Movatterモバイル変換


[0]ホーム

URL:


CN115114592A - A device authorization method and system based on hardware number and time stamp - Google Patents

A device authorization method and system based on hardware number and time stamp
Download PDF

Info

Publication number
CN115114592A
CN115114592ACN202210737581.1ACN202210737581ACN115114592ACN 115114592 ACN115114592 ACN 115114592ACN 202210737581 ACN202210737581 ACN 202210737581ACN 115114592 ACN115114592 ACN 115114592A
Authority
CN
China
Prior art keywords
authorization
sub
serial number
code
codes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210737581.1A
Other languages
Chinese (zh)
Inventor
刘庆林
杨晨
刘正伟
魏海宇
谢辉
安恩庆
刘刚
李小琼
康柏荣
王鲲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zorelworld Information Technology Co ltd
Original Assignee
Beijing Zorelworld Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zorelworld Information Technology Co ltdfiledCriticalBeijing Zorelworld Information Technology Co ltd
Priority to CN202210737581.1ApriorityCriticalpatent/CN115114592A/en
Publication of CN115114592ApublicationCriticalpatent/CN115114592A/en
Pendinglegal-statusCriticalCurrent

Links

Images

Classifications

Landscapes

Abstract

The application discloses a device authorization method and system based on hardware numbers and timestamps. Firstly, acquiring a target equipment number through a target equipment management platform, and generating an equipment serial number through the target equipment number; generating an initial authorization code based on the device serial number; finally, the initial authorization code is equally divided into a plurality of groups of sub-authorization codes, and the plurality of groups of sub-authorization codes are encrypted to obtain a target authorization code; the encrypting the multiple groups of sub-authorization codes comprises setting a custom seed as an encryption key to encrypt a first group of sub-authorization codes, and encrypting a next group of sub-authorization codes based on an encryption result of a previous group of sub-authorization codes. The method avoids abuse of authorization codes based on hardware numbers and realizes one machine and one code; the hardware number and other authorization information are encrypted through a custom algorithm, and a signature is generated, so that the authorization code is prevented from being cracked.

Description

Translated fromChinese
一种基于硬件编号和时间戳的设备授权方法及系统A device authorization method and system based on hardware number and time stamp

技术领域technical field

本发明涉及硬件安全领域,特别涉及一种基于硬件编号和时间戳的设备授权方法及系统。The invention relates to the field of hardware security, in particular to a device authorization method and system based on hardware number and time stamp.

背景技术Background technique

随着经济的发展,中小型企业不断增多,很多企业都拥有自己的商业化产品。商业化产品需要进行授权才能继续使用,是目前保证企业利益的有效手段。With the development of the economy, the number of small and medium-sized enterprises continues to increase, and many enterprises have their own commercial products. Commercial products require authorization before they can continue to be used, which is an effective means to ensure the interests of enterprises at present.

目前市面上授权方式大致分为三种:联网类软件产品的会员制、非联网类软件产品的授权码以及设备交付性产品的授权文件At present, the authorization methods on the market are roughly divided into three types: membership system for networking software products, authorization codes for non-networking software products, and authorization documents for equipment-delivered products

会员制产品多依赖于网络,授权信息存储在服务端,离线环境下无法继续使用。Membership products mostly rely on the network, and the authorization information is stored on the server, which cannot be used in an offline environment.

以授权码方式进行授权的商用软件产品,因为无法和设备完全绑定,往往存在“一码多用”的情况,很容易被盗用,所以现在网上可以搜到各类软件产品的激活码。Commercial software products that are authorized by means of authorization codes cannot be completely bound to the device, so there is often a situation of "multiple use of one code", which is easy to be stolen. Therefore, activation codes for various software products can now be found on the Internet.

对于大型的设备交付性产品,因为交付的是设备,所以可以有效的和设备绑定,但多采用授权文件的方式进行授权,对于一些重视安全防控的企业来说,授权文件的上传需要经历多次拷贝,甚至需要上级审批,流程繁琐,耗费时间。For large-scale equipment delivery products, because the equipment is delivered, it can be effectively bound to the equipment, but authorization is usually performed by means of authorization files. For some enterprises that attach importance to security prevention and control, the uploading of authorization files requires experience Multiple copies, even need approval from superiors, the process is cumbersome and time-consuming.

发明内容SUMMARY OF THE INVENTION

基于此,本申请实施例提供了一种基于硬件编号和时间戳的设备授权方法及系统,能够通过简单授权码可以大大减少授权工作量,并且不容易被破解。Based on this, the embodiments of the present application provide a device authorization method and system based on a hardware number and a timestamp, which can greatly reduce the authorization workload through a simple authorization code, and is not easy to be cracked.

第一方面,提供了一种基于硬件编号和时间戳的设备授权方法,该方法包括:In a first aspect, a device authorization method based on a hardware number and a time stamp is provided, the method comprising:

通过目标设备管理平台获取目标设备编号,并通过所述目标设备编号生成设备序列号;Obtain the target device number through the target device management platform, and generate a device serial number through the target device number;

基于所述设备序列号生成初始授权码;其中,所述初始授权码还包括授权类型信息、授权时间信息、签名信息以及数据校验码信息;Generate an initial authorization code based on the device serial number; wherein, the initial authorization code further includes authorization type information, authorization time information, signature information, and data verification code information;

将所述初始授权码等分为多组子授权码,并对所述多组子授权码进行加密的目标授权码;其中,对所述多组子授权码进行加密包括设置自定义种子作为加密密钥对第一组子授权码进行加密,并基于前一组子授权码的加密结果对后一组子授权码进行加密。The initial authorization code is equally divided into multiple groups of sub-authorization codes, and the target authorization codes for encrypting the multiple groups of sub-authorization codes; wherein, encrypting the multiple groups of sub-authorization codes includes setting a custom seed as encryption The key encrypts the first group of sub-authorization codes, and encrypts the latter group of sub-authorization codes based on the encryption result of the former group of sub-authorization codes.

可选地,该方法还包括:Optionally, the method further includes:

基于所述目标授权码对目标设备进行授权,并通过后台校验目标授权码;并对目标设备的授权结果进行反馈。The target device is authorized based on the target authorization code, and the target authorization code is verified through the background; and the authorization result of the target device is fed back.

可选地,目标设备编号包括目标设备网卡MAC地址、主板序列号、CPU序列号以及磁盘序列号。Optionally, the target device number includes the target device network card MAC address, mainboard serial number, CPU serial number, and disk serial number.

可选地,通过所述目标设备编号生成设备序列号,包括:Optionally, generating a device serial number by using the target device number, including:

将目标设备网卡MAC地址、主板序列号、CPU序列号以及磁盘序列号组合通过预设规则生成设备序列号。The device serial number is generated by combining the target device network card MAC address, motherboard serial number, CPU serial number and disk serial number through preset rules.

可选地,所述基于所述设备序列号生成初始授权码,还包括:Optionally, the generating an initial authorization code based on the device serial number further includes:

将时间戳前两位数字按16进制转换为字母,所述时间戳至少包括授权类型和授权时间。Convert the first two digits of the timestamp into letters in hexadecimal, where the timestamp includes at least the authorization type and the authorization time.

可选地,所述基于所述设备序列号生成初始授权码,还包括:Optionally, the generating an initial authorization code based on the device serial number further includes:

在生成初始授权码之后,逐位按自定义映射表进行匹配翻译成字母。After the initial authorization code is generated, a digit-by-digit match against a custom mapping table is translated into letters.

第二方面,提供了一种基于硬件编号和时间戳的设备授权系统,该系统包括:In a second aspect, a device authorization system based on hardware number and time stamp is provided, and the system includes:

获取模块,用于通过目标设备管理平台获取目标设备编号,并通过所述目标设备编号生成设备序列号;an acquisition module, used for acquiring the target device number through the target device management platform, and generating a device serial number through the target device number;

生成模块,用于基于所述设备序列号生成初始授权码;其中,所述初始授权码还包括授权类型信息、授权时间信息、签名信息以及数据校验码信息;A generating module, configured to generate an initial authorization code based on the device serial number; wherein, the initial authorization code also includes authorization type information, authorization time information, signature information and data verification code information;

加密模块,用于将所述初始授权码等分为多组子授权码,并对所述多组子授权码进行加密的目标授权码;其中,对所述多组子授权码进行加密包括设置自定义种子作为加密密钥对第一组子授权码进行加密,并基于前一组子授权码的加密结果对后一组子授权码进行加密。An encryption module, used to equally divide the initial authorization code into multiple groups of sub-authorization codes, and encrypt the target authorization codes of the multiple groups of sub-authorization codes; wherein, encrypting the multiple groups of sub-authorization codes includes setting The user-defined seed is used as an encryption key to encrypt the first group of sub-authorization codes, and the latter group of sub-authorization codes is encrypted based on the encryption result of the former group of sub-authorization codes.

可选地,该系统还包括:Optionally, the system also includes:

校验模块,用于基于所述目标授权码对目标设备进行授权,并通过后台校验目标授权码;并对目标设备的授权结果进行反馈。The verification module is used for authorizing the target device based on the target authorization code, and verifying the target authorization code through the background; and feeding back the authorization result of the target device.

本申请实施例提供的技术方案中首先通过目标设备管理平台获取目标设备编号,并通过目标设备编号生成设备序列号;基于设备序列号生成初始授权码;最后将初始授权码等分为多组子授权码,并对多组子授权码进行加密的目标授权码;其中,对多组子授权码进行加密包括设置自定义种子作为加密密钥对第一组子授权码进行加密,并基于前一组子授权码的加密结果对后一组子授权码进行加密。可以看出本发明基于设备硬件编号的唯一性的有益效果在于:In the technical solutions provided by the embodiments of the present application, the target device number is first obtained through the target device management platform, and the device serial number is generated through the target device number; the initial authorization code is generated based on the device serial number; and finally the initial authorization code is divided into multiple groups. The authorization code and the target authorization code for encrypting multiple groups of sub-authorization codes; wherein, encrypting the multiple groups of sub-authorization codes includes setting a custom seed as an encryption key to encrypt the first group of sub-authorization codes, and encrypting the first group of sub-authorization codes based on the previous The encryption result of the group sub-authorization code encrypts the latter group of sub-authorization codes. It can be seen that the beneficial effects of the present invention based on the uniqueness of the device hardware number are:

基于硬件编号避免了授权码的滥用,实现一机一码;通过自定义算法将硬件编号和其它授权信息进行加密,并生成签名,避免授权码被破解。通过自定义算法将加密后的授权信息和签名进行转换,保证授权码的可读性,方便运维人员直接输入,避免传统生成授权文件的方式需要刻录拷贝的繁琐。Based on the hardware number, the abuse of the authorization code is avoided, and one code for one machine is realized; the hardware number and other authorization information are encrypted through a custom algorithm, and a signature is generated to prevent the authorization code from being cracked. The encrypted authorization information and signature are converted through a custom algorithm to ensure the readability of the authorization code, which is convenient for operation and maintenance personnel to directly input, and avoids the tediousness of burning and copying the traditional way of generating authorization files.

附图说明Description of drawings

为了更清楚地说明本发明的实施方式或现有技术中的技术方案,下面将对实施方式或现有技术描述中所需要使用的附图作简单地介绍。显而易见地,下面描述中的附图仅仅是示例性的,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据提供的附图引伸获得其它的实施附图。In order to illustrate the embodiments of the present invention or the technical solutions in the prior art more clearly, the following briefly introduces the accompanying drawings that are required to be used in the description of the embodiments or the prior art. Obviously, the drawings in the following description are only exemplary, and for those of ordinary skill in the art, other implementation drawings can also be obtained according to the extension of the drawings provided without creative efforts.

图1为本申请实施例提供的一种基于硬件编号和时间戳的设备授权步骤流程图;1 is a flowchart of a device authorization step based on a hardware number and a timestamp provided by an embodiment of the present application;

图2为本申请可选的一种实施例提供的设备授权流程图;FIG. 2 is a flow chart of device authorization provided by an optional embodiment of the present application;

图3为本申请实施例提供的一种基于硬件编号和时间戳的设备授权系统框图。FIG. 3 is a block diagram of a device authorization system based on a hardware number and a time stamp according to an embodiment of the present application.

具体实施方式Detailed ways

为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。In order to make the purpose, technical solutions and advantages of the present application more clearly understood, the present application will be described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present application, but not to limit the present application.

在本发明的描述中,术语“包括”、“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包括了一系列步骤或单元的过程、方法、系统、产品或设备不必限于已明确列出的那些步骤或单元,而是还可包含虽然并未明确列出的但对于这些过程、方法、产品或设备固有的其它步骤或单元,或者基于本发明构思进一步的优化方案所增加的步骤或单元。In the description of the present invention, the terms "comprising", "having" and any variations thereof are intended to cover non-exclusive inclusion, for example, a process, method, system, product or device comprising a series of steps or units is not necessarily limited to Those steps or units that have been explicitly listed may also include other steps or units that are not explicitly listed but are inherent to these processes, methods, products or devices, or are added based on further optimization schemes of the present invention. steps or units.

本授权方法的目的是提供一种方便企业运维人员对设备进行授权和延期授权的方式。同时对于设备提供方,保证了授权码的安全性和唯一性,保证授权码不被篡改,在其它设备不被复用。具体地,请参考图1,其示出了本申请实施例提供的一种基于硬件编号和时间戳的设备授权方法的流程图,该方法可以包括以下步骤:The purpose of this authorization method is to provide a convenient way for enterprise operation and maintenance personnel to authorize and extend authorization for devices. At the same time, for the device provider, the security and uniqueness of the authorization code are guaranteed, and the authorization code is not tampered with or reused in other devices. Specifically, please refer to FIG. 1, which shows a flowchart of a device authorization method based on a hardware number and a time stamp provided by an embodiment of the present application. The method may include the following steps:

步骤101,通过目标设备管理平台获取目标设备编号,并通过目标设备编号生成设备序列号。Instep 101, the target device number is obtained through the target device management platform, and the device serial number is generated by using the target device number.

在本申请实施例中,步骤101主要是基于硬件编号生成唯一序列号,具体地获取设备网卡MAC地址、主板序列号、CPU序列号、磁盘序列号,组合并打乱顺序,通过自定义算法生成设备序列号,在本申请实施例中设备序列号为10位的数字。In the embodiment of the present application,step 101 is mainly to generate a unique serial number based on the hardware number, and specifically to obtain the MAC address of the device network card, the serial number of the main board, the serial number of the CPU, and the serial number of the disk, combine and shuffle the order, and generate through a custom algorithm The device serial number, in this embodiment of the present application, the device serial number is a 10-digit number.

步骤102,基于设备序列号生成初始授权码。Step 102, generating an initial authorization code based on the device serial number.

其中,初始授权码还包括授权类型信息、授权时间信息、签名信息以及数据校验码信息,可以将以上信息放在25位的授权码中,要保证其可读性,不能为纯数字,其中,20位数字表示授权类型信息、授权时间信息、签名信息,5位数字表示数据校验码信息。Among them, the initial authorization code also includes authorization type information, authorization time information, signature information and data verification code information. The above information can be placed in a 25-digit authorization code. To ensure its readability, it cannot be a pure number. , 20 digits represent authorization type information, authorization time information, signature information, and 5 digits represent data check code information.

在本申请可选的一种实施例,可以将时间戳前两位按16进制转换为字母,增加解密复杂度,压缩授权码空间。In an optional embodiment of the present application, the first two digits of the timestamp may be converted into letters in hexadecimal to increase the decryption complexity and compress the authorization code space.

具体地:时间戳前两位,因为时间戳前两位目前都是16开头,比如2022年5月15日对应的时间戳为1652590000,则前两位为“16”,假设自定义映射表“16”对应的F,则直接可用F表示,这样2压缩了1位可以去做授权类型。Specifically: the first two digits of the timestamp, because the first two digits of the timestamp currently start with 16, for example, the timestamp corresponding to May 15, 2022 is 1652590000, then the first two digits are "16", assuming a custom mapping table " The F corresponding to 16" can be directly represented by F, so that 2 compressed 1 bit can be used as the authorization type.

例如:E.g:

时间戳:1652590000Timestamp: 1652590000

机器码:1025965741Machine code: 1025965741

授权类型:时间授权=1Grant Type: Time Grant=1

按顺序拼接则为165259000010259657411,Splicing in order is 165259000010259657411,

以上21位的数字,数据部分就超出了预期,所以结合时间戳的特征,对其前两位进行了压缩,真实参与加密的是F5259000010259657411。其中,16位真实映射的值是根据种子进行变化的,不同的种子,生成的值不一致。另外,这也是后续将授权码进一步压缩为20位甚至10位进行优化的一个思路。For the above 21-digit numbers, the data part is beyond expectations, so combined with the characteristics of the timestamp, the first two digits are compressed, and the actual encryption is F5259000010259657411. Among them, the value of the 16-bit real mapping is changed according to the seed, and the generated values are inconsistent with different seeds. In addition, this is also an idea to further compress the authorization code into 20 or even 10 digits for optimization.

在本申请可选的一种实施例,包括自定义映射表,将需要授权的信息拼接后,逐位按映射表进行匹配翻译,避免纯数字的情况。In an optional embodiment of the present application, a custom mapping table is included. After splicing the information that needs to be authorized, matching and translation are performed bit by bit according to the mapping table, so as to avoid the situation of pure numbers.

步骤103,将初始授权码等分为多组子授权码,并对多组子授权码进行加密的目标授权码。Step 103 , equally divide the initial authorization code into multiple groups of sub-authorization codes, and encrypt the target authorization codes for the multiple groups of sub-authorization codes.

其中,对多组子授权码进行加密包括设置自定义种子作为加密密钥对第一组子授权码进行加密,并基于前一组子授权码的加密结果对后一组子授权码进行加密。Wherein, encrypting multiple groups of sub-authorization codes includes setting a custom seed as an encryption key to encrypt the first group of sub-authorization codes, and encrypting the latter group of sub-authorization codes based on the encryption result of the former group of sub-authorization codes.

在本申请实施例中,将初始授权码等分为多组子授权码,即将将初始拼接生成的授权码拆分为5部分,其中,第一部分以自定义种子为加密密钥,其余每一块数据使用上一块加密的结果作为加密密钥,相当于5块数据分别使用了5种不同的加密密钥。In the embodiment of the present application, the initial authorization code is divided into multiple groups of sub-authorization codes, that is, the authorization code generated by initial splicing is divided into 5 parts, wherein the first part uses the custom seed as the encryption key, and each other The data uses the result of the previous block of encryption as the encryption key, which is equivalent to using 5 different encryption keys for each of the 5 blocks of data.

例如,格式可以为XXXXX-BBBBB-CCCCC-DDDDD-AAAAA,这种格式也是为了方便授权人员去观察和输入的。For example, the format can be XXXXX-BBBBB-CCCCC-DDDDD-AAAAA, which is also for the convenience of authorized personnel to observe and input.

在本申请实施例中,在步骤103之后还包括:In this embodiment of the present application, afterstep 103, it further includes:

基于所述目标授权码对目标设备进行授权,并通过后台校验目标授权码;并对目标设备的授权结果进行反馈。The target device is authorized based on the target authorization code, and the target authorization code is verified through the background; and the authorization result of the target device is fed back.

授权码的20位作为数据部分,5位为数据校验部分。且数据部分和校验码部分,再增加一层加密处理。修改授权码的任何一位,都会导致校验失败;且保证了生成授权码时,任何有效信息的细微调整(如时间戳增加1秒),生成的授权码发生巨大差异,使破解时无规律可循。The 20 digits of the authorization code are used as the data part, and the 5 digits are used as the data verification part. And the data part and the check code part, an additional layer of encryption processing is added. Modifying any bit of the authorization code will cause the verification to fail; and it is guaranteed that when the authorization code is generated, any slight adjustment of any valid information (such as adding 1 second to the timestamp) will result in a huge difference in the generated authorization code, making the cracking irregular. Followable.

如图2,给出了利用本方法的授权整体流程,本授权方法基于10位的数字设备序列号,以及时间戳,可对厂商设备中运行的软件进行时间授权。具体包括:Figure 2 shows the overall authorization flow using this method. Based on the 10-digit serial number of the digital device and the time stamp, the authorization method can perform time authorization on the software running in the manufacturer's equipment. Specifically include:

(1)设备上架,运维访问管理平台获取机器码;(1) The equipment is put on the shelf, and the operation and maintenance access management platform to obtain the machine code;

(2)向厂商提供机器码;(2) Provide the machine code to the manufacturer;

(3)厂商根据授权算法生成25位授权码,并给到运维人员;(3) The manufacturer generates a 25-digit authorization code according to the authorization algorithm and gives it to the operation and maintenance personnel;

(4)运维人员手动输入授权码,进行授权;(4) The operation and maintenance personnel manually enter the authorization code to authorize;

(5)管理平台后台程序校验授权码合法性和有效性,并反馈授权结果。(5) The background program of the management platform verifies the legality and validity of the authorization code, and feeds back the authorization result.

如图3,本申请实施例还提供的一种基于硬件编号和时间戳的设备授权系统200。该系统200包括:As shown in FIG. 3 , an embodiment of the present application further provides adevice authorization system 200 based on a hardware number and a time stamp. Thesystem 200 includes:

获取模块201,用于通过目标设备管理平台获取目标设备编号,并通过目标设备编号生成设备序列号;The obtainingmodule 201 is used for obtaining the target device number through the target device management platform, and generating the device serial number through the target device number;

生成模块202,用于基于设备序列号生成初始授权码;其中,初始授权码还包括授权类型信息、授权时间信息、签名信息以及数据校验码信息;Thegenerating module 202 is used to generate an initial authorization code based on the device serial number; wherein, the initial authorization code also includes authorization type information, authorization time information, signature information and data verification code information;

加密模块203,用于将初始授权码等分为多组子授权码,并对多组子授权码进行加密的目标授权码;其中,对多组子授权码进行加密包括设置自定义种子作为加密密钥对第一组子授权码进行加密,并基于前一组子授权码的加密结果对后一组子授权码进行加密。Theencryption module 203 is used to equally divide the initial authorization code into multiple groups of sub-authorization codes, and encrypt the target authorization codes of the multiple groups of sub-authorization codes; wherein, encrypting the multiple groups of sub-authorization codes includes setting a custom seed as the encryption The key encrypts the first group of sub-authorization codes, and encrypts the latter group of sub-authorization codes based on the encryption result of the former group of sub-authorization codes.

在本申请一个可选的实施例中,系统200还包括:In an optional embodiment of the present application, thesystem 200 further includes:

校验模块204,用于基于目标授权码对目标设备进行授权,并通过后台校验目标授权码;并对目标设备的授权结果进行反馈。The verification module 204 is configured to authorize the target device based on the target authorization code, verify the target authorization code through the background, and feed back the authorization result of the target device.

本申请实施例提供的基于硬件编号和时间戳的设备授权系统用于实现上述基于硬件编号和时间戳的设备授权方法,关于基于硬件编号和时间戳的设备授权系统的具体限定可以参见上文中对于基于硬件编号和时间戳的设备授权方法的限定,在此不再赘述。上述基于硬件编号和时间戳的设备授权系统中的各个部分可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于设备中的处理器中,也可以以软件形式存储于设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。The device authorization system based on hardware number and time stamp provided in the embodiment of the present application is used to implement the above-mentioned device authorization method based on hardware number and time stamp. For the specific limitations of the device authorization system based on hardware number and time stamp, see the above for The limitation of the device authorization method based on the hardware number and time stamp will not be repeated here. Each part of the above-mentioned hardware number and time stamp-based device authorization system can be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in or independent of the processor in the device in the form of hardware, or may be stored in the memory in the device in the form of software, so that the processor can call and execute operations corresponding to the above modules.

以上所述实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。The technical features of the above-described embodiments can be combined arbitrarily. For the sake of brevity, all possible combinations of the technical features in the above-described embodiments are not described. However, as long as there is no contradiction between the combinations of these technical features, All should be regarded as the scope described in this specification.

以上所述实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对申请专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。The above-mentioned embodiments only represent several embodiments of the present application, and the descriptions thereof are relatively specific and detailed, but should not be construed as a limitation on the scope of the patent application. It should be pointed out that for those skilled in the art, without departing from the concept of the present application, several modifications and improvements can be made, which all belong to the protection scope of the present application. Therefore, the scope of protection of the patent of the present application shall be subject to the appended claims.

Claims (8)

Translated fromChinese
1.一种基于硬件编号和时间戳的设备授权方法,其特征在于,所述方法包括:1. a device authorization method based on hardware number and time stamp, is characterized in that, described method comprises:通过目标设备管理平台获取目标设备编号,并通过所述目标设备编号生成设备序列号;Obtain the target device number through the target device management platform, and generate a device serial number through the target device number;基于所述设备序列号生成初始授权码;其中,所述初始授权码还包括授权类型信息、授权时间信息、签名信息以及数据校验码信息;Generate an initial authorization code based on the device serial number; wherein, the initial authorization code further includes authorization type information, authorization time information, signature information, and data verification code information;将所述初始授权码等分为多组子授权码,并对所述多组子授权码进行加密的目标授权码;其中,对所述多组子授权码进行加密包括设置自定义种子作为加密密钥对第一组子授权码进行加密,并基于前一组子授权码的加密结果对后一组子授权码进行加密。The initial authorization code is equally divided into multiple groups of sub-authorization codes, and the target authorization codes for encrypting the multiple groups of sub-authorization codes; wherein, encrypting the multiple groups of sub-authorization codes includes setting a custom seed as encryption The key encrypts the first group of sub-authorization codes, and encrypts the latter group of sub-authorization codes based on the encryption result of the former group of sub-authorization codes.2.根据权利要求1所述的方法,其特征在于,所述方法还包括:2. The method according to claim 1, wherein the method further comprises:基于所述目标授权码对目标设备进行授权,并通过后台校验目标授权码;并对目标设备的授权结果进行反馈。The target device is authorized based on the target authorization code, and the target authorization code is verified through the background; and the authorization result of the target device is fed back.3.根据权利要求1所述的方法,其特征在于,所述目标设备编号包括目标设备网卡MAC地址、主板序列号、CPU序列号以及磁盘序列号。3 . The method according to claim 1 , wherein the target device number comprises a target device network card MAC address, a motherboard serial number, a CPU serial number and a disk serial number. 4 .4.根据权利要求2所述的方法,其特征在于,通过所述目标设备编号生成设备序列号,包括:4. The method according to claim 2, wherein generating a device serial number by the target device number, comprising:将目标设备网卡MAC地址、主板序列号、CPU序列号以及磁盘序列号组合通过预设规则生成设备序列号。The device serial number is generated by combining the target device network card MAC address, motherboard serial number, CPU serial number and disk serial number through preset rules.5.根据权利要求1所述的方法,其特征在于,所述基于所述设备序列号生成初始授权码,还包括:5. The method according to claim 1, wherein the generating an initial authorization code based on the device serial number further comprises:将时间戳前两位数字按16进制转换为字母,所述时间戳至少包括授权类型和授权时间。Convert the first two digits of the timestamp into letters in hexadecimal, where the timestamp includes at least the authorization type and the authorization time.6.根据权利要求1所述的方法,其特征在于,所述基于所述设备序列号生成初始授权码,还包括:6. The method according to claim 1, wherein the generating an initial authorization code based on the device serial number further comprises:在生成初始授权码之后,逐位按自定义映射表进行匹配翻译成字母。After the initial authorization code is generated, it is translated into letters by matching the custom mapping table bit by bit.7.一种基于硬件编号和时间戳的设备授权系统,其特征在于,所述系统包括:7. A device authorization system based on hardware number and time stamp, wherein the system comprises:获取模块,用于通过目标设备管理平台获取目标设备编号,并通过所述目标设备编号生成设备序列号;an acquisition module, used for acquiring the target device number through the target device management platform, and generating a device serial number through the target device number;生成模块,用于基于所述设备序列号生成初始授权码;其中,所述初始授权码还包括授权类型信息、授权时间信息、签名信息以及数据校验码信息;A generating module, configured to generate an initial authorization code based on the device serial number; wherein, the initial authorization code also includes authorization type information, authorization time information, signature information and data verification code information;加密模块,用于将所述初始授权码等分为多组子授权码,并对所述多组子授权码进行加密的目标授权码;其中,对所述多组子授权码进行加密包括设置自定义种子作为加密密钥对第一组子授权码进行加密,并基于前一组子授权码的加密结果对后一组子授权码进行加密。An encryption module, used to equally divide the initial authorization code into multiple groups of sub-authorization codes, and encrypt the target authorization codes of the multiple groups of sub-authorization codes; wherein, encrypting the multiple groups of sub-authorization codes includes setting The user-defined seed is used as an encryption key to encrypt the first group of sub-authorization codes, and the second group of sub-authorization codes is encrypted based on the encryption result of the former group of sub-authorization codes.8.根据权利要求7所述的系统,其特征在于,所述系统还包括:8. The system of claim 7, wherein the system further comprises:校验模块,用于基于所述目标授权码对目标设备进行授权,并通过后台校验目标授权码;并对目标设备的授权结果进行反馈。The verification module is used for authorizing the target device based on the target authorization code, and verifying the target authorization code through the background; and feeding back the authorization result of the target device.
CN202210737581.1A2022-06-272022-06-27 A device authorization method and system based on hardware number and time stampPendingCN115114592A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202210737581.1ACN115114592A (en)2022-06-272022-06-27 A device authorization method and system based on hardware number and time stamp

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202210737581.1ACN115114592A (en)2022-06-272022-06-27 A device authorization method and system based on hardware number and time stamp

Publications (1)

Publication NumberPublication Date
CN115114592Atrue CN115114592A (en)2022-09-27

Family

ID=83330622

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202210737581.1APendingCN115114592A (en)2022-06-272022-06-27 A device authorization method and system based on hardware number and time stamp

Country Status (1)

CountryLink
CN (1)CN115114592A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN108810894A (en)*2018-05-312018-11-13康键信息技术(深圳)有限公司Authorization terminal method, apparatus, computer equipment and storage medium
CN108848064A (en)*2018-05-242018-11-20武汉久乐科技有限公司authorization management method and system
CN111884812A (en)*2020-07-242020-11-03四川阵风科技有限公司Binding method and system of hardware equipment
CN112016082A (en)*2020-10-262020-12-01成都掌控者网络科技有限公司Authority list safety control method
CN112182550A (en)*2020-11-302021-01-05统信软件技术有限公司Authorization method, authorization system, activation device and computing equipment for application program
CN112486607A (en)*2020-11-202021-03-12湖南麒麟信安科技股份有限公司Virtual desktop authorization permission method based on combination of software and hardware
CN112635038A (en)*2020-12-242021-04-09赛诺联合医疗科技(北京)有限公司Activation method of PET-CT equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN108848064A (en)*2018-05-242018-11-20武汉久乐科技有限公司authorization management method and system
CN108810894A (en)*2018-05-312018-11-13康键信息技术(深圳)有限公司Authorization terminal method, apparatus, computer equipment and storage medium
CN111884812A (en)*2020-07-242020-11-03四川阵风科技有限公司Binding method and system of hardware equipment
CN112016082A (en)*2020-10-262020-12-01成都掌控者网络科技有限公司Authority list safety control method
CN112486607A (en)*2020-11-202021-03-12湖南麒麟信安科技股份有限公司Virtual desktop authorization permission method based on combination of software and hardware
CN112182550A (en)*2020-11-302021-01-05统信软件技术有限公司Authorization method, authorization system, activation device and computing equipment for application program
CN112635038A (en)*2020-12-242021-04-09赛诺联合医疗科技(北京)有限公司Activation method of PET-CT equipment

Similar Documents

PublicationPublication DateTitle
US11621842B2 (en)Origin certificate based online certificate issuance
US20230155821A1 (en)Secure shared key establishment for peer to peer communications
CN108023874B (en)Single sign-on verification device and method and computer readable storage medium
US8769637B2 (en)Iterated password hash systems and methods for preserving password entropy
US10997305B2 (en)Information processing device, information processing method, and distributed component
CN111538977B (en)Cloud API key management method, cloud platform access method, cloud API key management device, cloud platform access device and server
CN116318784B (en)Identity authentication method, identity authentication device, computer equipment and storage medium
CN115150109B (en)Authentication method, authentication device and related equipment
CN110365468A (en) Anonymization processing method, device, equipment and storage medium
CN108777619A (en)CPK systems based on mark and key management method, device, server and terminal
WO2023174350A1 (en)Identity authentication method, apparatus and device, and storage medium
CN116633533A (en)Key generation method, device and equipment for KMS (KMS) system key encryption
WO2025148510A1 (en)Authentication method based on dual quantum random number protection, client, and system
CN119025144A (en) Method, system, device and medium for securely upgrading trusted DCS card program
CN105868987A (en)Method and system for sharing information among devices
CN118972068A (en) Device certificate distribution method, system, computer device and readable storage medium
CN115114592A (en) A device authorization method and system based on hardware number and time stamp
CN118133243A (en)Authorization software offline verification method, device, equipment and storage medium
CN107612917B (en)Method for encrypting log storage by using 3DES encryption algorithm in cloud computing environment
CN114117374B (en) Authentication method, device, equipment and medium based on distributed system
CN114553566B (en)Data encryption method, device, equipment and storage medium
CN113572599B (en) Electric power data transmission method, data source equipment and data access equipment
CN115964763A (en)Multi-party data security calculation method and device, electronic equipment and storage medium
CN114238915A (en)Digital certificate adding method and device, computer equipment and storage medium
CN113285934A (en)Server cipher machine client IP detection method and device based on digital signature

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication
RJ01Rejection of invention patent application after publication

Application publication date:20220927


[8]ページ先頭

©2009-2025 Movatter.jp