CN105577644A - Encryption and authentication method and system - Google Patents

Encryption and authentication method and system Download PDF

Info

Publication number
CN105577644A
CN105577644A CN201510894323.4A CN201510894323A CN105577644A CN 105577644 A CN105577644 A CN 105577644A CN 201510894323 A CN201510894323 A CN 201510894323A CN 105577644 A CN105577644 A CN 105577644A
Authority
CN
China
Prior art keywords
information
encrypted
hardware
unique identification
encrypt file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510894323.4A
Other languages
Chinese (zh)
Inventor
赵众
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Opzoon Technology Co Ltd
Original Assignee
Opzoon Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Opzoon Technology Co Ltd filed Critical Opzoon Technology Co Ltd
Priority to CN201510894323.4A priority Critical patent/CN105577644A/en
Publication of CN105577644A publication Critical patent/CN105577644A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of information identification and especially relates to an encryption and authentication method and system. The encryption and authentication method comprises the step of generating an encrypted file and the step of authenticating the encrypted file. The step of generating the encrypted file comprises: obtaining CPU information of a processing device where hardware to be encrypted locates, and network card physical address information; splicing the CPU information and the network card physical address information to generate identification information of the hardware to be encrypted; encrypting the identification information to generate unique identification of the hardware to be encrypted; and generating the encrypted file according to the unique identification of the hardware to be encrypted. The step of authenticating the encrypted file comprises: generating unique identification of a processing device to be authenticated according to the step of generating the encrypted file; and reading the unique identification of the encrypted file and comparing the unique identification of the encrypted file with the unique identification of processing device to be authenticated to obtain an authentication result. The method can obtain the encrypted file only corresponding to the hardware to be encrypted, and lays a foundation for utilizing the encrypted file to uniquely control the processing device to obtain use permission of software.

Description

A kind of encryption and authentication method and system
Technical field
The present invention relates to information discriminating technology field, particularly relate to a kind of encryption and authentication method and system.
Background technology
Along with the development of science and technology, the application of various equipment (hardware device and virtual machine facility) gets more and more.At present, No. SN, the product ID that adopts as unique identification (UniqueIdentifier) UID confirming a hardware device or virtual machine facility more.No. SN bar code number being generally a string character and adding numeral, the equipment that No. SN different instructions is different.But the file that normally importing one is unique in the hardware store of equipment preserves No. SN of this equipment, by reading this file, obtains No. SN of this equipment.Such as, for hardware device, the file that importing one is unique in CF card or hard disk, No. SN that preserves this equipment, thus this hardware device is marked; For virtual machine facility, the file that importing one is unique in virtual hard disk, No. SN that preserves this virtual machine, thus this virtual machine is marked.
The unique identification UID of prior art using equipment No. SN as the encrypt file of control appliance, utilizes encrypt file control appliance.When the unique identification UID of encrypt file is identical with the unique identification UID of equipment, allow the function of equipment use encrypt file mandate.But due to storage medium, for hardware device, repeatedly burn card after may occurring that mirror image is made in CF blocking, make multiple CF cards, or by disk copy, make the situation of polylith hard disk; For virtual machine facility, may occur copying virtual unit, make the situation of multiple stage virtual machine.This situation that different equipment can be caused to have identical No. SN occurs, same encrypt file may be come into force to multiple devices.
Summary of the invention
In order to avoid coming into force to multiple devices with same encrypt file, the invention provides a kind of encryption and authentication method and system.
A first aspect of the present invention provides a kind of encryption and authentication method, comprises and generates the step of encrypt file and the step to encrypt file certification; Wherein,
The step of described generation encrypt file comprises:
Obtain CPU information and the mac address of nic information of hardware place to be encrypted treatment facility;
Splice the identification information that described CPU information and described mac address of nic information generate hardware to be encrypted;
Described identification information encryption is generated to the unique identification of hardware to be encrypted; Unique identification according to hardware to be encrypted generates encrypt file;
The described step to encrypt file certification comprises;
The unique identification for the treatment of facility to be certified is generated by the step of described generation encrypt file;
Read the unique identification in encrypt file and obtain authentication result with the unique identification comparison of described treatment facility to be certified.
Further, described encrypt file is license file.
Further, described encrypt file also comprises deadline information;
Described method also comprises:
The useful life of described encrypt file is determined according to described deadline information.
Further, described CPU information comprises:
The character string of the CPU information of hardware place to be encrypted treatment facility.
Further, the character string of the CPU information of described hardware place to be encrypted treatment facility utilizes dmidecode order to obtain.
Further, the described unique identification described identification information encryption being generated to hardware to be encrypted, comprising:
Md5 encryption is performed to described identification information, obtains the unique identification of MD5 test value as hardware to be encrypted.
A second aspect of the present invention provides a kind of encrypted authentication system, comprising: encrypt file generation module and encrypt file authentication module;
Described encrypt file generation module, comprising:
First information acquiring unit, for obtaining CPU information and the mac address of nic information of hardware place to be encrypted treatment facility;
Information concatenation unit, generates the identification information of hardware to be encrypted for splicing described CPU information and described mac address of nic information;
Information encryption unit, for generating the unique identification of hardware to be encrypted to described identification information encryption; Unique identification according to hardware to be encrypted generates encrypt file;
Described encrypt file authentication module, comprising:
Second information acquisition unit, the step for generating encrypt file by encrypt file generation module obtains the unique identification for the treatment of facility to be certified;
Comparing unit, obtains authentication result with the unique identification comparison for the treatment of facility to be certified for the unique identification that reads in encrypt file.
Further, described first information acquiring unit, specifically for: the character string obtaining the CPU information of hardware place to be encrypted treatment facility;
Described information concatenation unit, specifically for splicing the character string of the CPU information of hardware place to be encrypted treatment facility and described mac address of nic information, generates the identification information character string of hardware to be encrypted;
Described information encryption unit, specifically for generating the unique identification of hardware to be encrypted to described identification information character string encryption.
Further, described first information acquiring unit, specifically for:
Dmidecode order is utilized to obtain the character string of the CPU information of hardware place to be encrypted treatment facility.
Further, described information encryption unit, specifically for:
Md5 encryption is performed to described identification information, obtains the unique identification of MD5 test value as hardware to be encrypted.
Encryption and authentication method provided by the invention, by obtaining CPU information and the mac address of nic information of hardware place to be encrypted treatment facility; Encrypt the identification information that described CPU information and described mac address of nic information are spliced into, generate the unique identification of hardware to be encrypted; Thus can generate there is uniquely identified encrypt file.In addition, this method is by obtaining the unique identification for the treatment of facility to be certified by the step generating encrypt file; Read the unique identification in encrypt file and obtain authentication result with the unique identification comparison of described treatment facility to be certified.Thus an encrypt file corresponding treatment facility uniquely can be made, control the rights of using of a treatment facility to software uniquely for utilizing encrypt file and lay the foundation.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet generating the step of encrypt file in the encryption and authentication method that provides of first embodiment of the invention;
Fig. 2 is the schematic flow sheet to the step of encrypt file certification in the encryption and authentication method that provides of first embodiment of the invention;
Fig. 3 is the structural representation of encrypt file generation module in the encrypted authentication system that provides of second embodiment of the invention;
Fig. 4 is the structural representation of encrypt file authentication module in the encrypted authentication system that provides of second embodiment of the invention.
Embodiment
Below in conjunction with accompanying drawing, the specific embodiment of the present invention is further described.Following examples only for technical scheme of the present invention is clearly described, and can not limit the scope of the invention with this.
The encryption and authentication method that the first embodiment of the present invention provides, comprises and generates the step of encrypt file and the step to encrypt file certification; Wherein,
The step of described generation encrypt file comprises:
Step S101, obtains CPU information and the mac address of nic information of hardware place to be encrypted treatment facility;
Step S102, splices the identification information that described CPU information and described mac address of nic information generate hardware to be encrypted;
Step S103, generates the unique identification of hardware to be encrypted to described identification information encryption; Unique identification according to hardware to be encrypted generates encrypt file;
The described step to encrypt file certification, as shown in Figure 2, comprises;
Step S201, generates the unique identification for the treatment of facility to be certified by the step of described generation encrypt file;
Step S202, reads the unique identification in encrypt file and obtains authentication result with the unique identification comparison of described treatment facility to be certified.
Encryption and authentication method provided by the invention, by obtaining CPU information and the mac address of nic information of hardware place to be encrypted treatment facility; Encrypt the identification information that described CPU information and described mac address of nic information are spliced into, generate the unique identification of hardware to be encrypted; Thus can generate there is uniquely identified encrypt file.In addition, this method is by obtaining the unique identification for the treatment of facility to be certified by the step generating encrypt file; Read the unique identification in encrypt file and obtain authentication result with the unique identification comparison of described treatment facility to be certified.Thus an encrypt file corresponding treatment facility uniquely can be made, control the rights of using of a treatment facility to software uniquely for utilizing encrypt file and lay the foundation.
In the specific implementation, generate the uniquely identified method for the treatment of facility to be certified, can comprise the following steps:
Obtain CPU information and the mac address of nic information for the treatment of facility to be certified;
Splice the identification information that the CPU information for the treatment of facility to be certified and mac address of nic information generate treatment facility to be certified;
The identification information encryption treating authentication processing device generates the unique identification for the treatment of facility to be certified.
In the specific implementation, hardware place treatment facility to be encrypted and treatment facility to be certified can be mobile phone, PC (PersonalComputer) computer, panel computer, vehicle-mounted computer, intelligent watch or other smart machines.In the specific implementation, hardware place treatment facility to be encrypted and equipment to be certified also can be the virtual units such as virtual machine.
In the specific implementation, hardware to be encrypted can be CF card, hard disk or virtual hard disk.In the specific implementation, described encrypt file can be license file.
The benefit of design like this is, the license file generated according to the unique identification UID of hardware to be encrypted can be adopted to be encrypted software, when the unique identification UID of license file is identical with the unique identification UID for the treatment of facility to be certified, license file just allows its software encrypted to authorize this treatment facility to be certified, and this treatment facility to be certified just can use the function of license file authorizing in this software.Thus avoid because license file cannot carry out unique authentication to treatment facility and make software marker bear economic loss.
In the specific implementation, described encrypt file can also comprise deadline information;
Described method also comprises:
The useful life of described encrypt file is determined according to described deadline information.
The benefit of design like this is, can need to extend encrypt file to the rights of using of some function for the treatment of facility according to user.
In the specific implementation, encrypt file is upgraded, can also comprise, expand treatment facility to the rights of using of software function.
In the specific implementation, described CPU information can comprise:
The character string of the CPU information of hardware place to be encrypted treatment facility.
So can conveniently be encrypted the identification information of the hardware to be encrypted obtained.
In the specific implementation, the character string of the CPU information of described hardware place to be encrypted treatment facility can utilize dmidecode order to obtain.
So can under linux system the character string of the CPU information of quick equipment.
In the specific implementation, also can, according to the system of equipment, other method be utilized to obtain the character string of CPU information.Java such as can be adopted to obtain the character string for the treatment of facility CPU information.
In the specific implementation, the described unique identification described identification information encryption being generated to hardware to be encrypted, can comprise:
Md5 encryption is performed to described identification information, obtains the unique identification of MD5 test value as hardware to be encrypted.
The benefit of design like this is, can ensure obtain hardware to be encrypted unique identification UID uniqueness prerequisite under, avoid the unique identification UID by cracking hardware to be encrypted expose hardware place to be encrypted treatment facility CPU information and mac address of nic.
In the specific implementation, alternate manner also can be adopted to encrypt described identification information character string.Such as can utilize data encryption standard algorithm (DataEncryptionStandard) DES or utilize public key cryptography algorithm RSA to be encrypted described identification information character string, using the test value that obtains after encryption as the unique identification UID of described equipment.
For example, the CF card a (i.e. hardware to be encrypted, it can also be entity hard disk, also can be virtual hard disk etc.) for the treatment of facility A (this equipment can make PC or virtual machine etc.) has suffered generation encrypt file; Known by above-mentioned steps, obtain the CPU information on treatment facility A and mac address of nic information, and the CPU information on obtained treatment facility A and mac address of nic information are spliced, so just obtain identification information, again the unique identification that (can adopt the MD5 value calculating described identification information) obtains CF card a is encrypted to described identification information, and utilizes this unique identification to generate encrypt file (i.e. license file).
If now someone obtains by carrying out the means such as mirror image burning card to CF card a the CF card b comprising its encrypt file, and CF card b is utilized on other treatment facilities, as utilized on treatment facility B (i.e. treatment facility to be certified), the unique identification now generated on treatment facility B utilizes the CPU information on treatment facility B and mac address of nic information to splice and obtains after encrypting, because the CPU information on treatment facility A and mac address of nic information exist different from the CPU information on treatment facility B and mac address of nic information certainly, therefore the unique identification produced on treatment facility B is certainly different with the unique identification in encrypt file, when comparing result is different, corresponding function or the authority for the treatment of facility B can be limited, thus the economic interests of protection manufacturer.This method, by binding by force with hardware, uniquely can confirm a hardware device, have more accuracy; And can prevent copy from occurring, avoid same license also can come into force on multiple distinct device, thus the economic loss caused.
The encrypted authentication system that the second embodiment of the present invention provides, comprising: encrypt file generation module and encrypt file authentication module;
Described encrypt file generation module, as shown in Figure 3, comprising:
First information acquiring unit 301, for obtaining CPU information and the mac address of nic information of hardware place to be encrypted treatment facility;
Information concatenation unit 302, generates the identification information of hardware to be encrypted for splicing described CPU information and described mac address of nic information;
Information encryption unit 303, for generating the unique identification of hardware to be encrypted to described identification information encryption; Unique identification according to hardware to be encrypted generates encrypt file;
Described encrypt file authentication module, as shown in Figure 4, comprising:
Second information acquisition unit 401, the step for generating encrypt file by encrypt file generation module obtains the unique identification for the treatment of facility to be certified;
Comparing unit 402, obtains authentication result with the unique identification comparison for the treatment of facility to be certified for the unique identification that reads in encrypt file.
In the specific implementation, first information acquiring unit 301, can be specifically for: the character string obtaining the CPU information of hardware place to be encrypted treatment facility;
Information concatenation unit 302, specifically for splicing the character string of the CPU information of hardware place to be encrypted treatment facility and described mac address of nic information, generates the identification information character string of hardware to be encrypted;
Information encryption unit 303, specifically for generating the unique identification of hardware to be encrypted to described identification information character string encryption.
In the specific implementation, first information acquiring unit 301, can be specifically for:
Dmidecode order is utilized to obtain the character string of the CPU information of hardware place to be encrypted treatment facility.
In the specific implementation, information encryption unit 303, can be specifically for:
Md5 encryption is performed to described identification information, obtains the unique identification of MD5 test value as hardware to be encrypted.
The above is only the preferred embodiment of the present invention; it should be pointed out that for those skilled in the art, under the prerequisite not departing from the technology of the present invention principle; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (10)

1. an encryption and authentication method, is characterized in that, comprises and generates the step of encrypt file and the step to encrypt file certification; Wherein,
The step of described generation encrypt file comprises:
Obtain CPU information and the mac address of nic information of hardware place to be encrypted treatment facility;
Splice the identification information that described CPU information and described mac address of nic information generate hardware to be encrypted;
Described identification information encryption is generated to the unique identification of hardware to be encrypted; Unique identification according to hardware to be encrypted generates encrypt file;
The described step to encrypt file certification comprises;
The unique identification for the treatment of facility to be certified is generated by the step of described generation encrypt file;
Read the unique identification in encrypt file and obtain authentication result with the unique identification comparison of described treatment facility to be certified.
2. method according to claim 1, is characterized in that, described encrypt file is license file.
3. method according to claim 1, is characterized in that, described encrypt file also comprises deadline information;
Described method also comprises:
The useful life of described encrypt file is determined according to described deadline information.
4. method according to claim 1, is characterized in that, described CPU information comprises:
The character string of the CPU information of hardware place to be encrypted treatment facility.
5. method according to claim 4, is characterized in that, the character string of the CPU information of described hardware place to be encrypted treatment facility utilizes dmidecode order to obtain.
6. method according to claim 1, is characterized in that, the described unique identification described identification information encryption being generated to hardware to be encrypted, comprising:
Md5 encryption is performed to described identification information, obtains the unique identification of MD5 test value as hardware to be encrypted.
7. an encrypted authentication system, is characterized in that, comprising: encrypt file generation module and encrypt file authentication module;
Described encrypt file generation module, comprising:
First information acquiring unit, for obtaining CPU information and the mac address of nic information of hardware place to be encrypted treatment facility;
Information concatenation unit, generates the identification information of hardware to be encrypted for splicing described CPU information and described mac address of nic information;
Information encryption unit, for generating the unique identification of hardware to be encrypted to described identification information encryption; Unique identification according to hardware to be encrypted generates encrypt file;
Described encrypt file authentication module, comprising:
Second information acquisition unit, the step for generating encrypt file by encrypt file generation module obtains the unique identification for the treatment of facility to be certified;
Comparing unit, obtains authentication result with the unique identification comparison for the treatment of facility to be certified for the unique identification that reads in encrypt file.
8. system according to claim 7, is characterized in that, described first information acquiring unit, specifically for: the character string obtaining the CPU information of hardware place to be encrypted treatment facility;
Described information concatenation unit, specifically for splicing the character string of hardware place to be encrypted treatment facility CPU information and described mac address of nic information, generates the identification information character string of hardware to be encrypted;
Described information encryption unit, specifically for generating the unique identification of hardware to be encrypted to described identification information character string encryption.
9. system according to claim 8, is characterized in that, described first information acquiring unit, specifically for:
Dmidecode order is utilized to obtain the character string of the CPU information of hardware place to be encrypted treatment facility.
10. system according to claim 8, is characterized in that, described information encryption unit, specifically for:
Md5 encryption is performed to described identification information, obtains the unique identification of MD5 test value as hardware to be encrypted.
CN201510894323.4A 2015-12-07 2015-12-07 Encryption and authentication method and system Pending CN105577644A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510894323.4A CN105577644A (en) 2015-12-07 2015-12-07 Encryption and authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510894323.4A CN105577644A (en) 2015-12-07 2015-12-07 Encryption and authentication method and system

Publications (1)

Publication Number Publication Date
CN105577644A true CN105577644A (en) 2016-05-11

Family

ID=55887301

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510894323.4A Pending CN105577644A (en) 2015-12-07 2015-12-07 Encryption and authentication method and system

Country Status (1)

Country Link
CN (1) CN105577644A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106411513A (en) * 2016-12-02 2017-02-15 美的智慧家居科技有限公司 Method and device for key negotiation in local area network communication
CN106603486A (en) * 2016-11-03 2017-04-26 厦门雅迅网络股份有限公司 Mobile terminal safety authorization method and system
CN107483485A (en) * 2017-09-13 2017-12-15 深圳市屯奇尔科技有限公司 Generation method, authorization method, relevant apparatus and the terminal device of authorization code
CN108880812A (en) * 2017-05-09 2018-11-23 北京京东尚科信息技术有限公司 The method and system of data encryption
CN109086578A (en) * 2017-06-14 2018-12-25 中兴通讯股份有限公司 A kind of method that soft ware authorization uses, equipment and storage medium
CN110096685A (en) * 2019-04-28 2019-08-06 新华三信息安全技术有限公司 A kind of device identification generation method and device
CN110909316A (en) * 2019-11-14 2020-03-24 武汉正维电子技术有限公司 Encryption protection method of single chip microcomputer software and storage medium

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106603486A (en) * 2016-11-03 2017-04-26 厦门雅迅网络股份有限公司 Mobile terminal safety authorization method and system
CN106603486B (en) * 2016-11-03 2021-09-07 厦门雅迅网络股份有限公司 Method and system for security authorization of mobile terminal
CN106411513A (en) * 2016-12-02 2017-02-15 美的智慧家居科技有限公司 Method and device for key negotiation in local area network communication
CN106411513B (en) * 2016-12-02 2019-10-18 美的智慧家居科技有限公司 Cryptographic key negotiation method and device in local area network communication
CN108880812A (en) * 2017-05-09 2018-11-23 北京京东尚科信息技术有限公司 The method and system of data encryption
CN108880812B (en) * 2017-05-09 2022-08-09 北京京东尚科信息技术有限公司 Method and system for data encryption
CN109086578A (en) * 2017-06-14 2018-12-25 中兴通讯股份有限公司 A kind of method that soft ware authorization uses, equipment and storage medium
CN107483485A (en) * 2017-09-13 2017-12-15 深圳市屯奇尔科技有限公司 Generation method, authorization method, relevant apparatus and the terminal device of authorization code
CN110096685A (en) * 2019-04-28 2019-08-06 新华三信息安全技术有限公司 A kind of device identification generation method and device
CN110096685B (en) * 2019-04-28 2023-06-20 新华三信息安全技术有限公司 Equipment identifier generation method and device
CN110909316A (en) * 2019-11-14 2020-03-24 武汉正维电子技术有限公司 Encryption protection method of single chip microcomputer software and storage medium
CN110909316B (en) * 2019-11-14 2023-05-09 武汉正维电子技术有限公司 Encryption protection method for singlechip software and storage medium

Similar Documents

Publication Publication Date Title
CN105577644A (en) Encryption and authentication method and system
CN110519260B (en) Information processing method and information processing device
CN110798315B (en) Data processing method and device based on block chain and terminal
KR101362380B1 (en) Method and device for Digital Rights Management
US20110016317A1 (en) Key storage device, biometric authentication device, biometric authentication system, key management method, biometric authentication method, and program
CN106790156B (en) Intelligent device binding method and device
CN111034120B (en) Encryption key management based on identity information
CN109313690A (en) Self-contained encryption boot policy verifying
EP2715598B1 (en) Method and apparatus for authenticating a non-volatile memory device
US9734091B2 (en) Remote load and update card emulation support
KR20160040322A (en) System and method for key management for issuer security domain using global platform specifications
CN103460195A (en) System and method for secure software update
JP2011028688A (en) Information processing apparatus, program and information processing system
CN105518687A (en) Secure data storage
CN106936588B (en) Hosting method, device and system of hardware control lock
CN106033503A (en) Method, device and system of online writing application secret key into digital content equipment
EP2503482A1 (en) Electronic device with flash memory component
JP6553810B2 (en) Payment authentication method and apparatus for mobile terminal and mobile terminal
JP2015104020A (en) Communication terminal device, communication terminal association system, communication terminal association method and computer program
US9177123B1 (en) Detecting illegitimate code generators
JP6318868B2 (en) Authentication system and portable communication terminal
KR101711024B1 (en) Method for accessing temper-proof device and apparatus enabling of the method
CN116527330A (en) System login method and device, storage medium and electronic equipment
CN113316915B (en) Unlocking a data storage device
CN101404573B (en) Authorization method, system and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination