Permission authorization method and device based on machine identification code

A machine identification and identification code technology, applied in computer security devices, instruments, program/content distribution protection, etc., can solve problems such as unrealistic implementation, high cost, and complicated login services.

Pending Publication Date: 2020-11-03
INFORMATION2 SOFTWARE SHANGHAI
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method must first require an online connection to obtain functional permissions through the login account. Secondly, the login service is more complicated to implement. For small and medium-sized companies, it is unrealistic due to the high cost.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission authorization method and device based on machine identification code
  • Permission authorization method and device based on machine identification code
  • Permission authorization method and device based on machine identification code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0065] Figure 4 It is the process of generating the machine identification code in the embodiment of the present invention. Such as Figure 4 As shown, in this embodiment, the generation process of the machine identification code includes the following steps:

[0066] The first step is to obtain the registry of the host to be authorized, and check whether the registry has added MAC address encryption string information. If it exists, obtain the value of the MAC address encryption string information as the MAC address part of the machine identification code. If it does not exist , then reacquire the MAC address of the host to be authorized, encrypt it into a string, and add it to the registry;

[0067] The second step is to obtain the value of the system serial number (the SN number is marked in the figure) of the host computer to be authorized;

[0068] The third step is to obtain the system UUID number of the host to be authorized;

[0069] The fourth step is to concaten...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a permission authorization method and device based on a machine identification code, and the method comprises the following steps: S1, obtaining a physical address, a system serial number and a system UUID number of a to-be-authorized host, and generating the machine identification code; S2, adding the generated machine identification code as a necessary element into an authorization file of to-be-authorized software, and encrypting the authorization file according to a preset encryption algorithm; and S3, in the authorization process, obtaining a physical address, a system serial number and a system UUID number of the to-be-verified host, generating a to-be-verified identification code, obtaining an authorization file, comparing the to-be-verified identification code with the machine identification code in each authorization file, and performing authorization permission according to a comparison result.

Description

technical field [0001] The invention relates to the technical field of computer software license authorization, in particular to a machine identification code-based license authorization method and device. Background technique [0002] Because software products are easy to copy, spread, and piracy, etc., it is generally necessary to protect the use of software products through authorization. [0003] At present, there are two main methods of licensing software functions: license code licensing and account login: [0004] 1. License code authorization refers to the completion of function license authorization by entering the license code during the software installation process. However, this method has defects such as the license is easy to be stolen, easily reused, and easily cracked; [0005] 2. Login account authorization refers to the process of registering an account, purchasing permissions, and logging into the account on the user side to obtain authorized functions....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12
CPCG06F21/121G06F21/1011
Inventor 贾鑫鑫陈勇铨朱黎娟龚欢
Owner INFORMATION2 SOFTWARE SHANGHAI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products