CN102930230B - Computing equipment identification method and device - Google Patents

Computing equipment identification method and device Download PDF

Info

Publication number
CN102930230B
CN102930230B CN201210397881.6A CN201210397881A CN102930230B CN 102930230 B CN102930230 B CN 102930230B CN 201210397881 A CN201210397881 A CN 201210397881A CN 102930230 B CN102930230 B CN 102930230B
Authority
CN
China
Prior art keywords
computing equipment
unique identification
magnetic disc
logic magnetic
system disk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210397881.6A
Other languages
Chinese (zh)
Other versions
CN102930230A (en
Inventor
邓振波
张家柱
温铭
李宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qianxin Technology Group Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201210397881.6A priority Critical patent/CN102930230B/en
Publication of CN102930230A publication Critical patent/CN102930230A/en
Application granted granted Critical
Publication of CN102930230B publication Critical patent/CN102930230B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides a kind of computing equipment identification method and device, wherein, computing equipment identity device comprises: judge module; Negative module; Identification module; Interactive module, for use computing equipment described in the described unique identification that obtains from other logic magnetic disc described at described identification module after, sends data acquisition request to server, carries described unique identification in described data acquisition request; Obtain described server according to described data acquisition request, the data that the described computing equipment to described unique identification sends.By the present invention, reach the effect that precisely can identify computing equipment.

Description

Computing equipment identification method and device
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of computing equipment identification method and device.
Background technology
More and more extensive along with Internet technology application, network plays more and more important role in the life of people.People use various computing equipment such as computing machine to carry out various network operation, and under many circumstances, network needs to identify online computing machine, and carries out corresponding data manipulation according to recognition result, as transmission data or the information etc. obtaining this computing machine.
At present, general Internet enterprises has oneself judgement computer approach, namely carries out the method for computing equipment identification as computer recognizing.A kind of common method records a mark in computing machine registration table, and as the GUID(Globally Unique Identifier that record Microsoft provides, global unique identification accords with), then directly upload this and be designated unique identification.This method has comparatively simple, quick and easy, the feature that code is low, but, after system refitting, the computer identity of same computer reset with system before mark can not be consistent; Further, this method cannot meet high-precision requirement, and when a large number of users calculates simultaneously, repetition rate is higher, and these all cause accurately to identify computing machine.
Visible, existing computing equipment recognition methods can not meet the demand of computing equipment identification accurately, especially can not meet the demand that enterprises wishes accurately to identify every platform computing equipment.
Summary of the invention
In view of above-mentioned existing computing equipment recognition methods can not meet the demand of computing equipment identification accurately, especially can not meet the problem that enterprises wishes the demand that accurately can identify every platform computing equipment, propose the present invention to provide a kind of overcoming the problems referred to above or the computing equipment identification method solved the problem at least in part and device.
According to one aspect of the present invention, provide a kind of computing equipment identification method, comprise: the unique identification judging whether to exist in the system disk of computing equipment or registration table computing equipment, wherein, unique identification is calculated by mark calculating parameter, mark calculating parameter comprise following one of at least: the residue disk size of the computing equipment name of computing equipment, global unique identification symbol GUID, system disk; If do not exist, then from other logic magnetic disc of computing equipment, obtain unique identification, wherein, in other logic magnetic disc, preserve this unique identification in advance; Use the unique identification computing equipment obtained from other logic magnetic disc; Computing equipment sends data acquisition request to server, carries unique identification in data acquisition request; Server based on data obtains request, and the computing equipment to unique identification sends data.
Alternatively, whether there is the uniquely identified step of computing equipment in the system disk judging computing equipment or registration table before, also comprise: obtain mark calculating parameter; According to mark calculating parameter, calculate unique identification according to set algorithm; Unique identification is stored into respectively in the registration table of computing equipment, system disk and other logic magnetic disc.
Alternatively, the step be stored into respectively by unique identification in the registration table of computing equipment, system disk and other logic magnetic disc comprises: respectively according to the information of each logic magnetic disc in the information of registration table, the information of system disk and other logic magnetic disc, be encrypted unique identification; Be saved to having carried out the unique identification after encrypting respectively in each logic magnetic disc in corresponding registration table, system disk and other logic magnetic disc.
Alternatively, from other logic magnetic disc of computing equipment, obtain uniquely identified step to comprise: be decrypted the unique identification after the encryption obtained from each logic magnetic disc in other logic magnetic disc respectively; Judge that whether the unique identification in each logic magnetic disc after deciphering is consistent; If consistent, then the unique identification of acquisition is defined as the unique identification of computing equipment.
Alternatively, after obtain uniquely identified step from other logic magnetic disc of computing equipment, also comprise: the system disk and the registration table that the unique identification determined are saved to computing equipment.
Alternatively, set algorithm is MD5 algorithm.
Alternatively, identify calculating parameter and also comprise random number.
Alternatively, this computing equipment identification method also comprises: if there is the unique identification of computing equipment in the system disk of computing equipment, then judge that whether whether the unique identification existed in system disk consistent with the unique identification of the computing equipment existed in registration table and/or other logic magnetic disc, if consistent, then use unique identification computing equipment; Or, if there is the unique identification of computing equipment in the registration table of computing equipment, then judge that whether whether the unique identification existed in registration table consistent with the unique identification of the computing equipment existed in system disk and/or other logic magnetic disc, if unanimously, then use unique identification computing machine.
Alternatively, after unique identification being stored into respectively the step in the registration table of computing equipment, system disk and other logic magnetic disc, also comprise: uniquely identified amendment attribute is set for forbidding amendment.
Alternatively, judge that the uniquely identified step that whether there is computing equipment in the system disk of computing equipment or registration table comprises: search the computing equipment mark list item in the computing equipment identification document stored in the system disk of computing equipment, whether there is according to computing equipment mark list item the unique identification that corresponding key assignments judges whether to exist in the system disk of computing equipment computing equipment; Or, search the computing equipment mark list item in the registration table of computing equipment, whether there is according to the computing equipment mark list item in registration table the unique identification that corresponding key assignments judges whether to exist in the system disk of computing equipment computing equipment.
According to a further aspect in the invention, provide a kind of computing equipment identity device, comprise: judge module, for judging the unique identification that whether there is computing equipment in the system disk of computing equipment or registration table, wherein, unique identification is calculated by mark calculating parameter, mark calculating parameter comprise following one of at least: the residue disk size of the computing equipment name of computing equipment, global unique identification symbol GUID, system disk; Negative module, if for the judged result of judge module for not exist, then obtain unique identification, wherein, preserve unique identification in advance in other logic magnetic disc from other logic magnetic disc of computing equipment; Identification module, for using the unique identification computing equipment obtained from other logic magnetic disc; Interactive module, after using at identification module the unique identification computing equipment obtained from other logic magnetic disc, sends data acquisition request to server, carries unique identification in data acquisition request; Obtain server based on data and obtain request, the data that the computing equipment to unique identification sends.
Alternatively, computing equipment identity device also comprises: calculate and preserve module, for judge whether there is the unique identification of computing equipment in the system disk of computing equipment or registration table at judge module before, obtains and identifies calculating parameter; According to mark calculating parameter, calculate unique identification according to set algorithm; Unique identification is stored into respectively in the registration table of computing equipment, system disk and other logic magnetic disc.
Alternatively, calculating preservation module is when being stored into unique identification respectively in the registration table of computing equipment, system disk and other logic magnetic disc, respectively according to the information of each logic magnetic disc in the information of registration table, the information of system disk and other logic magnetic disc, unique identification is encrypted; Be saved to having carried out the unique identification after encrypting respectively in each logic magnetic disc in corresponding registration table, system disk and other logic magnetic disc.
Alternatively, negative module, when obtaining unique identification from other logic magnetic disc of computing equipment, is decrypted the unique identification after the encryption obtained from each logic magnetic disc in other logic magnetic disc respectively; Judge that whether the unique identification in each logic magnetic disc after deciphering is consistent; If consistent, then the unique identification of acquisition is defined as the unique identification of computing equipment.
Alternatively, computing equipment identity device also comprises: obtain memory module, after obtaining unique identification in negative module from other logic magnetic disc of computing equipment, the unique identification determined is saved to system disk and the registration table of computing equipment.
Alternatively, set algorithm is MD5 algorithm.
Alternatively, computing equipment identity device also comprises: determination module, the unique identification of computing equipment is there is in the system disk of computing equipment if judge for judge module, then judge that whether the unique identification existed in system disk is consistent with the unique identification of the computing equipment existed in registration table and/or other logic magnetic disc, if consistent, then use unique identification computing equipment; Or, if judge module judges the unique identification that there is computing equipment in the registration table of computing equipment, then judge that whether the unique identification existed in registration table is consistent with the unique identification of the computing equipment existed in system disk and/or other logic magnetic disc, if consistent, then use unique identification computing equipment.
Alternatively, computing equipment identity device also comprises: arrange module, for preserving after unique identification to be stored in the registration table of computing equipment, system disk and other logic magnetic disc by module respectively calculating, arranges uniquely identified amendment attribute for forbidding amendment.
Alternatively, judge module, for searching the computing equipment mark list item in the computing equipment identification document that stores in the system disk of computing equipment, whether there is according to computing equipment mark list item the unique identification that corresponding key assignments judges whether to exist in the system disk of computing equipment computing equipment; Or, for searching the computing equipment mark list item in the registration table of computing equipment, whether there is according to the computing equipment mark list item in registration table the unique identification that corresponding key assignments judges whether to exist in the system disk of computing equipment computing equipment.
According to computing equipment identification schemes of the present invention, computing equipment uses mark calculating parameter to generate the unique identification of computing equipment, and, registration table and comprise system disk each logic magnetic disc in all preserve this unique identification.On the one hand, this mark can not occur, as IP address changes after router etc., to cause the situation that computing equipment can not be accurately identified, on the other hand, when in some cases, as system reset time, the unique identification of the former computing equipment in the system disk of computing equipment or registration table will not exist, now, if regenerate according to existing method, the new logo then regenerated will be different from former mark, thus be unfavorable for the identification of computing equipment, and use computing equipment identification schemes of the present invention, the use of former unique identification is obtained from preserving in advance other logic magnetic disc of computing equipment uniquely identified, then the mark of computing equipment can not change because of situations such as system refittings, ensure that the stability that computing equipment identifies and uniqueness, thus solve the demand that existing computing equipment recognition methods can not meet computing equipment identification accurately, especially the problem that enterprises wishes the demand that accurately can identify every platform computing equipment can not be met, reach the effect that precisely can identify computing equipment.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, in order to technological means of the present invention can be better understood, and can be implemented according to the content of instructions, and can become apparent, below especially exemplified by the specific embodiment of the present invention to allow above and other objects of the present invention, feature and advantage.
Accompanying drawing explanation
By reading hereafter detailed description of the preferred embodiment, various other advantage and benefit will become cheer and bright for those of ordinary skill in the art.Accompanying drawing only for illustrating the object of preferred implementation, and does not think limitation of the present invention.And in whole accompanying drawing, represent identical parts by identical reference symbol.In the accompanying drawings:
Fig. 1 is the flow chart of steps of a kind of computing equipment identification method according to the embodiment of the present invention one;
Fig. 2 is the flow chart of steps of a kind of computing equipment identification method according to the embodiment of the present invention two;
Fig. 3 is the flow chart of steps of a kind of computing equipment identification method according to the embodiment of the present invention three;
Fig. 4 is the structured flowchart of a kind of computing equipment identity device according to the embodiment of the present invention four.
Embodiment
Below with reference to accompanying drawings exemplary embodiment of the present disclosure is described in more detail.Although show exemplary embodiment of the present disclosure in accompanying drawing, however should be appreciated that can realize the disclosure in a variety of manners and not should limit by the embodiment set forth here.On the contrary, provide these embodiments to be in order to more thoroughly the disclosure can be understood, and complete for the scope of the present disclosure can be conveyed to those skilled in the art.
First it should be noted that, in following multiple embodiment of the present invention, computing equipment is all for computing machine, but those skilled in the art are to be understood that, computing equipment identification schemes of the present invention is not limited in computing machine, and any computing equipment with registration table, system disk and other logic magnetic disc is all suitable for the solution of the present invention.
Embodiment one
With reference to Fig. 1, show the flow chart of steps of a kind of computing equipment identification method according to the embodiment of the present invention one.
The computing equipment identification method of the present embodiment comprises the following steps:
Step S102: computing machine judges the unique identification that whether there is this computing machine in its system disk or registration table.
Wherein, the unique identification of computing machine is calculated by mark calculating parameter, and mark calculating parameter comprises computer name, the GUID(global unique identification symbol of following one of at least computing machine), the residue disk size of system disk.Apart from the above, identify calculating parameter and can also comprise random number.
Time initial, in the registration table of computing machine, system disk and other logic magnetic disc, all there is the unique identification of computing machine.When there occurs some situation, after system refitting, the unique identification of the computing machine preserved in system disk and registration table will not exist.
Step S104: if computing machine judges the unique identification that there is not this computing machine in its system disk or registration table, then obtain unique identification from other logic magnetic disc of this computing machine.
Wherein, the unique identification of this computing machine is preserved in other logic magnetic disc in advance.
Step S106: computing machine uses the unique identification computing machine obtained from other logic magnetic disc.
Visible, after the mark self-generating of this computing machine, from start to finish uniquely, can not change because of reasons such as system refittings.Further, if computing machine reports its unique identification to carry out computer recognizing to server, this mark can not because of router, or the reason such as DNS and being rewritten, thus ensure that computer identity accurately and unique.
By the present embodiment, computing machine uses mark calculating parameter to generate the unique identification of computing machine, and, registration table and comprise system disk each logic magnetic disc in all preserve this unique identification.On the one hand, this mark can not occur, as IP address changes after router etc., to cause the situation that computing machine can not be accurately identified, on the other hand, when in some cases, as system reset time, the unique identification of the former computing machine in system for computer dish or registration table will not exist, now, if regenerate according to existing method, the new logo then regenerated will be different from former mark, thus be unfavorable for the identification of computing machine, and use the computing equipment identification schemes of the present embodiment, the use of former unique identification is obtained from preserving in advance other logic magnetic disc of computing machine uniquely identified, then the mark of computing machine can not change because of situations such as system refittings, ensure that stability and the uniqueness of computer identity, thus solve the demand that existing Computer Identification can not meet computer recognizing accurately, especially the problem that enterprises wishes the demand that accurately can identify every platform computing machine can not be met, reach the effect that precisely can identify computing machine.
Embodiment two
With reference to Fig. 2, show the flow chart of steps of a kind of computing equipment identification method according to the embodiment of the present invention two.
The computing equipment identification method of the present embodiment comprises the following steps:
Step S202: computing machine obtains mark calculating parameter.
In the present embodiment, it is one or more that mark calculating parameter comprises in the residue disk size of computer name, GUID, this system for computer dish, can also comprise random number etc.
Step S204: computing machine, according to mark calculating parameter, calculates the unique identification of this computing machine according to set algorithm.
As, by mark calculating parameter and random value being blent into one, calculate a unique identification according to set algorithm, to make the repetition rate that this mark is possible extremely low.
Preferably, use MD5 algorithm, according to the unique identification of mark calculating parameter computing computer.MD5 and Message-Digest Algorithm 5(Message-Digest Algorithm 5), be one of widely used hash algorithm, data operation is another fixed-length value by it, Information Compression is become a kind of secret form.MD5 has the low feature of collision rate, uses MD5 algorithm to calculate unique identification, the repetition that can effectively prevent computing equipment from identifying and collision.
Such as, together with GUID is assembled into computer name, obtains a character string, then MD5 calculating is carried out to this character string, obtain 32 bit-identifies that a collision rate is extremely low.Again such as, the remaining disk size of GUID+ computer name+system disk+one random number (pseudo random number that Computer calculates) is assembled into together, obtain a character string, then MD5 calculating is carried out to this character string, obtain 32 bit-identifies that a collision rate is extremely low.
Certainly, in actual applications, be not limited to MD5 algorithm, those skilled in the art can also with low collision rate for principle, and the algorithm selecting other suitable generates the unique identification of computing machine.
Step S206: unique identification is stored in the registration table of computing machine, system disk and other logic magnetic disc by computing machine respectively.
Also namely, under the unique identification calculated being recorded to the registration table of this computing machine and the drive catalogue of each logic magnetic disc thereof.It should be noted that, portable hard drive and USB flash disk do not belong to the logic magnetic disc of computing machine itself in the present invention, therefore need not record unique identification.
Step S208: computing machine, by judging the unique identification that there is not computing machine in certainty annuity dish or registration table, obtains unique identification from other logic magnetic disc of computing machine.
Whether computing equipment such as computing machine by searching the computing equipment mark list item in the computing equipment identification document that stores in the system disk of computing equipment, can exist according to computing equipment mark list item the unique identification that corresponding key assignments judges whether to exist in the system disk of computing equipment computing equipment; Or, search the computing equipment mark list item in the registration table of computing equipment, whether there is according to the computing equipment mark list item in registration table the unique identification that corresponding key assignments judges whether to exist in the system disk of computing equipment computing equipment.System disk and other logic magnetic disc can use ini file to preserve the unique identification of computing equipment, and the computing equipment unique identification in ini file can adopt the form identical with registration table to preserve, and preserve as used computing equipment mark list item and key assignments.Certainly, be not limited thereto, those skilled in the art with reference to the recognition methods of other existing computing equipment mark, can also judge the unique identification that there is not computing equipment in certainty annuity dish or registration table.
When finding the unique identification that there is not computing machine in system disk or registration table, just obtain the unique identification preserved in other logic magnetic discs.Preferably, the unique identification of the computing machine obtained from other logic magnetic discs can be saved in after in system disk and registration table and return results.
By this step, the problem that refitting system unique identifier is inconsistent effectively can be solved.Meanwhile, this unique identification and hardware information do not have much relations, if user changes other hardware in addition to a hard disk, can not have any impact to this unique identification yet.
It should be noted that, the unique identification of computing machine is received in the protection domain of self-shield, and user cannot arbitrarily change.Also namely, uniquely identified amendment attribute is set to forbid amendment, with the unique identification of this computing machine of available protecting.
Step S210: computing machine uses this computing machine of unique identification obtained from other logic magnetic discs.
Step S212: computing machine sends data acquisition request to server, asks to obtain data from server.
Wherein, the unique identification of computing equipment is carried in data acquisition request.
Step S214: server based on data obtains request, to the computing machine return data of unique identification.
The route of computing equipment unique identification and correspondence is preserved in server, when needs send data to computing equipment, unique identification in the data acquisition request that server can send according to computing equipment determine corresponding route, and then sends the data to according to this route the computing equipment that unique identification identifies.
It should be noted that, step S212 and S214 is optional step, without time mutual between server and computing equipment, need not perform step S212 and S214.
By the present embodiment, ensure that stability and the uniqueness of computer identity, accurately can distinguish the computing machine of every platform enterprise-level, there will not be a problem identifying corresponding multiple stage computing machine, also there will not be the problem of the corresponding computing machine of multiple mark.By the unique identification of every platform computing machine, be convenient to identify, divide into groups and distributing policy, e.g., during grouping management, distinguish core space, domestic consumer, Office Area etc. by the unique identification of computing machine, for the computing machine of nucleus, do not admit of random operation; When distributing policy, the strategy that the execution of the computing machine of core space is very high to security requirement, the strategy of permission just allows operation, then reduces security requirement to domestic consumer.Pass through the present embodiment, solve the demand that existing Computer Identification can not meet computer recognizing accurately, especially can not meet the problem that enterprises wishes the demand that accurately can identify every platform computing machine, reach the effect that precisely can identify computing machine.
Embodiment three
With reference to Fig. 3, show the flow chart of steps of a kind of computing equipment identification method according to the embodiment of the present invention three.
The computing equipment identification method of the present embodiment comprises the following steps:
Step S302: computing machine obtains mark calculating parameter, comprises the GUID of computing machine, computer name, the remaining disk size of system disk and a random number (pseudo random number that Computer calculates).
Step S304: the GUID of acquisition, computer name, the remaining disk size of system disk and random number are formed a character string by computing machine, uses MD5 algorithm to this character string, generates the unique identification of computing machine.
Step S306: the unique identification of generation is distributed to registration table, system disk and other logic magnetic disc by computing machine.
Step S308: computing machine, respectively according to the information of each logic magnetic disc in the information of registration table, the information of system disk and other logic magnetic disc, uses cryptographic algorithm to be encrypted the unique identification in corresponding registration table, system disk and each logic magnetic disc respectively.
As, the name according to registration table, system disk and each logic magnetic disc is encrypted unique identification respectively.Registration table, system disk is identical with the unique identification of each logic magnetic disc record, and this unique identification that simultaneously registration table, system disk and other each logic magnetic discs are preserved is all the simple encryption of carrying out according to respective name.Such as.The key of registration table encryption is key that 1, C dish (system disk) is encrypted be the key that C, D dish is encrypted is D, and by parity of reasoning.Like this, after obtaining result, just these contents can be deciphered according to respective key, finally see that whether the result decrypted is consistent.So arbitrarily would not be covered and be replaced.
Unique identification in registration table, system disk and each logic magnetic disc is encrypted and generally can adopts identical cryptographic algorithm, so that realize, but also can adopt different cryptographic algorithm.
Step S310: computing machine is saved in each logic magnetic disc in corresponding registration table, system disk and other logic magnetic disc respectively by having carried out the unique identification after encrypting.
Each logic magnetic disc records unique identification can realize fault-tolerant processing, and such as system has been reset, and just can obtain correct value according to the unique identification that other logic magnetic discs outside system disk are preserved.In addition, if the unique identification that other logic magnetic discs are preserved has inconsistent situation.Then can think that the unique identification of current preservation is insincere, need to recalculate.
In addition, in the present embodiment, under each logic magnetic disc, unique identification exists in the form of a file, and user cannot arbitrarily change.When realizing, self-shield module can be set, prevent the function of user to protection from modifying by this module; Or Operation system setting uniquely identified amendment attribute is for forbidding amendment etc.Certainly, other prevents the method for user's Update Table to be suitable for too.
Step S312: computing machine judges the unique identification that whether there is computing machine in system for computer dish or registration table, if exist, then performs step S314; If do not exist, then perform step S316.
When certain needs identify computing machine or report computer identity, the uniquely identified that computing machine carries out whether existing in system disk or registration table computing machine judges.
Step S314: when there is the unique identification of computing machine in system disk, then judge that whether whether the unique identification existed in system disk consistent with the unique identification of the computing machine existed in registration table and/or other logic magnetic disc, if consistent, then use unique identification computing machine, if inconsistent, then recalculate; Or, when there is the unique identification of computing machine in registration table, then judge that whether whether the unique identification existed in registration table consistent with the unique identification of the computing machine existed in system disk and/or other logic magnetic disc, if consistent, then use unique identification computing machine, if inconsistent, then recalculate.Terminate this computer identity flow process.
It should be noted that, in the present embodiment, judge again after needing the whether consistent judgement of unique identification the unique identification after the encryption of first preserving registration table and each logic magnetic disc to be decrypted.Certainly, for the unique identification be not encrypted directly preserved, then need not decipher, directly judge.
Step S316: computing machine obtains the unique identification of the computing machine of encryption from other logic magnetic disc.
Step S318: computing machine is decrypted the unique identification after the encryption obtained from each logic magnetic disc in other logic magnetic disc respectively.
Step S320: computing machine judges that whether the unique identification in each logic magnetic disc after deciphering is consistent, if unanimously, then performs step S322; If inconsistent, then recalculate.
Step S322: the unique identification obtained from other logic magnetic disc is defined as the unique identification of computing machine by computing machine, uses this unique identification computing machine, and is saved in system for computer dish and registration table.
By the present embodiment, the computer identity that can realize at every turn reporting under normal circumstances is all consistent; The computer identity reported after having non-key fractional hardware (hardware as except system disk) to change can be consistent; The computer identity reported after refitting system can be consistent.Visible, accurately can distinguish every platform computing machine by the scheme of the present embodiment, the computing machine of especially every platform enterprise-level, there will not be a problem identifying corresponding multiple stage computing machine.Also there will not be the problem of the corresponding computing machine of multiple mark.
Embodiment four
With reference to Fig. 4, show the structured flowchart of a kind of computing equipment identity device according to the embodiment of the present invention four.
The computing equipment identity device of the present embodiment comprises: judge module 402, for judging the unique identification that whether there is computing equipment in the system disk of computing equipment or registration table, wherein, unique identification is calculated by mark calculating parameter, mark calculating parameter comprise following one of at least: the residue disk size of the computing equipment name of computing equipment, GUID, system disk; Negative module 404, if for the judged result of judge module 402 for not exist, then obtain unique identification, wherein, preserve this unique identification in advance in other logic magnetic disc from other logic magnetic disc of computing equipment; Identification module 406, for using the unique identification computing equipment obtained from other logic magnetic disc.
Preferably, the computing equipment identity device of the present embodiment also comprises: calculate and preserve module 408, for judge whether there is the unique identification of computing equipment in the system disk of computing equipment or registration table at judge module 402 before, obtains mark calculating parameter; According to the computing equipment name in mark calculating parameter and GUID, calculate unique identification according to set algorithm; And unique identification is stored into respectively in the registration table of computing equipment, system disk and other logic magnetic disc.
Preferably, calculating preservation module 408 is when being stored into unique identification respectively in the registration table of computing equipment, system disk and other logic magnetic disc, respectively according to the information of each logic magnetic disc in the information of registration table, the information of system disk and other logic magnetic disc, unique identification is encrypted; Be saved to having carried out the unique identification after encrypting respectively in each logic magnetic disc in corresponding registration table, system disk and other logic magnetic disc.
Preferably, negative module 404, when obtaining unique identification from other logic magnetic disc of computing equipment, is decrypted the unique identification after the encryption obtained from each logic magnetic disc in other logic magnetic disc respectively; Judge that whether the unique identification in each logic magnetic disc after deciphering is consistent; If consistent, then the unique identification of acquisition is defined as the unique identification of computing equipment.
Preferably, the computing equipment identity device of the present embodiment also comprises: obtain memory module 410, after obtaining unique identification in negative module 404 from other logic magnetic disc of computing equipment, the unique identification determined is saved to system disk and the registration table of computing equipment.
Preferably, described set algorithm is MD5 algorithm.
Preferably, identify calculating parameter also to comprise or random number.
Preferably, the computing equipment identity device of the present embodiment also comprises: determination module 412, the unique identification of computing equipment is there is in the system disk of computing equipment if judge for judge module 402, then judge that whether whether the unique identification existed in system disk consistent with the unique identification of the computing equipment existed in registration table and/or other logic magnetic disc, if consistent, then use unique identification computing equipment; Or, if judge module 402 judges the unique identification that there is computing equipment in the registration table of computing equipment, then judge that whether whether the unique identification existed in registration table consistent with the unique identification of the computing equipment existed in system disk and/or other logic magnetic disc, if consistent, then use unique identification computing equipment.
Preferably, the computing equipment identity device of the present embodiment also comprises: arrange module 414, for preserving after unique identification to be stored in the registration table of computing equipment, system disk and other logic magnetic disc by module 408 respectively calculating, uniquely identified amendment attribute is set for forbidding amendment.
Preferably, judge module 402, for searching the computing equipment mark list item in the computing equipment identification document that stores in the system disk of computing equipment, whether there is according to computing equipment mark list item the unique identification that corresponding key assignments judges whether to exist in the system disk of computing equipment computing equipment; Or, for searching the computing equipment mark list item in the registration table of computing equipment, whether there is according to the computing equipment mark list item in registration table the unique identification that corresponding key assignments judges whether to exist in the system disk of computing equipment computing equipment.
Preferably, the computing equipment identity device of the present embodiment also comprises: interactive module 416, for use the unique identification computing equipment that obtains from other logic magnetic disc at identification module 406 after, send data acquisition request to server, in data acquisition request, carry unique identification; Obtain server based on data and obtain request, the data that the computing equipment to unique identification sends.
The computing equipment identity device of the present embodiment is used for realizing corresponding computing equipment identification method in aforementioned multiple embodiment of the method, and has the beneficial effect of corresponding embodiment of the method, does not repeat them here.
Intrinsic not relevant to any certain computer, virtual system or miscellaneous equipment at this algorithm provided.Various general-purpose system also can with use based on together with this teaching.According to description above, the structure required by system that there is the present invention program is apparent.In addition, the present invention is not also for any certain programmed language.It should be understood that and various programming language can be utilized to realize content of the present invention described here, and the description done language-specific is above to disclose preferred forms of the present invention.
In instructions provided herein, describe a large amount of detail.But can understand, embodiments of the invention can be put into practice when not having these details.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly, be to be understood that, in order to simplify the disclosure and to help to understand in each inventive aspect one or more, in the description above to exemplary embodiment of the present invention, each feature of the present invention is grouped together in single embodiment, figure or the description to it sometimes.But, the method for the disclosure should be construed to the following intention of reflection: namely the present invention for required protection requires feature more more than the feature clearly recorded in each claim.Or rather, as claims below reflect, all features of disclosed single embodiment before inventive aspect is to be less than.Therefore, the claims following embodiment are incorporated to this embodiment thus clearly, and wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that and adaptively can change the module in the equipment in embodiment and they are arranged in one or more equipment different from this embodiment.Module in embodiment or unit or assembly can be combined into a module or unit or assembly, and multiple submodule or subelement or sub-component can be put them in addition.Except at least some in such feature and/or process or unit be mutually repel except, any combination can be adopted to combine all processes of all features disclosed in this instructions (comprising adjoint claim, summary and accompanying drawing) and so disclosed any method or equipment or unit.Unless expressly stated otherwise, each feature disclosed in this instructions (comprising adjoint claim, summary and accompanying drawing) can by providing identical, alternative features that is equivalent or similar object replaces.
In addition, those skilled in the art can understand, although embodiments more described herein to comprise in other embodiment some included feature instead of further feature, the combination of the feature of different embodiment means and to be within scope of the present invention and to form different embodiments.Such as, in detail in the claims, the one of any of embodiment required for protection can use with arbitrary array mode.
All parts embodiment of the present invention with hardware implementing, or can realize with the software module run on one or more processor, or realizes with their combination.It will be understood by those of skill in the art that the some or all functions that microprocessor or digital signal processor (DSP) can be used in practice to realize according to the some or all parts in the computing equipment identification schemes of the embodiment of the present invention.The present invention can also be embodied as part or all equipment for performing method as described herein or device program (such as, computer program and computer program).Realizing program of the present invention and can store on a computer-readable medium like this, or the form of one or more signal can be had.Such signal can be downloaded from internet website and obtain, or provides on carrier signal, or provides with any other form.
The present invention will be described instead of limit the invention to it should be noted above-described embodiment, and those skilled in the art can design alternative embodiment when not departing from the scope of claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and does not arrange element in the claims or step.Word "a" or "an" before being positioned at element is not got rid of and be there is multiple such element.The present invention can by means of including the hardware of some different elements and realizing by means of the computing machine of suitably programming.In the unit claim listing some devices, several in these devices can be carry out imbody by same hardware branch.Word first, second and third-class use do not represent any order.Can be title by these word explanations.

Claims (18)

1. a computing equipment identification method, comprising:
Judge the unique identification that whether there is described computing equipment in the system disk of computing equipment or registration table, wherein, described unique identification is calculated by mark calculating parameter, described mark calculating parameter comprise following one of at least: the residue disk size of the computing equipment name of described computing equipment, global unique identification symbol GUID, described system disk;
If do not exist, then from other logic magnetic disc of described computing equipment, obtain described unique identification, wherein, in other logic magnetic disc described, preserve described unique identification in advance;
Computing equipment described in the described unique identification that use obtains from other logic magnetic disc described;
Described computing equipment sends data acquisition request to server, carries described unique identification in described data acquisition request;
Described server is according to described data acquisition request, and the described computing equipment to described unique identification sends data.
2. method according to claim 1, is characterized in that, before whether there is the uniquely identified step of described computing equipment, also comprises in the system disk judging computing equipment described or registration table:
Obtain described mark calculating parameter;
According to described mark calculating parameter, calculate described unique identification according to set algorithm;
Described unique identification is stored into respectively in the described registration table of described computing equipment, described system disk and other logic magnetic disc described.
3. method according to claim 2, is characterized in that, the described step be stored into respectively by described unique identification in the described registration table of described computing equipment, described system disk and other logic magnetic disc described comprises:
Respectively according to the information of each logic magnetic disc in the information of described registration table, the information of described system disk and other logic magnetic disc described, described unique identification is encrypted;
Be saved to having carried out the described unique identification after encrypting respectively in each logic magnetic disc in corresponding described registration table, described system disk and other logic magnetic disc described.
4. method according to claim 3, is characterized in that, describedly from other logic magnetic disc of described computing equipment, obtains described uniquely identified step comprise:
Respectively the unique identification after the encryption obtained from each logic magnetic disc in other logic magnetic disc described is decrypted;
Judge that whether the unique identification in each logic magnetic disc after deciphering is consistent;
If consistent, then the described unique identification obtained is defined as the unique identification of described computing equipment.
5. method according to claim 4, is characterized in that, described from other logic magnetic disc of described computing equipment, obtain described uniquely identified step after, also comprise:
The described unique identification determined is saved to the described system disk of described computing equipment and described registration table.
6. method according to claim 2, is characterized in that, described set algorithm is MD5 algorithm.
7. method according to claim 1, is characterized in that, also comprises:
If there is the unique identification of described computing equipment in the described system disk of described computing equipment, then judge that whether the described unique identification existed in described system disk is consistent with the unique identification of the described computing equipment existed in described registration table and/or other logic magnetic disc described, if consistent, then use computing equipment described in described unique identification;
Or,
If there is the unique identification of described computing equipment in the described registration table of described computing equipment, then judge that whether the described unique identification existed in described registration table is consistent with the unique identification of the described computing equipment existed in described system disk and/or other logic magnetic disc described, if consistent, then use computing equipment described in described unique identification.
8. method according to claim 2, is characterized in that, after the described step be stored into respectively by described unique identification in the described registration table of described computing equipment, described system disk and other logic magnetic disc described, also comprises:
Described uniquely identified amendment attribute is set for forbidding amendment.
9. method according to claim 1, is characterized in that, described judge computing equipment system disk or registration table in whether there is described computing equipment uniquely identified step comprise:
Search the computing equipment mark list item in the computing equipment identification document stored in the system disk of described computing equipment, whether there is according to described computing equipment mark list item the unique identification that corresponding key assignments judges whether to exist in the system disk of described computing equipment described computing equipment;
Or,
Search the computing equipment mark list item in the registration table of described computing equipment, whether there is according to the computing equipment mark list item in described registration table the unique identification that corresponding key assignments judges whether to exist in the system disk of described computing equipment described computing equipment.
10. a computing equipment identity device, comprising:
Judge module, for judging the unique identification that whether there is described computing equipment in the system disk of computing equipment or registration table, wherein, described unique identification is calculated by mark calculating parameter, described mark calculating parameter comprise following one of at least: the residue disk size of the computing equipment name of described computing equipment, global unique identification symbol GUID, described system disk;
Negative module, if for the judged result of described judge module for not exist, then obtain described unique identification, wherein, preserve described unique identification in advance in other logic magnetic disc described from other logic magnetic disc of described computing equipment;
Identification module, for using computing equipment described in the described unique identification that obtains from other logic magnetic disc described;
Interactive module, for use computing equipment described in the described unique identification that obtains from other logic magnetic disc described at described identification module after, sends data acquisition request to server, carries described unique identification in described data acquisition request; Obtain described server according to described data acquisition request, the data that the described computing equipment to described unique identification sends.
11. devices according to claim 10, is characterized in that, also comprise:
Calculate and preserve module, for judge whether there is the unique identification of described computing equipment in the system disk of computing equipment or registration table at described judge module before, obtain described mark calculating parameter; According to described mark calculating parameter, calculate described unique identification according to set algorithm; Described unique identification is stored into respectively in the described registration table of described computing equipment, described system disk and other logic magnetic disc described.
12. devices according to claim 11, it is characterized in that, described calculating preserves module when being stored into respectively by described unique identification in the described registration table of described computing equipment, described system disk and other logic magnetic disc described, respectively according to the information of each logic magnetic disc in the information of described registration table, the information of described system disk and other logic magnetic disc described, described unique identification is encrypted; Be saved to having carried out the described unique identification after encrypting respectively in each logic magnetic disc in corresponding described registration table, described system disk and other logic magnetic disc described.
13. devices according to claim 12, it is characterized in that, described negative module, when obtaining described unique identification from other logic magnetic disc of described computing equipment, is decrypted the unique identification after the encryption obtained from each logic magnetic disc in other logic magnetic disc described respectively; Judge that whether the unique identification in each logic magnetic disc after deciphering is consistent; If consistent, then the described unique identification obtained is defined as the unique identification of described computing equipment.
14. devices according to claim 13, is characterized in that, also comprise:
Obtain memory module, after obtaining described unique identification in described negative module from other logic magnetic disc of described computing equipment, the described unique identification determined is saved to the described system disk of described computing equipment and described registration table.
15. devices according to claim 11, is characterized in that, described set algorithm is MD5 algorithm.
16. devices according to claim 10, is characterized in that, also comprise:
Determination module, the unique identification of described computing equipment is there is in the described system disk of described computing equipment if judge for described judge module, then judge that whether the described unique identification existed in described system disk is consistent with the unique identification of the described computing equipment existed in described registration table and/or other logic magnetic disc described, if consistent, then use computing equipment described in described unique identification; Or, if described judge module judges the unique identification that there is described computing equipment in the described registration table of described computing equipment, then judge that whether the described unique identification existed in described registration table is consistent with the unique identification of the described computing equipment existed in described system disk and/or other logic magnetic disc described, if consistent, then use computing equipment described in described unique identification.
17. devices according to claim 11, is characterized in that, also comprise:
Module being set, after being stored in the described registration table of described computing equipment, described system disk and other logic magnetic disc described in described calculating preservation module respectively by described unique identification, described uniquely identified amendment attribute being set for forbidding amendment.
18. devices according to claim 10, it is characterized in that, described judge module, for searching the computing equipment mark list item in the computing equipment identification document that stores in the system disk of described computing equipment, whether there is according to described computing equipment mark list item the unique identification that corresponding key assignments judges whether to exist in the system disk of described computing equipment described computing equipment; Or, for searching the computing equipment mark list item in the registration table of described computing equipment, whether there is according to the computing equipment mark list item in described registration table the unique identification that corresponding key assignments judges whether to exist in the system disk of described computing equipment described computing equipment.
CN201210397881.6A 2012-10-18 2012-10-18 Computing equipment identification method and device Active CN102930230B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210397881.6A CN102930230B (en) 2012-10-18 2012-10-18 Computing equipment identification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210397881.6A CN102930230B (en) 2012-10-18 2012-10-18 Computing equipment identification method and device

Publications (2)

Publication Number Publication Date
CN102930230A CN102930230A (en) 2013-02-13
CN102930230B true CN102930230B (en) 2015-09-30

Family

ID=47645027

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210397881.6A Active CN102930230B (en) 2012-10-18 2012-10-18 Computing equipment identification method and device

Country Status (1)

Country Link
CN (1) CN102930230B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103905438B (en) * 2014-03-21 2017-07-28 珠海市君天电子科技有限公司 A kind of identification code processing and sending method, client, server and system
CN104573474B (en) * 2014-09-10 2019-01-11 中电科技(北京)有限公司 A kind of identity generation system and method based on UEFI
CN104506512B (en) * 2014-12-15 2017-12-19 北京国双科技有限公司 The restoration methods and device of user's mark
CN105677387B (en) * 2015-12-29 2019-07-19 大连楼兰科技股份有限公司 Benchmark program write-in variation and device based on hardware identifier difference
CN105979021B (en) * 2016-04-26 2019-08-23 珠海豹趣科技有限公司 A kind of information processing method and user terminal
CN106650519A (en) * 2016-12-08 2017-05-10 同盾科技有限公司 Device tracking method and system
CN107704164A (en) * 2017-08-09 2018-02-16 厦门天锐科技股份有限公司 A kind of terminal identifier generation system and method based on screenshotss
CN109858233A (en) * 2018-12-21 2019-06-07 惠州Tcl移动通信有限公司 The mutual recognition methods of chip, device, storage medium and mobile terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6694235B2 (en) * 2001-07-06 2004-02-17 Denso Corporation Vehicular relay device, in-vehicle communication system, failure diagnostic system, vehicle management device, server device and detection and diagnostic program
CN1928767A (en) * 2005-09-07 2007-03-14 鸿富锦精密工业(深圳)有限公司 Method for protecting computer input/output interfaces
CN101266814A (en) * 2008-05-08 2008-09-17 杭州华三通信技术有限公司 Disk location method in storage system and storage system for locating disk
CN102571347A (en) * 2011-12-16 2012-07-11 华为技术有限公司 Method and device for checking field replaceable unit, and communication equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8839460B2 (en) * 2008-03-07 2014-09-16 Qualcomm Incorporated Method for securely communicating information about the location of a compromised computing device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6694235B2 (en) * 2001-07-06 2004-02-17 Denso Corporation Vehicular relay device, in-vehicle communication system, failure diagnostic system, vehicle management device, server device and detection and diagnostic program
CN1928767A (en) * 2005-09-07 2007-03-14 鸿富锦精密工业(深圳)有限公司 Method for protecting computer input/output interfaces
CN101266814A (en) * 2008-05-08 2008-09-17 杭州华三通信技术有限公司 Disk location method in storage system and storage system for locating disk
CN102571347A (en) * 2011-12-16 2012-07-11 华为技术有限公司 Method and device for checking field replaceable unit, and communication equipment

Also Published As

Publication number Publication date
CN102930230A (en) 2013-02-13

Similar Documents

Publication Publication Date Title
CN102932336B (en) Terminal iidentification method and apparatus
CN102930230B (en) Computing equipment identification method and device
CA2775237C (en) System and method of sort-order preserving tokenization
CN105282130A (en) Network node and method of operating the network node
CN105471581A (en) Identity verification method and device
CN109802832B (en) Data file processing method and system, big data processing server and computer storage medium
CN108829899B (en) Data table storage, modification, query and statistical method
US10601580B2 (en) Secure order preserving string compression
CN109977684A (en) A kind of data transmission method, device and terminal device
CN104967591A (en) Cloud storage data read-write method and device, and read-write control method and device
CN112073444B (en) Data set processing method and device and server
US20160065593A1 (en) Device verification prior to registration
CN111091381A (en) Hardware wallet and management method thereof
CN112597525B (en) Data processing method and device based on privacy protection and server
JP2012507767A5 (en)
US8607355B2 (en) Social network privacy using morphed communities
KR102039340B1 (en) Data backup management apparatus that can prevent hacking of storage for data backup and operating method thereof
CN111898157B (en) Unintentional storage access method for machine learning multisource training set
CN105187508A (en) User relationship processing method and system
CN104239307A (en) User information storage method and system
CN114298882A (en) Watermark embedding method and tracing method for CAD data and electronic equipment
Du et al. Secure and verifiable keyword search in multiple clouds
JP2015523633A (en) How to delete information
CN111400269B (en) IPFS file processing method, node, medium and equipment
CN108920131B (en) Data processing method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20170111

Address after: 100015 Chaoyang District Road, Jiuxianqiao, No. 10, building No. 3, floor 15, floor 17, 1701-26,

Patentee after: BEIJING QI'ANXIN SCIENCE & TECHNOLOGY CO., LTD.

Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Patentee before: Beijing Qihoo Technology Co., Ltd.

Patentee before: Qizhi Software (Beijing) Co., Ltd.

CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100015 15, 17 floor 1701-26, 3 building, 10 Jiuxianqiao Road, Chaoyang District, Beijing.

Patentee after: Qianxin Technology Group Co., Ltd.

Address before: 100015 15, 17 floor 1701-26, 3 building, 10 Jiuxianqiao Road, Chaoyang District, Beijing.

Patentee before: BEIJING QI'ANXIN SCIENCE & TECHNOLOGY CO., LTD.