CN116070178B - Software authorization method and system based on mobile terminal code scanning - Google Patents

Software authorization method and system based on mobile terminal code scanning Download PDF

Info

Publication number
CN116070178B
CN116070178B CN202310356802.5A CN202310356802A CN116070178B CN 116070178 B CN116070178 B CN 116070178B CN 202310356802 A CN202310356802 A CN 202310356802A CN 116070178 B CN116070178 B CN 116070178B
Authority
CN
China
Prior art keywords
authorization
code
software
machine
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310356802.5A
Other languages
Chinese (zh)
Other versions
CN116070178A (en
Inventor
申可欣
张云峰
刘倓斌
施海云
蒋春华
邓畅谈
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cashway Technology Co Ltd
Original Assignee
Cashway Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cashway Technology Co Ltd filed Critical Cashway Technology Co Ltd
Priority to CN202310356802.5A priority Critical patent/CN116070178B/en
Publication of CN116070178A publication Critical patent/CN116070178A/en
Application granted granted Critical
Publication of CN116070178B publication Critical patent/CN116070178B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a software authorization method and a system based on mobile terminal code scanning, wherein the method comprises the following steps: the server generates authorized two-dimension codes in batches; the application end generates and displays a machine fingerprint code; the mobile terminal scans the authorization two-dimensional code, performs front-end verification based on the machine fingerprint code, and initiates an authorization request to the server terminal if the front-end verification is successful; the server generates a machine authorization code according to the authorization request and sends the machine authorization code to the mobile terminal; the application end receives a machine authorization code displayed by the mobile end and input by a user; the application end locally generates a machine authorization code according to the locally generated machine fingerprint code and the locally pre-stored software identifier; the application end compares the locally generated machine authorization code with the received machine authorization code, and if the locally generated machine authorization code is consistent with the received machine authorization code, the authorization is successful. The method and the device have the advantages that software authorization is carried out in a code scanning mode of the mobile terminal, so that convenience in operation is improved, and the authorization cost of the software is reduced on the premise of ensuring safety.

Description

Software authorization method and system based on mobile terminal code scanning
Technical Field
The invention relates to the technical field of software copyright protection, in particular to a mobile terminal code scanning-based software authorization method and system.
Background
In recent years, financial terminal equipment is widely applied to various fields and places, such as financial self-service equipment, unmanned retail self-service equipment, subway high-speed rail self-service ticket purchasing terminals and the like, and software requirements on the equipment are quite rich, and software providers do not wish to use self-developed software by all without compensation, so that software authorization is generated. Traditional software authorization schemes are often carried out in a physical key authorization mode or in a manual copying mode; the former method increases the cost of manufacture and transportation of the key, while the latter method requires opening the U-mouth, increasing the safety risk of the device.
Disclosure of Invention
Based on the method, the software is authorized in a mobile terminal code scanning mode, so that the convenience of operation is improved, the software authorization cost is reduced on the premise of ensuring safety, and the scheme is suitable for all types of software authorization.
In a first aspect, this embodiment provides a software authorization method based on mobile terminal code scanning, where the method is applied to a software authorization system, and the system includes: the mobile terminal, the application terminal and the service terminal; the method comprises the following steps: step 1: the server generates authorized two-dimension codes in batches; step 2: the application end generates and displays a machine fingerprint code; step 3: the mobile terminal scans the authorization two-dimensional code, performs front-end verification based on the machine fingerprint code, and initiates an authorization request to the server terminal if the front-end verification is successful; step 4: the server generates a machine authorization code according to the authorization request and sends the machine authorization code to the mobile terminal; step 5: the application end receives a machine authorization code displayed by the mobile end and input by a user; step 6: the application end generates a machine authorization code locally according to the locally generated machine fingerprint code and a locally pre-stored software identifier; step 7: the application end compares the locally generated machine authorization code with the received machine authorization code, and if the locally generated machine authorization code is consistent with the received machine authorization code, the authorization is successful.
Further, step 1 includes: 1-1: the server receives client information and authorized quantity input by a worker and creates order information; 1-2: the server side automatically generates authorized two-dimension codes in batches according to the order information; each authorization two-dimensional code comprises order information, a software identifier, a manufacturer verification code and a two-dimensional code unique identifier; 1-3: and the server side generates an authorization file according to the authorization two-dimensional code, the manufacturer verification code and the order information.
Further, step 2 includes: 2-1: the application end starts for the first time and pops up a preliminary authorization interface; 2-2: generating a summary value according to the unique terminal identifier and the software identifier; 2-3: performing encryption operation on the abstract value to generate a machine fingerprint code; 2-4: and displaying the machine fingerprint code on an authorization interface of the application end.
Further, step 3 includes: 3-1: the user scans any one of the authorized two-dimension codes generated in batch by the server in the step 1 by using the mobile terminal, and initiates an acquisition request to a web page program linked with the scanned authorized two-dimension codes, wherein the web page program is stored in the server in advance and comprises a decryption subprogram, a software identifier confirmed by the server in the step 1 and a manufacturer verification code; 3-2: after the web page program receives the acquisition request, a form is sent back to the mobile terminal, so that a user fills in a manufacturer verification code displayed on the pdf file and a machine fingerprint code displayed on an application terminal authorization interface in the form; 3-3: the mobile terminal decrypts the machine fingerprint code filled in the step 3-2 by the user based on the decryption subprogram so as to obtain a software identifier; 3-4: the mobile terminal respectively compares the software identifier obtained by decryption in the step 3-3 and the manufacturer verification code obtained in the step 3-2 with the software identifier and the manufacturer verification code in the authorized two-dimensional code obtained in the step 3-1, and if the two are respectively compared consistently, the front end verification is successful; 3-5: if the front end verification is successful, the mobile terminal initiates an authorization request to the server, wherein the authorization request comprises a machine fingerprint code and a manufacturer verification code which are successfully verified by the front end.
Further, step 4 includes: 4-1: the server checks the machine fingerprint code, the manufacturer verification code and the software identifier in the authorization request; 4-2: if the verification is successful and the current software is not authorized, performing abstract operation on the machine fingerprint code and the software identifier in the authorization request to generate a machine authorization code; 4-3: and sending and displaying the machine authorization code on the mobile terminal.
Further, step 4-1: comprising the following steps: 4-1-1: decrypting the machine fingerprint code in the authorization request to obtain a software identifier; 4-1-2: and (3) comparing the manufacturer verification code in the authorization request and the software identifier decrypted in the step 4-1-1 with the local original manufacturer verification code and the original software identifier respectively, and if the manufacturer verification code and the original software identifier are consistent, checking successfully.
Further, step 7 includes: and (3) comparing the machine authorization code of the application end in the step (6) with the machine authorization code filled in the application end by the user in the step (5), and if the machine authorization code is consistent with the machine authorization code, enabling the user to normally use the soft at the application end.
In a second aspect, this embodiment provides a software authorization system based on mobile terminal code scanning, where the software authorization system is configured to execute the software authorization method described above, and the software authorization system includes: the system comprises a mobile terminal, a service terminal and an application terminal, wherein software to be authorized is installed on the application terminal.
The embodiment of the invention has the following beneficial effects: the mobile terminal scans the two-dimension code for authorization, so that the convenience of operation is improved, and the authorization cost of software is reduced on the premise of ensuring safety.
Additional features and advantages of the invention will be set forth in the description which follows, or in part will be obvious from the description, or may be learned by practice of the invention.
In order to make the above objects, features and advantages of the present invention more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are needed in the description of the embodiments or the prior art will be briefly described, and it is obvious that the drawings in the description below are some embodiments of the present invention, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of an authorization file portion including an authorization two-dimensional code according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of an authorization interface for displaying machine fingerprint codes according to an embodiment of the present invention;
fig. 3 is an interface schematic diagram of a mobile terminal according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention. The components of the embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the invention, as presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1
The embodiment provides a software authorization method based on mobile terminal code scanning, which is applied to a software authorization system, wherein the software authorization system comprises: the server side, the mobile side and the application side are three-terminal; the software to be authorized is installed on the application end.
The terms referred to in this application:
authorizing a two-dimensional code: the method comprises the steps of including order information, a software identifier, a manufacturer verification code and a two-dimension code unique identifier, wherein the form is a square two-dimension code, and the square two-dimension code is posted on a shell of a terminal where an application end is located; is generated by the server.
Machine fingerprint code: a group of letters, numbers and special characters obtained after encryption and summarization of the unique terminal identifier and the software identifier are displayed on a screen of the terminal where the application end is located; generated by the application end.
Machine authorization code: a group of letters, numbers and special characters after encryption and abstract processing are carried out on the machine fingerprint code and the software identifier, and the letters, the numbers and the special characters are displayed on a screen of a mobile terminal; the application end and the service end can both generate and the application end performs verification.
The method adopts a mode of interconnection of three ends of a server, a mobile end and an application end to carry out software authorization, and the core technology is the software authorization carried out by checking whether a machine authorization code is correct or not, and the method comprises the following steps:
step 1: and the server generates authorized two-dimension codes in batches.
The step 1 comprises the following steps:
1-1) the server receives the client information and the authorized amount input by the staff and creates order information.
Specifically, the above staff may be: a responsible person of the company A purchasing the software copyright; the customer information may be: company a name, contact, phone number, mailbox, etc.; the order information may be: company a name, vendor identification code, order type, order placement, authorization quantity, time, etc.
1-2) the server automatically generates authorized two-dimension codes in batches according to order information; each authorized two-dimensional code comprises order information, a software identifier, a manufacturer verification code and a two-dimensional code unique identifier.
Specifically, the unique identifier of the two-dimensional code is a character string formed by combining the software identifier, the ordering time and the random number.
Specifically, the software identifier is a character string capable of identifying the software, has uniqueness, is used for preventing authorization two-dimensional code invalidation caused by disordered transmission, error transmission and disordered use of the software user B, and is also used for counting the software authorization quantity by the server side.
Specifically, the manufacturer verification code refers to a character string capable of identifying the manufacturer, requires the uniqueness of the identification, is used for verifying the basis during use authorization, prevents authorization failure caused by the use of the two-dimensional code by other manufacturers, and is also used for counting the application and the use quantity of the manufacturer authorization by a server; or, the manufacturer verification code is also printed on the authorized two-dimensional code in a mode of covering a layer.
1-3) the server side generates an authorization file according to the authorization two-dimensional code, the manufacturer verification code and the order information.
After the server side generates the authorized two-dimension code, a worker can download an authorized file containing the authorized two-dimension code, the manufacturer verification code and order information, print the authorized file and paste the authorized file onto a terminal (namely, a shell of the terminal bearing the application side).
Specifically, the authorization file may be a pdf file, as shown in fig. 1 (fig. 1 only shows the upper half of the pdf file, and the lower part of the pdf file has a corresponding number of authorized two-dimensional codes, and a digital two-dimensional code unique identifier is further marked below each authorized two-dimensional code). In particular, the terminal may be, but is not limited to, a financial terminal device, a self-service terminal. The authorization two-dimensional code is static and unchanged, is pasted on the terminal machine after printing, and the authorization number of the step 1-1) is several, so that several authorization two-dimensional codes can be obtained. Each authorization two-dimensional code has a unique identifier, and each authorization two-dimensional code can only authorize one application terminal device, and is not limited to which application terminal device.
Step 2: the application end generates and displays the machine fingerprint code.
Specifically, the application end may be provided on a terminal device of a bank hall. Each application end generally has only one unique machine fingerprint code for a whole life; specifically, if the software is permanently authorized to use, the machine fingerprint code is never changed for the terminal equipment of the same application terminal; if it is a deadly grant, the machine fingerprint code will change after expiration.
The step 2 comprises the following steps:
2-1) the application end starts for the first time and pops up a preliminary authorization interface.
Specifically, this is the first time the authorization interface is popped up.
2-2) the application end generates a summary value according to the unique terminal identifier and the software identifier.
Specifically, the unique identifier of the terminal may be a serial number of the hard disk, or other information capable of identifying the terminal. The algorithm for calculating the digest can be an HMAC algorithm or an SHA, MD5, SM3 or other digest algorithm for interception.
2-3) carrying out encryption operation on the digest value to generate a machine fingerprint code.
Specifically, the encryption algorithm may use international algorithms such as DES, 3DES, RSA, etc., national encryption algorithms such as SM4, SM2, etc., or other symmetric or asymmetric encryption algorithms.
2-4) the application displays the machine fingerprint code on an authorization interface of the application.
Specifically, an authorization interface displaying machine fingerprint codes is shown in fig. 2. Here, the machine fingerprint code is a number of bits+a letter+a special character.
Step 3: the mobile terminal scans the authorization two-dimensional code, performs front-end verification based on the machine fingerprint code, and initiates an authorization request to the server terminal if the front-end verification is successful.
The step 3 comprises the following steps:
3-1) the user scans any one of the authorized two-dimension codes generated in batch by the server in the step 1 by using the mobile terminal, so as to initiate an acquisition request to a web page program linked with the scanned authorized two-dimension codes, wherein the web page program is pre-stored in the server and comprises a decryption subprogram, a software identifier confirmed by the server in the step 1 and a manufacturer verification code.
Specifically, in the process of scanning the authorized two-dimensional code by the mobile terminal, the web page program can acquire the 3 kinds of information through an acquisition request of the mobile terminal, and then the 3 kinds of information are sent to the mobile terminal.
In particular, the above-mentioned acquisition request may be a request in the form of http.
Specifically, the user may be the software actual user B. The mobile terminal may be a mobile phone, an IPAD, etc.
3-2) after the web page program receives the acquisition request, sending back a form to the mobile terminal so that the user fills in the manufacturer verification code displayed on the pdf file and the machine fingerprint code displayed on the application terminal authorization interface in the form.
Specifically, the form interface received by the mobile terminal is shown in fig. 3. The machine fingerprint code may be in the form of numbers + letters + special characters, etc. The manufacturer number of fig. 3, the manufacturer verification code, may be an 8-digit number.
3-3) the mobile terminal decrypts the machine fingerprint code filled in by the user in 3-2) based on the decryption subprogram so as to obtain the software identification.
3-4) the mobile terminal respectively compares the software identifier obtained by decrypting the 3-3) and the manufacturer verification code obtained in the 3-2) with the software identifier and the manufacturer verification code in the authorized two-dimensional code obtained in the 3-1), and if the two are respectively compared and consistent, the front-end verification is successful.
3-5) if the front end verification is successful, the mobile terminal initiates an authorization request to the server, wherein the authorization request comprises a machine fingerprint code and a manufacturer verification code which are successfully verified by the front end.
Step 4: and the server generates a machine authorization code according to the authorization request and sends the machine authorization code to the mobile terminal.
Step 4 comprises:
4-1) the server verifies the machine fingerprint code and the manufacturer verification code in the authorization request.
Specifically, in step 1, the server side has generated an authorized two-dimensional code according to the software identifier, the vendor verification code and the two-dimensional code unique identifier, that is, the server side itself stores the original software identifier and the original vendor verification code. The step is to compare the manufacturer verification code and the decrypted software identification in the authorization request with the local original corresponding data, and if the two data are consistent, the verification is successful.
The method specifically comprises the following steps:
4-1-1) decrypting the machine fingerprint code in the authorization request according to a preset algorithm to obtain the software identifier.
4-1-2) comparing the manufacturer verification code in the authorization request and the software identifier decrypted by 4-1-1) with the local original manufacturer verification code and the original software identifier respectively, and if the manufacturer verification code and the original software identifier are identical, checking is successful.
4-2) if the verification is successful and the current software is not authorized, the server side performs abstract operation on the machine fingerprint code and the software identifier in the authorization request to generate a machine authorization code.
Specifically, hash operation is performed on the machine fingerprint code, encryption operation is performed after the operation result is spliced with the software identifier, and the obtained result is the machine authorization code.
4-3) the server sends and displays the machine authorization code on the mobile terminal.
Specifically, the machine authorization code may be a string of numbers + letters + special characters.
Step 5: the application end receives the machine authorization code displayed by the mobile end and input by the user.
The step 5 comprises the following steps: the user (such as the actual software user B) manually inputs the machine authorization code displayed on the mobile terminal into the authorization interface of the application terminal and submits the machine authorization code to the corresponding location as shown in fig. 2.
Step 6: the application end generates a machine authorization code locally according to the locally generated machine fingerprint code and the locally pre-stored software identifier.
Specifically, the steps include: the application end generates a machine authorization code locally according to the local machine fingerprint code and the software identification. The specific generation process is the same as that of 4-2).
Specifically, the software identifier of the step is built in the software to be authorized at the application end. The machine fingerprint code of the step refers to the machine fingerprint code locally generated by the application end of the step 2.
Specifically, the application end is not networked.
Step 7: the application end compares the locally generated machine authorization code with the received machine authorization code, and if the locally generated machine authorization code is consistent with the received machine authorization code, the authorization is successful.
Specifically, the machine authorization code of the application end obtained in the step 6 is compared with the machine authorization code filled in by the user at the application end in the step 5, and if the machine authorization code is consistent with the machine authorization code, the user can normally use the software at the application end.
Specifically, the software to be authorized is installed on the application side.
The embodiment of the invention has the following beneficial effects:
1. the mobile terminal scans the two-dimension code for authorization, so that the convenience of operation is improved, and the authorization cost of software is reduced on the premise of ensuring safety.
2. The software identification is used for preliminarily judging whether the content input by the user is normal and legal, so that authorization failure caused by user misinput or disordered input is prevented.
3. The application software to be authorized only needs one installation package, and the mobile terminal verifies the manufacturer verification code through the front end, so that the phenomena of scanning the two-dimensional code of the Y manufacturer by the X manufacturer and stealing the authorization of the Y manufacturer are effectively avoided.
4. The format, length and sign of the hard disk serial number are quite different, and the digest value of the hard disk serial number is used instead of directly using the hard disk serial number, so that the data regularity of the encryption operation is ensured, and a layer of protection is added for the hard disk serial number or other information.
5. The machine authorization code generated by the server has uniqueness, and each machine authorization code can only perform one-time authorization on the mobile terminal.
6. The front end verification mode of the mobile terminal effectively reduces the probability of authorization failure.
7. The mobile terminal scans the two-dimension code for authorization, so that convenience is greatly improved compared with the traditional physical authorization mode.
8. The server or the application generates the machine authorization code and the key required in the verification process are generated by the related information, and the key is not imported and stored, so that the complexity and the related risk are reduced.
9. Each machine authorization code is different and is generated by the server according to an algorithm, so that the possibility of manufacturing the machine authorization code by a person is avoided.
10. The mobile terminal scans the two-dimension code for authorization, and the host computer where the terminal software is located in the authorization process does not need to be connected with an external network in the whole process, does not need to open a U port, and ensures the safety of the terminal environment.
11. According to the invention, an authorization mode is innovated, software authorization is performed by adopting a mode of scanning an authorization two-dimensional code by a mobile terminal, related information required by authorization is checked by referring to modes of SHA, MD5, RSA, DES, national encryption algorithms SM2, SM3, SM4 and the like, a machine authorization code is generated, and a final authorization result is checked.
12. The server records all the machine authorization codes for verification.
Example two
The embodiment provides a software authorization system based on mobile terminal code scanning, which is used for executing the software authorization method, and comprises the following steps: the mobile terminal, the service terminal and the application terminal; the software to be authorized is installed on the application end.
The implementation principle and the generated technical effects of the software authorization system based on the mobile terminal scanning code provided by the embodiment of the invention are the same as those of the embodiment of the software authorization method based on the mobile terminal scanning code, and for the sake of brief description, the corresponding contents in the embodiment of the method can be referred to where the embodiment of the system is not mentioned.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the invention.

Claims (7)

1. The mobile terminal code scanning-based software authorization method is characterized by being applied to a software authorization system, wherein the software authorization system comprises: the mobile terminal, the application terminal and the service terminal; the method comprises the following steps:
step 1: the server generates authorized two-dimension codes in batches;
step 2: the application end generates and displays a machine fingerprint code;
step 3: the mobile terminal scans the authorization two-dimensional code, performs front-end verification based on the machine fingerprint code, and initiates an authorization request to the server terminal if the front-end verification is successful;
step 4: the server generates a machine authorization code according to the authorization request and sends the machine authorization code to the mobile terminal;
step 5: the application end receives a machine authorization code displayed by the mobile end and input by a user;
step 6: the application end generates a machine authorization code locally according to the locally generated machine fingerprint code and a locally pre-stored software identifier;
step 7: the application end compares the locally generated machine authorization code with the received machine authorization code, and if the locally generated machine authorization code is consistent with the received machine authorization code, the authorization is successful;
the step 3 comprises the following steps:
3-1: the user scans any one of the authorized two-dimension codes generated in batch by the server in the step 1 by using the mobile terminal, and initiates an acquisition request to a web page program linked with the scanned authorized two-dimension codes, wherein the web page program is stored in the server in advance and comprises a decryption subprogram, a software identifier confirmed by the server in the step 1 and a manufacturer verification code;
3-2: after the web page program receives the acquisition request, a form is sent back to the mobile terminal, so that a user fills in a manufacturer verification code displayed on the pdf file and a machine fingerprint code displayed on an application terminal authorization interface in the form;
3-3: the mobile terminal decrypts the machine fingerprint code filled in the step 3-2 by the user based on the decryption subprogram so as to obtain a software identifier;
3-4: the mobile terminal respectively compares the software identifier obtained by decryption in the step 3-3 and the manufacturer verification code obtained in the step 3-2 with the software identifier and the manufacturer verification code in the authorized two-dimensional code obtained in the step 3-1, and if the two are respectively compared consistently, the front end verification is successful;
3-5: if the front end verification is successful, the mobile terminal initiates an authorization request to the server, wherein the authorization request comprises a machine fingerprint code and a manufacturer verification code which are successfully verified by the front end.
2. The software authorization method according to claim 1, wherein step 1 includes:
1-1: the server receives client information and authorized quantity input by a worker and creates order information;
1-2: the server side automatically generates authorized two-dimension codes in batches according to the order information; each authorization two-dimensional code comprises order information, a software identifier, a manufacturer verification code and a two-dimensional code unique identifier;
1-3: and the server side generates an authorization file according to the authorization two-dimensional code, the manufacturer verification code and the order information.
3. The software authorization method according to claim 2, wherein step 2 comprises:
2-1: the application end starts for the first time and pops up a preliminary authorization interface;
2-2: generating a summary value according to the unique terminal identifier and the software identifier;
2-3: performing encryption operation on the abstract value to generate a machine fingerprint code;
2-4: and displaying the machine fingerprint code on an authorization interface of the application end.
4. A software authorisation method as claimed in claim 3, in which step 4 comprises:
4-1: the server checks the machine fingerprint code, the manufacturer verification code and the software identifier in the authorization request;
4-2: if the verification is successful and the current software is not authorized, performing abstract operation on the machine fingerprint code and the software identifier in the authorization request to generate a machine authorization code;
4-3: and sending and displaying the machine authorization code on the mobile terminal.
5. The method of software authorization according to claim 4, wherein step 4-1: comprising the following steps:
4-1-1: decrypting the machine fingerprint code in the authorization request to obtain a software identifier;
4-1-2: and (3) comparing the manufacturer verification code in the authorization request and the software identifier decrypted in the step 4-1-1 with the local original manufacturer verification code and the original software identifier respectively, and if the manufacturer verification code and the original software identifier are consistent, checking successfully.
6. The software authorization method according to claim 5, wherein step 7 includes:
and (5) comparing the machine authorization code of the application end in the step (6) with the machine authorization code filled in the application end by the user in the step (5), and if the machine authorization code is consistent with the machine authorization code, enabling the user to normally use the software in the application end.
7. A software authorization system based on mobile terminal code scanning, wherein the software authorization system is configured to perform the software authorization method of any one of claims 1 to 6, the software authorization system comprising: the system comprises a mobile terminal, a service terminal and an application terminal, wherein software to be authorized is installed on the application terminal.
CN202310356802.5A 2023-04-06 2023-04-06 Software authorization method and system based on mobile terminal code scanning Active CN116070178B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310356802.5A CN116070178B (en) 2023-04-06 2023-04-06 Software authorization method and system based on mobile terminal code scanning

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310356802.5A CN116070178B (en) 2023-04-06 2023-04-06 Software authorization method and system based on mobile terminal code scanning

Publications (2)

Publication Number Publication Date
CN116070178A CN116070178A (en) 2023-05-05
CN116070178B true CN116070178B (en) 2023-07-14

Family

ID=86173526

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310356802.5A Active CN116070178B (en) 2023-04-06 2023-04-06 Software authorization method and system based on mobile terminal code scanning

Country Status (1)

Country Link
CN (1) CN116070178B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111177690A (en) * 2019-12-31 2020-05-19 中国工商银行股份有限公司 Two-dimensional code scanning login method and device
CN112689285A (en) * 2020-12-10 2021-04-20 航天信息股份有限公司 Authorization authentication method and system for mobile terminal SDK

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8838966B2 (en) * 2010-09-27 2014-09-16 Agco Corporation One-time use authorization codes with encrypted data payloads for use with diagnostic content supported via electronic communications
CN109587529B (en) * 2017-09-29 2021-08-31 青岛海尔多媒体有限公司 Authorization method and authorization device for television function items
CN107872688B (en) * 2017-11-28 2020-09-08 青岛海尔多媒体有限公司 Method and system for counting authorization data of television function items
CN109523669A (en) * 2018-11-19 2019-03-26 日立楼宇技术(广州)有限公司 Data processing method, system and relevant device based on barcode scanning
CN109684790B (en) * 2018-12-26 2021-06-04 佛山市瑞德物联科技有限公司 Software starting method, software authorization verification method, device and storage medium
CN112149067B (en) * 2020-09-29 2022-10-18 济南博观智能科技有限公司 Software authorization method, terminal equipment, authorization server and storage medium
CN112884916B (en) * 2021-02-03 2023-11-28 西安艾润物联网技术服务有限责任公司 Self-service vehicle authorization and parking rights and interests self-service redemption method, device and equipment
CN114675567A (en) * 2021-04-30 2022-06-28 腾讯云计算(北京)有限责任公司 Access processing method, device and storage medium for remotely controlling terminal
CN113472749A (en) * 2021-06-02 2021-10-01 浪潮软件股份有限公司 Method for preventing unauthorized self-service machine terminal from accessing B/S architecture system
CN113868604A (en) * 2021-09-01 2021-12-31 深圳市科陆电子科技股份有限公司 Software authorization method, system, device and computer readable storage medium
CN114357386A (en) * 2021-11-30 2022-04-15 北京旷视科技有限公司 Software authorization method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111177690A (en) * 2019-12-31 2020-05-19 中国工商银行股份有限公司 Two-dimensional code scanning login method and device
CN112689285A (en) * 2020-12-10 2021-04-20 航天信息股份有限公司 Authorization authentication method and system for mobile terminal SDK

Also Published As

Publication number Publication date
CN116070178A (en) 2023-05-05

Similar Documents

Publication Publication Date Title
EP1190290B1 (en) System for digitally signing a document
EP1181645B1 (en) System for providing a trustworthy user interface
US7895443B2 (en) Secure authentication using hardware token and computer fingerprint
US7454780B2 (en) Service providing system and method
AU2012328082B2 (en) Abstracted and randomized one-time passwords for transactional authentication
US9148415B2 (en) Method and system for accessing e-book data
US20160028745A1 (en) System and method for key challenge validation
US20070129056A1 (en) Mobile phone age verification system and method for age-restricted promotions
US20060259330A1 (en) Electronic prescription system for internet pharmacies and method threfor
BG64913B1 (en) Method for verifying the validity of digital franking notes
US7340773B2 (en) Multi-stage authorisation system
WO1998007250A1 (en) Secure transmission of sensitive information over a public/insecure communications medium
CN116070178B (en) Software authorization method and system based on mobile terminal code scanning
WO2022073336A1 (en) Secure payment method and apparatus, electronic device, and storage medium
EP2051469A1 (en) Delegation of authentication
EP1307802B1 (en) Method and apparatus for centralized authentication
US20240104184A1 (en) Systems and methods for access control
EP1547298B1 (en) Systems and methods for secure authentication of electronic transactions
CN114418571B (en) Transaction data rapid auditing and checking method
JP2002123789A (en) Electronic form distribution system and electronic document presentation system
CN115442068A (en) Protection method of login bill and server
CA2538923A1 (en) Electronic prescripton system for internet pharmacies and method therefor
ZA200502178B (en) Systems and methods for secure authentication of electronic transactions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant