是否准确。By determining whether the identity identification code is identical to the identity reading code, it is determined whether the identity of the electronic device currently being used or activated is accurate.
步骤S520:获取申请者信息。Step S520: Obtain applicant information.
其中,申请者信息是指当前申请对电子设备进行激活或使用的人所对应的信息,申请者信息通过对申请者所持移动终端进行查询获取。当身份标识码与身份读取码相同时,说明此时进行使用或激活的电子设备的身份准确,故对申请者信息进行获取,方便后续进行使用。The applicant information refers to the information corresponding to the person who currently applies to activate or use the electronic device. The applicant information is obtained by querying the mobile terminal held by the applicant. When the identity identification code and the identity reading code are the same, it means that the identity of the electronic device being used or activated at this time is accurate, so the applicant information is obtained to facilitate subsequent use.
步骤S530:基于身份标识码以对电子设备绑定的使用者信息进行查询。Step S530: querying the user information bound to the electronic device based on the identity code.
其中,使用者信息是指该身份标识码所对应的电子设备进行激活或使用后的人所对应的信息,通过身份标识码以对电子设备绑定的使用者信息进行查询,从而方便后续进行使用。The user information refers to the information corresponding to the person who activated or used the electronic device corresponding to the identity code. The user information bound to the electronic device is queried through the identity code to facilitate subsequent use.
步骤S540:根据使用者信息的查询情况及申请者信息分析确定人员控制信息,并将人员控制信息作为激活控制信息。Step S540: determining personnel control information according to the query result of the user information and the applicant information analysis, and using the personnel control information as activation control information.
其中,人员控制信息是指依据人员的准确情况对电子设备进行激活的控制信息,通过使用者信息的查询情况及申请者信息对人员控制信息进行分析确定,并将人员控制信息作为激活控制信息,从而提高获取的激活控制信息的准确性。Among them, personnel control information refers to control information for activating electronic equipment based on the accurate situation of personnel. The personnel control information is analyzed and determined through the query situation of user information and applicant information, and the personnel control information is used as activation control information, thereby improving the accuracy of the acquired activation control information.
步骤S550:输出预设的身份异常预警信息并发送至管理者所持终端或电子设备绑定使用者所持终端。Step S550: output the preset identity abnormality warning information and send it to the terminal held by the administrator or the terminal held by the user bound to the electronic device.
其中,身份异常预警信息是指用于指示当前时间进行激活或使用的身份存在异常的报警信息,当身份标识码与身份读取码不相同时,说明此时进行使用或激活的电子设备的身份不准确,故输出预设的身份异常预警信息并发送至管理者所持终端或电子设备绑定使用者所持终端,从而进行预警。Among them, identity abnormality warning information refers to alarm information used to indicate that there is an abnormality in the identity activated or used at the current time. When the identity identification code is different from the identity reading code, it means that the identity of the electronic device used or activated at this time is inaccurate, so the preset identity abnormality warning information is output and sent to the terminal held by the administrator or the terminal held by the user bound to the electronic device, so as to issue a warning.
在图4所示的步骤S540中,为了进一步确保人员控制信息的合理性,因此需要对人员控制信息作更进一步的单独分析计算,具体通过图5所示步骤进行详细说明。In step S540 shown in FIG. 4 , in order to further ensure the rationality of the personnel control information, it is necessary to perform further separate analysis and calculation on the personnel control information, which is specifically described in detail through the steps shown in FIG. 5 .
参照图5,人员控制信息的确定方法包括如下步骤:5, the method for determining personnel control information includes the following steps:
步骤S541:当未查询到使用者信息时,则基于申请者信息调取单位时间内的申请者激活个数值。Step S541: when no user information is found, the number of applicant activations per unit time is retrieved based on the applicant information.
其中,申请者激活个数值是指申请者所持移动终端对电子设备进行激活的个数值,申请者激活个数值从存储有申请者激活个数值的数据库中查询获取。当未查询到使用者信息时,说明此时电子设备还未存在使用者,且需要进行激活,故对申请者激活个数值进行调取,方便后续进行使用。The number of activations by the applicant refers to the number of activations of the electronic device by the mobile terminal held by the applicant, and the number of activations by the applicant is retrieved from a database storing the number of activations by the applicant. If no user information is found, it means that the electronic device has no user yet and needs to be activated, so the number of activations by the applicant is retrieved for subsequent use.
步骤S542:判断申请者激活个数值是否小于预设的激活基准个数值。若为是,则执行步骤S543;若为否,则执行步骤S544。Step S542: Determine whether the number of activations by the applicant is less than the preset activation reference number. If yes, execute step S543; if no, execute step S544.
其中,激活基准个数值是指申请者所持移动终端在单位时间内能够对电子设备进行激活的基准个数值,激活基准个数值通过操作者预输入并存储于数据库中。通过对申请者激活个数值是否小于预设的激活基准个数值进行判断,从而判断申请者所持移动终端能否继续进行激活。The activation benchmark value refers to the benchmark value of the number of electronic devices that can be activated by the mobile terminal held by the applicant within a unit time. The activation benchmark value is pre-entered by the operator and stored in the database. By judging whether the activation value of the applicant is less than the preset activation benchmark value, it is judged whether the mobile terminal held by the applicant can continue to be activated.
步骤S543:输出预设的激活开启信息并作为人员控制信息,并将身份标识码与申请者信息进行绑定并上传。Step S543: output the preset activation information as personnel control information, and bind the identity code with the applicant information and upload them.
其中,激活开启信息是指用于控制电子设备进行激活的控制信息,激活开启信息从存储有激活开启信息的数据库中查询获取。当申请者激活个数值小于预设的激活基准个数值时,说明此时申请者所持移动终端可以继续进行激活,故输出预设的激活开启信息并作为人员控制信息,并将身份标识码与申请者信息进行绑定并上传,从而提高获取的人员控制信息的准确性。The activation information refers to the control information used to control the activation of the electronic device, and the activation information is obtained by querying the database storing the activation information. When the activation number value of the applicant is less than the preset activation reference value, it means that the mobile terminal held by the applicant can continue to be activated, so the preset activation information is output as the personnel control information, and the identity code is bound to the applicant information and uploaded, thereby improving the accuracy of the obtained personnel control information.
步骤S544:输出激活上限提示信息并发送至申请者所持终端。Step S544: Output activation upper limit prompt information and send it to the terminal held by the applicant.
其中,激活上限提示信息是指对申请者所持移动终端在单位时间内能够对电子设备进行激活的个数达到上限进行提示的提示信息,激活上限提示信息从存储有激活上限提示信息的数据库中查询获取。当申请者激活个数值不小于预设的激活基准个数值时,说明此时申请者所持移动终端不可以继续进行激活,故输出激活上限提示信息并发送至申请者所持终端。The activation upper limit prompt information refers to the prompt information that the number of electronic devices that can be activated by the mobile terminal held by the applicant within a unit time has reached the upper limit, and the activation upper limit prompt information is obtained by querying the database storing the activation upper limit prompt information. When the activation number value of the applicant is not less than the preset activation reference number value, it means that the mobile terminal held by the applicant cannot continue to be activated at this time, so the activation upper limit prompt information is output and sent to the terminal held by the applicant.
在图4所示的步骤S540中,为了进一步确保人员控制信息的合理性,因此需要对人员控制信息作更进一步的单独分析计算,具体通过图6所示步骤进行详细说明。In step S540 shown in FIG. 4 , in order to further ensure the rationality of the personnel control information, it is necessary to perform further separate analysis and calculation on the personnel control information, which is specifically described in detail through the steps shown in FIG. 6 .
参照图6,人员控制信息的确定方法还包括如下步骤:6, the method for determining personnel control information further includes the following steps:
步骤S5411:当查询到使用者信息时,则判断使用者信息与申请者信息是否一致。若为是,则执行步骤S5412;若为否,则执行步骤S5413。Step S5411: When the user information is found, it is determined whether the user information is consistent with the applicant information. If yes, step S5412 is executed; if no, step S5413 is executed.
其中,当查询到使用者信息时,说明此时电子设备已经进行过激活,故对使用者信息与申请者信息是否一致进行判断,从而判断当前时间的申请者是否为电子设备的使用者。When the user information is queried, it means that the electronic device has been activated at this time, so it is judged whether the user information is consistent with the applicant information, so as to judge whether the applicant at the current time is the user of the electronic device.
步骤S5412:输出预设的激活开启信息并作为人员控制信息。Step S5412: Output the preset activation information as personnel control information.
其中,当使用者信息与申请者信息一致时,说明此时申请者为电子设备的使用者,故输出预设的激活开启信息并作为人员控制信息。When the user information is consistent with the applicant information, it means that the applicant is the user of the electronic device, so the preset activation information is output as the personnel control information.
步骤S5413:基于使用者信息调取高频率使用区域及高频率使用时间段。Step S5413: Retrieve high-frequency usage areas and high-frequency usage time periods based on user information.
其中,高频率使用区域是指电子设备的使用者高频率进行使用时所处的区域位置,高频率使用区域通过电子设备的使用者进行使用后对位置进行上传至数据库后从存储有高频率使用区域的数据库中查询获取。高频率使用时间段是指电子设备的使用者高频率进行使用时所处的时间段,高频率使用时间段通过电子设备的使用者进行使用后对时间段进行上传至数据库后从存储有高频率使用时间段的数据库中查询获取。当使用者信息与申请者信息不一致时,说明此时申请者不一定为电子设备的使用者,故对高频率使用区域及高频率使用时间段进行调取,方便后续进行使用。Among them, the high-frequency use area refers to the area where the user of the electronic device uses it frequently. The high-frequency use area is obtained by uploading the location to the database after the user of the electronic device uses it, and then querying from the database storing the high-frequency use area. The high-frequency use time period refers to the time period when the user of the electronic device uses it frequently. The high-frequency use time period is obtained by uploading the time period to the database after the user of the electronic device uses it, and then querying from the database storing the high-frequency use time period. When the user information is inconsistent with the applicant information, it means that the applicant is not necessarily the user of the electronic device at this time, so the high-frequency use area and high-frequency use time period are retrieved to facilitate subsequent use.
步骤S5414:根据申请经纬度与高频率使用区域之间的落入情况,以确定申请位置影响值。Step S5414: Determine the application location impact value based on the location of the application and the high-frequency usage area.
其中,申请位置影响值是指申请者进行申请时所处位置存在偏差时对人员判定产生影响的影响程度值,通过对申请经纬度与高频率使用区域之间的落入情况进行分析,并对申请经纬度与高频率使用区域之间的偏差情况进行分析以形成位置偏差值,申请位置影响值通过从存储有申请位置影响值与位置偏差值的数据库中查询获取。通过将区域偏差值查询确定申请位置影响值,从而方便后续进行使用。Among them, the application location impact value refers to the degree of influence on personnel judgment when there is a deviation in the location of the applicant when applying. The application location impact value is obtained by querying from a database storing the application location impact value and location deviation value by querying the regional deviation value to determine the application location impact value, so as to facilitate subsequent use.
步骤S5415:根据当前时间点与高频率使用时间段之间的落入情况,以确定申请时间影响值。Step S5415: Determine the application time impact value according to the current time point falling within the high frequency usage time period.
其中,申请时间影响值是指申请者进行申请时所处时间存在偏差时对人员判定产生影响的影响程度值,通过对当前时间点与高频率使用时间段之间的落入情况进行分析,并对当前时间点与高频率使用时间段之间的偏差情况进行分析以形成时间偏差值,申请时间影响值通过从存储有申请时间影响值与时间偏差值的数据库中查询获取。通过将时间偏差值查询确定申请时间影响值,从而方便后续进行使用。Among them, the application time impact value refers to the impact degree value on personnel judgment when there is a deviation in the time when the applicant applies. The time deviation value is formed by analyzing the fall between the current time point and the high-frequency use time period and the deviation between the current time point and the high-frequency use time period. The application time impact value is obtained by querying from a database storing the application time impact value and the time deviation value. The application time impact value is determined by querying the time deviation value, which is convenient for subsequent use.
步骤S5416:计算申请位置影响值与申请时间影响值之间的和值并作为申请综合影响值。Step S5416: Calculate the sum of the application location impact value and the application time impact value and use it as the application comprehensive impact value.
其中,申请综合影响值是指申请者进行申请时产生的综合影响程度值,通过对申请位置影响值与申请时间影响值之间的和值进行计算并作为申请综合影响值,方便后续进行使用。Among them, the comprehensive impact value of the application refers to the comprehensive impact value generated when the applicant makes an application. The sum of the application location impact value and the application time impact value is calculated and used as the comprehensive impact value of the application for subsequent use.
步骤S5417:根据申请综合影响值与预设的申请影响基准值的比较结果,以输出身份异常预警信息或人员控制信息。Step S5417: Output identity abnormality warning information or personnel control information based on the comparison result of the application comprehensive impact value and the preset application impact benchmark value.
其中,申请影响基准值是指申请者进行申请时所能够容忍的最小影响程度值,申请影响基准值通过操作者进行预输入并存储于数据库,通过对申请综合影响值与预设的申请影响基准值的比较结果进行分析,当申请综合影响值大于申请影响基准值时,说明此时申请者异常,故输出身份异常预警信息,当申请综合影响值不大于申请影响基准值时,说明此时申请者不存在异常,故输出人员控制信息。Among them, the application impact benchmark value refers to the minimum impact value that the applicant can tolerate when making an application. The application impact benchmark value is pre-input by the operator and stored in the database. The comparison result of the application comprehensive impact value and the preset application impact benchmark value is analyzed. When the application comprehensive impact value is greater than the application impact benchmark value, it means that the applicant is abnormal at this time, so the identity abnormality warning information is output; when the application comprehensive impact value is not greater than the application impact benchmark value, it means that the applicant is not abnormal at this time, so the personnel control information is output.
在图4所示的步骤S550中,为了进一步确保人员控制信息的合理性,因此需要对输出预设的身份异常预警信息之前作更进一步的单独分析计算,具体通过图7所示步骤进行详细说明。In step S550 shown in FIG. 4 , in order to further ensure the rationality of the personnel control information, it is necessary to perform further separate analysis and calculation before outputting the preset identity abnormality warning information, which is specifically explained in detail through the steps shown in FIG. 7 .
参照图7,位于输出预设的身份异常预警信息并发送至管理者所持终端或电子设备绑定使用者所持终端之前的步骤包括如下步骤:7 , the steps before outputting the preset identity abnormality warning information and sending it to the terminal held by the manager or the terminal held by the user bound to the electronic device include the following steps:
步骤S551:分析身份标识码与身份读取码之间的偏差情况并作为身份码偏差信息。Step S551: Analyze the deviation between the identity identification code and the identity reading code and use it as identity code deviation information.
其中,身份码偏差信息是指电子设备的身份码与解码后的身份码存在偏差时的偏差信息,通过对身份标识码与身份读取码之间的偏差情况进行分析并作为身份码偏差信息,方便后续进行使用。The identity code deviation information refers to the deviation information when there is a deviation between the identity code of the electronic device and the decoded identity code. By analyzing the deviation between the identity identification code and the identity reading code and using it as the identity code deviation information, subsequent use is facilitated.
步骤S552:基于身份码偏差信息调取身份码偏差位置及身份码偏差个数。Step S552: Retrieve the identity code deviation position and the number of identity code deviations based on the identity code deviation information.
其中,身份码偏差位置是指身份码存在偏差时所处的位置,身份码偏差个数是指身份码存在偏差时所对应的个数值,通过身份码偏差信息对身份码偏差位置及身份码偏差个数进行调取,从而方便后续进行使用。Among them, the identity code deviation position refers to the position where the identity code is located when there is a deviation, and the identity code deviation number refers to the corresponding value when there is a deviation in the identity code. The identity code deviation position and the identity code deviation number are retrieved through the identity code deviation information, so as to facilitate subsequent use.
步骤S553:根据身份码偏差个数与预设的偏差个数影响值的对应关系,以确定与身份码偏差个数相对应的偏差个数影响值。Step S553: determining the deviation number impact value corresponding to the identity code deviation number according to the correspondence between the identity code deviation number and the preset deviation number impact value.
其中,偏差个数影响值是指身份码存在偏差的个数产生的影响程度值,偏差个数影响值通过从存储有身份码偏差个数与偏差个数影响值的数据库中查询获取。通过身份码偏差个数查询确定偏差个数影响值,方便后续进行使用。The deviation number impact value refers to the impact value caused by the number of deviations in the identity code, and the deviation number impact value is obtained by querying from a database storing the number of identity code deviations and the deviation number impact value. The deviation number impact value is determined by querying the identity code deviation number, which is convenient for subsequent use.
步骤S554:根据身份码偏差位置与预设的偏差位置影响值的对应关系,以确定与身份码偏差位置相对应的偏差位置影响值。Step S554: determining the deviation position influence value corresponding to the identity code deviation position according to the correspondence between the identity code deviation position and the preset deviation position influence value.
其中,偏差位置影响值是指身份码存在偏差的位置产生的影响程度值,偏差位置影响值通过从存储有身份码偏差位置与偏差位置影响值的数据库中查询获取。通过身份码偏差位置查询确定偏差位置影响值,方便后续进行使用。The deviation position impact value refers to the impact value of the position where the identity code has a deviation, and the deviation position impact value is obtained by querying from a database storing the identity code deviation position and the deviation position impact value. The deviation position impact value is determined by querying the identity code deviation position for subsequent use.
步骤S555:计算偏差个数影响值与偏差位置影响值之间的和值并作为偏差综合影响值。Step S555: Calculate the sum of the deviation number impact value and the deviation position impact value and use it as the deviation comprehensive impact value.
其中,偏差综合影响值是指身份码存在偏差产生的综合影响程度值,通过对偏差个数影响值与偏差位置影响值之间的和值进行计算并作为偏差综合影响值,方便后续进行使用。The comprehensive impact value of deviation refers to the comprehensive impact value caused by the deviation of the identity code. The sum of the impact value of the number of deviations and the impact value of the deviation position is calculated and used as the comprehensive impact value of deviation for subsequent use.
步骤S556:判断偏差综合影响值是否大于预设的偏差基准影响值。若为是,则执行步骤S557;若为否,则执行步骤S558。Step S556: Determine whether the deviation comprehensive impact value is greater than the preset deviation reference impact value. If yes, execute step S557; if no, execute step S558.
其中,偏差基准影响值是指身份码存在偏差所能忍受的基准影响程度值,偏差基准影响值通过操作者预输入并存储于数据库中,通过对偏差综合影响值是否大于预设的偏差基准影响值进行判断,从而判断身份码是否存在较大偏差。Among them, the deviation baseline impact value refers to the baseline impact degree value that the identity code can tolerate when there is a deviation. The deviation baseline impact value is pre-input by the operator and stored in the database. By judging whether the comprehensive impact value of the deviation is greater than the preset deviation baseline impact value, it is judged whether there is a large deviation in the identity code.
步骤S557:继续执行步骤S550。Step S557: Continue to execute step S550.
其中,当偏差综合影响值大于预设的偏差基准影响值时,说明此时身份码存在较大偏差,故继续执行步骤S550When the comprehensive deviation impact value is greater than the preset deviation reference impact value, it means that there is a large deviation in the identity code at this time, so continue to execute step S550
步骤S558:跳转执行步骤S400。Step S558: Jump to execute step S400.
其中,当偏差综合影响值不大于预设的偏差基准影响值时,说明此时身份码不存在较大偏差,故跳转执行步骤S400。When the comprehensive deviation impact value is not greater than the preset deviation reference impact value, it means that there is no large deviation in the identity code at this time, so the process jumps to step S400.
参照图8,基于同一发明构思,本发明实施例提供一种电子设备区域保护系统,包括:Referring to FIG. 8 , based on the same inventive concept, an embodiment of the present invention provides an electronic equipment area protection system, including:
获取模块1,用于获取申请经纬度、身份标识码、当前时间点及申请者信息;Acquisition module 1, used to obtain application latitude and longitude, identity code, current time point and applicant information;
存储器2,用于存储如图1至图7中任一项的电子设备区域保护方法的程序;A memory 2, used for storing a program of the electronic device area protection method as shown in any one of FIG. 1 to FIG. 7;
处理器3,存储器中的程序能够被处理器加载执行且实现如图1至图7中任一项的电子设备区域保护方法。Processor 3, the program in the memory can be loaded and executed by the processor to implement the electronic device area protection method as shown in any one of Figures 1 to 7.
基于同一发明构思,本发明实施例提供一种智能终端,包括存储器和处理器,存储器上存储有能够被处理器加载并执行如图1至图7中任一项的电子设备区域保护方法的计算机程序。Based on the same inventive concept, an embodiment of the present invention provides a smart terminal, including a memory and a processor, wherein the memory stores a computer program that can be loaded by the processor and executes an electronic device area protection method as shown in any one of Figures 1 to 7.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将装置的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that for the convenience and simplicity of description, only the division of the above-mentioned functional modules is used as an example. In actual applications, the above-mentioned functions can be assigned to different functional modules as needed, that is, the internal structure of the device is divided into different functional modules to complete all or part of the functions described above. The specific working process of the system, device and unit described above can refer to the corresponding process in the aforementioned method embodiment, and will not be repeated here.
本发明实施例提供一种计算机可读存储介质,存储有能够被处理器加载并执行如图1至图7中任一项的电子设备区域保护方法的计算机程序。An embodiment of the present invention provides a computer-readable storage medium storing a computer program that can be loaded by a processor and executes a method for protecting a region of an electronic device as shown in any one of FIG. 1 to FIG. 7 .
计算机存储介质例如包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。Computer storage media include, for example, various media that can store program codes, such as USB flash drives, mobile hard disks, read-only memories (ROM), random access memories (RAM), magnetic disks or optical disks.
以上所述仅是本发明的优选实施方式,本发明的保护范围并不仅局限于上述实施例,凡属于本发明思路下的技术方案均属于本发明的保护范围。应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理前提下的若干改进和润饰,这些改进和润饰也应视为本发明的保护范围。The above is only a preferred embodiment of the present invention, and the protection scope of the present invention is not limited to the above embodiments. All technical solutions under the concept of the present invention belong to the protection scope of the present invention. It should be pointed out that for ordinary technicians in this technical field, some improvements and modifications without departing from the principle of the present invention should also be regarded as the protection scope of the present invention.
Claims (6)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410902989.9A CN118469675B (en) | 2024-07-08 | 2024-07-08 | Electronic equipment area protection method, system, intelligent terminal and storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410902989.9A CN118469675B (en) | 2024-07-08 | 2024-07-08 | Electronic equipment area protection method, system, intelligent terminal and storage medium |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN118469675A CN118469675A (en) | 2024-08-09 |
| CN118469675B true CN118469675B (en) | 2024-10-29 |
Family
ID=92165302
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202410902989.9A Active CN118469675B (en) | 2024-07-08 | 2024-07-08 | Electronic equipment area protection method, system, intelligent terminal and storage medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN118469675B (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN119738616A (en) * | 2025-03-03 | 2025-04-01 | 上海克开电器有限公司 | Component insertion loss testing method, system and terminal |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105321075A (en) * | 2014-05-31 | 2016-02-10 | 惠州市德赛西威汽车电子股份有限公司 | Method for preventing commodity fleeing through bus-containing vehicle navigator |
| CN110706046A (en) * | 2018-07-10 | 2020-01-17 | 鄢海军 | Kitchen equipment activation method and device, storage medium and electronic equipment |
| CN117875974A (en) * | 2024-02-08 | 2024-04-12 | 广东好太太科技集团股份有限公司 | Abnormal activation detection method and device, electronic equipment and readable storage medium |
| CN118261614A (en) * | 2024-05-29 | 2024-06-28 | 成都纳宝科技有限公司 | Intelligent accurate channel electronic fence anti-channel-conflict large model system and method |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7602905B2 (en) * | 2004-09-01 | 2009-10-13 | Texas Instruments Incorporated | Processes, circuits, devices, and systems for encryption and decryption and other purposes, and processes of making |
| CN113487335A (en) * | 2021-07-06 | 2021-10-08 | 北京一雄信息科技有限公司 | Method and system for controlling cross-regional sale of electronic goods |
-
2024
- 2024-07-08 CN CN202410902989.9A patent/CN118469675B/en active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105321075A (en) * | 2014-05-31 | 2016-02-10 | 惠州市德赛西威汽车电子股份有限公司 | Method for preventing commodity fleeing through bus-containing vehicle navigator |
| CN110706046A (en) * | 2018-07-10 | 2020-01-17 | 鄢海军 | Kitchen equipment activation method and device, storage medium and electronic equipment |
| CN117875974A (en) * | 2024-02-08 | 2024-04-12 | 广东好太太科技集团股份有限公司 | Abnormal activation detection method and device, electronic equipment and readable storage medium |
| CN118261614A (en) * | 2024-05-29 | 2024-06-28 | 成都纳宝科技有限公司 | Intelligent accurate channel electronic fence anti-channel-conflict large model system and method |
Also Published As
| Publication number | Publication date |
|---|---|
| CN118469675A (en) | 2024-08-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN118469675B (en) | Electronic equipment area protection method, system, intelligent terminal and storage medium | |
| CN102089769B (en) | Method of providing secure tamper-proof acquired data from process instruments | |
| CN109474619B (en) | Data encryption reporting method and device and data decryption method and device | |
| EP3190543A1 (en) | Method of dynamically encrypting fingerprint data and related fingerprint sensor | |
| US10440121B2 (en) | Endpoints for performing distributed sensing and control and methods of operating the same | |
| CN110222086A (en) | Data managing method, device, equipment and storage medium based on block chain | |
| CN110995720B (en) | Encryption method, device, host terminal and encryption chip | |
| US11188660B2 (en) | Blockchain-based image processing method and apparatus | |
| JP2005050160A (en) | Hardware protection key and information processing system | |
| CN111400714B (en) | Virus detection method, device, equipment and storage medium | |
| CN112073444B (en) | Data set processing method and device and server | |
| CN111882233A (en) | Warehousing risk early warning method, system, device and storage medium based on blockchain | |
| CN116800423B (en) | RFID-based data acquisition and double encryption and decryption data protection method and device | |
| CN114978483A (en) | Data transmission method, device and storage medium | |
| CN114692121B (en) | Information acquisition method and related product | |
| CN112533185A (en) | Sound distribution network method and device, computer equipment and storage medium | |
| CN114519360B (en) | Data read-write method, login method and device of service system and computer equipment | |
| TW202119789A (en) | Apparatus for adding data to blockchain, data verification apparatus, and data verification method | |
| US11210678B2 (en) | Component for provisioning security data and product including the same | |
| CN111586688B (en) | Method for generating and verifying identity based on environment perception | |
| CN118503942A (en) | Control method, device, equipment and storage medium of intelligent bracelet | |
| US20090002162A1 (en) | Computer theft deterrence technology | |
| TWI741413B (en) | Fingerprint encryption method, fingerprint encryption transmission method, decryption method and device, storage medium, terminal | |
| CN116305130A (en) | Dual-system intelligent switching method, system and medium based on system environment recognition | |
| CN112214776B (en) | Encryption and decryption method and device based on convolutional neural network |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant | ||
| PE01 | Entry into force of the registration of the contract for pledge of patent right | ||
| PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: A method, system, intelligent terminal, and storage medium for protecting electronic device areas Granted publication date: 20241029 Pledgee: Agricultural Bank of China Limited Lishui Branch Pledgor: LISHUI BOYUAN TECHNOLOGY Co.,Ltd. Registration number: Y2024980058577 |