CN105577644A - Encryption and authentication method and system - Google Patents
Encryption and authentication method and system Download PDFInfo
- Publication number
- CN105577644A CN105577644A CN201510894323.4A CN201510894323A CN105577644A CN 105577644 A CN105577644 A CN 105577644A CN 201510894323 A CN201510894323 A CN 201510894323A CN 105577644 A CN105577644 A CN 105577644A
- Authority
- CN
- China
- Prior art keywords
- information
- encrypted
- hardware
- unique identification
- encrypt file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to the technical field of information identification and especially relates to an encryption and authentication method and system. The encryption and authentication method comprises the step of generating an encrypted file and the step of authenticating the encrypted file. The step of generating the encrypted file comprises: obtaining CPU information of a processing device where hardware to be encrypted locates, and network card physical address information; splicing the CPU information and the network card physical address information to generate identification information of the hardware to be encrypted; encrypting the identification information to generate unique identification of the hardware to be encrypted; and generating the encrypted file according to the unique identification of the hardware to be encrypted. The step of authenticating the encrypted file comprises: generating unique identification of a processing device to be authenticated according to the step of generating the encrypted file; and reading the unique identification of the encrypted file and comparing the unique identification of the encrypted file with the unique identification of processing device to be authenticated to obtain an authentication result. The method can obtain the encrypted file only corresponding to the hardware to be encrypted, and lays a foundation for utilizing the encrypted file to uniquely control the processing device to obtain use permission of software.
Description
Technical field
The present invention relates to information discriminating technology field, particularly relate to a kind of encryption and authentication method and system.
Background technology
Along with the development of science and technology, the application of various equipment (hardware device and virtual machine facility) gets more and more.At present, No. SN, the product ID that adopts as unique identification (UniqueIdentifier) UID confirming a hardware device or virtual machine facility more.No. SN bar code number being generally a string character and adding numeral, the equipment that No. SN different instructions is different.But the file that normally importing one is unique in the hardware store of equipment preserves No. SN of this equipment, by reading this file, obtains No. SN of this equipment.Such as, for hardware device, the file that importing one is unique in CF card or hard disk, No. SN that preserves this equipment, thus this hardware device is marked; For virtual machine facility, the file that importing one is unique in virtual hard disk, No. SN that preserves this virtual machine, thus this virtual machine is marked.
The unique identification UID of prior art using equipment No. SN as the encrypt file of control appliance, utilizes encrypt file control appliance.When the unique identification UID of encrypt file is identical with the unique identification UID of equipment, allow the function of equipment use encrypt file mandate.But due to storage medium, for hardware device, repeatedly burn card after may occurring that mirror image is made in CF blocking, make multiple CF cards, or by disk copy, make the situation of polylith hard disk; For virtual machine facility, may occur copying virtual unit, make the situation of multiple stage virtual machine.This situation that different equipment can be caused to have identical No. SN occurs, same encrypt file may be come into force to multiple devices.
Summary of the invention
In order to avoid coming into force to multiple devices with same encrypt file, the invention provides a kind of encryption and authentication method and system.
A first aspect of the present invention provides a kind of encryption and authentication method, comprises and generates the step of encrypt file and the step to encrypt file certification; Wherein,
The step of described generation encrypt file comprises:
Obtain CPU information and the mac address of nic information of hardware place to be encrypted treatment facility;
Splice the identification information that described CPU information and described mac address of nic information generate hardware to be encrypted;
Described identification information encryption is generated to the unique identification of hardware to be encrypted; Unique identification according to hardware to be encrypted generates encrypt file;
The described step to encrypt file certification comprises;
The unique identification for the treatment of facility to be certified is generated by the step of described generation encrypt file;
Read the unique identification in encrypt file and obtain authentication result with the unique identification comparison of described treatment facility to be certified.
Further, described encrypt file is license file.
Further, described encrypt file also comprises deadline information;
Described method also comprises:
The useful life of described encrypt file is determined according to described deadline information.
Further, described CPU information comprises:
The character string of the CPU information of hardware place to be encrypted treatment facility.
Further, the character string of the CPU information of described hardware place to be encrypted treatment facility utilizes dmidecode order to obtain.
Further, the described unique identification described identification information encryption being generated to hardware to be encrypted, comprising:
Md5 encryption is performed to described identification information, obtains the unique identification of MD5 test value as hardware to be encrypted.
A second aspect of the present invention provides a kind of encrypted authentication system, comprising: encrypt file generation module and encrypt file authentication module;
Described encrypt file generation module, comprising:
First information acquiring unit, for obtaining CPU information and the mac address of nic information of hardware place to be encrypted treatment facility;
Information concatenation unit, generates the identification information of hardware to be encrypted for splicing described CPU information and described mac address of nic information;
Information encryption unit, for generating the unique identification of hardware to be encrypted to described identification information encryption; Unique identification according to hardware to be encrypted generates encrypt file;
Described encrypt file authentication module, comprising:
Second information acquisition unit, the step for generating encrypt file by encrypt file generation module obtains the unique identification for the treatment of facility to be certified;
Comparing unit, obtains authentication result with the unique identification comparison for the treatment of facility to be certified for the unique identification that reads in encrypt file.
Further, described first information acquiring unit, specifically for: the character string obtaining the CPU information of hardware place to be encrypted treatment facility;
Described information concatenation unit, specifically for splicing the character string of the CPU information of hardware place to be encrypted treatment facility and described mac address of nic information, generates the identification information character string of hardware to be encrypted;
Described information encryption unit, specifically for generating the unique identification of hardware to be encrypted to described identification information character string encryption.
Further, described first information acquiring unit, specifically for:
Dmidecode order is utilized to obtain the character string of the CPU information of hardware place to be encrypted treatment facility.
Further, described information encryption unit, specifically for:
Md5 encryption is performed to described identification information, obtains the unique identification of MD5 test value as hardware to be encrypted.
Encryption and authentication method provided by the invention, by obtaining CPU information and the mac address of nic information of hardware place to be encrypted treatment facility; Encrypt the identification information that described CPU information and described mac address of nic information are spliced into, generate the unique identification of hardware to be encrypted; Thus can generate there is uniquely identified encrypt file.In addition, this method is by obtaining the unique identification for the treatment of facility to be certified by the step generating encrypt file; Read the unique identification in encrypt file and obtain authentication result with the unique identification comparison of described treatment facility to be certified.Thus an encrypt file corresponding treatment facility uniquely can be made, control the rights of using of a treatment facility to software uniquely for utilizing encrypt file and lay the foundation.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet generating the step of encrypt file in the encryption and authentication method that provides of first embodiment of the invention;
Fig. 2 is the schematic flow sheet to the step of encrypt file certification in the encryption and authentication method that provides of first embodiment of the invention;
Fig. 3 is the structural representation of encrypt file generation module in the encrypted authentication system that provides of second embodiment of the invention;
Fig. 4 is the structural representation of encrypt file authentication module in the encrypted authentication system that provides of second embodiment of the invention.
Embodiment
Below in conjunction with accompanying drawing, the specific embodiment of the present invention is further described.Following examples only for technical scheme of the present invention is clearly described, and can not limit the scope of the invention with this.
The encryption and authentication method that the first embodiment of the present invention provides, comprises and generates the step of encrypt file and the step to encrypt file certification; Wherein,
The step of described generation encrypt file comprises:
Step S101, obtains CPU information and the mac address of nic information of hardware place to be encrypted treatment facility;
Step S102, splices the identification information that described CPU information and described mac address of nic information generate hardware to be encrypted;
Step S103, generates the unique identification of hardware to be encrypted to described identification information encryption; Unique identification according to hardware to be encrypted generates encrypt file;
The described step to encrypt file certification, as shown in Figure 2, comprises;
Step S201, generates the unique identification for the treatment of facility to be certified by the step of described generation encrypt file;
Step S202, reads the unique identification in encrypt file and obtains authentication result with the unique identification comparison of described treatment facility to be certified.
Encryption and authentication method provided by the invention, by obtaining CPU information and the mac address of nic information of hardware place to be encrypted treatment facility; Encrypt the identification information that described CPU information and described mac address of nic information are spliced into, generate the unique identification of hardware to be encrypted; Thus can generate there is uniquely identified encrypt file.In addition, this method is by obtaining the unique identification for the treatment of facility to be certified by the step generating encrypt file; Read the unique identification in encrypt file and obtain authentication result with the unique identification comparison of described treatment facility to be certified.Thus an encrypt file corresponding treatment facility uniquely can be made, control the rights of using of a treatment facility to software uniquely for utilizing encrypt file and lay the foundation.
In the specific implementation, generate the uniquely identified method for the treatment of facility to be certified, can comprise the following steps:
Obtain CPU information and the mac address of nic information for the treatment of facility to be certified;
Splice the identification information that the CPU information for the treatment of facility to be certified and mac address of nic information generate treatment facility to be certified;
The identification information encryption treating authentication processing device generates the unique identification for the treatment of facility to be certified.
In the specific implementation, hardware place treatment facility to be encrypted and treatment facility to be certified can be mobile phone, PC (PersonalComputer) computer, panel computer, vehicle-mounted computer, intelligent watch or other smart machines.In the specific implementation, hardware place treatment facility to be encrypted and equipment to be certified also can be the virtual units such as virtual machine.
In the specific implementation, hardware to be encrypted can be CF card, hard disk or virtual hard disk.In the specific implementation, described encrypt file can be license file.
The benefit of design like this is, the license file generated according to the unique identification UID of hardware to be encrypted can be adopted to be encrypted software, when the unique identification UID of license file is identical with the unique identification UID for the treatment of facility to be certified, license file just allows its software encrypted to authorize this treatment facility to be certified, and this treatment facility to be certified just can use the function of license file authorizing in this software.Thus avoid because license file cannot carry out unique authentication to treatment facility and make software marker bear economic loss.
In the specific implementation, described encrypt file can also comprise deadline information;
Described method also comprises:
The useful life of described encrypt file is determined according to described deadline information.
The benefit of design like this is, can need to extend encrypt file to the rights of using of some function for the treatment of facility according to user.
In the specific implementation, encrypt file is upgraded, can also comprise, expand treatment facility to the rights of using of software function.
In the specific implementation, described CPU information can comprise:
The character string of the CPU information of hardware place to be encrypted treatment facility.
So can conveniently be encrypted the identification information of the hardware to be encrypted obtained.
In the specific implementation, the character string of the CPU information of described hardware place to be encrypted treatment facility can utilize dmidecode order to obtain.
So can under linux system the character string of the CPU information of quick equipment.
In the specific implementation, also can, according to the system of equipment, other method be utilized to obtain the character string of CPU information.Java such as can be adopted to obtain the character string for the treatment of facility CPU information.
In the specific implementation, the described unique identification described identification information encryption being generated to hardware to be encrypted, can comprise:
Md5 encryption is performed to described identification information, obtains the unique identification of MD5 test value as hardware to be encrypted.
The benefit of design like this is, can ensure obtain hardware to be encrypted unique identification UID uniqueness prerequisite under, avoid the unique identification UID by cracking hardware to be encrypted expose hardware place to be encrypted treatment facility CPU information and mac address of nic.
In the specific implementation, alternate manner also can be adopted to encrypt described identification information character string.Such as can utilize data encryption standard algorithm (DataEncryptionStandard) DES or utilize public key cryptography algorithm RSA to be encrypted described identification information character string, using the test value that obtains after encryption as the unique identification UID of described equipment.
For example, the CF card a (i.e. hardware to be encrypted, it can also be entity hard disk, also can be virtual hard disk etc.) for the treatment of facility A (this equipment can make PC or virtual machine etc.) has suffered generation encrypt file; Known by above-mentioned steps, obtain the CPU information on treatment facility A and mac address of nic information, and the CPU information on obtained treatment facility A and mac address of nic information are spliced, so just obtain identification information, again the unique identification that (can adopt the MD5 value calculating described identification information) obtains CF card a is encrypted to described identification information, and utilizes this unique identification to generate encrypt file (i.e. license file).
If now someone obtains by carrying out the means such as mirror image burning card to CF card a the CF card b comprising its encrypt file, and CF card b is utilized on other treatment facilities, as utilized on treatment facility B (i.e. treatment facility to be certified), the unique identification now generated on treatment facility B utilizes the CPU information on treatment facility B and mac address of nic information to splice and obtains after encrypting, because the CPU information on treatment facility A and mac address of nic information exist different from the CPU information on treatment facility B and mac address of nic information certainly, therefore the unique identification produced on treatment facility B is certainly different with the unique identification in encrypt file, when comparing result is different, corresponding function or the authority for the treatment of facility B can be limited, thus the economic interests of protection manufacturer.This method, by binding by force with hardware, uniquely can confirm a hardware device, have more accuracy; And can prevent copy from occurring, avoid same license also can come into force on multiple distinct device, thus the economic loss caused.
The encrypted authentication system that the second embodiment of the present invention provides, comprising: encrypt file generation module and encrypt file authentication module;
Described encrypt file generation module, as shown in Figure 3, comprising:
First information acquiring unit 301, for obtaining CPU information and the mac address of nic information of hardware place to be encrypted treatment facility;
Information concatenation unit 302, generates the identification information of hardware to be encrypted for splicing described CPU information and described mac address of nic information;
Information encryption unit 303, for generating the unique identification of hardware to be encrypted to described identification information encryption; Unique identification according to hardware to be encrypted generates encrypt file;
Described encrypt file authentication module, as shown in Figure 4, comprising:
Second information acquisition unit 401, the step for generating encrypt file by encrypt file generation module obtains the unique identification for the treatment of facility to be certified;
Comparing unit 402, obtains authentication result with the unique identification comparison for the treatment of facility to be certified for the unique identification that reads in encrypt file.
In the specific implementation, first information acquiring unit 301, can be specifically for: the character string obtaining the CPU information of hardware place to be encrypted treatment facility;
Information concatenation unit 302, specifically for splicing the character string of the CPU information of hardware place to be encrypted treatment facility and described mac address of nic information, generates the identification information character string of hardware to be encrypted;
Information encryption unit 303, specifically for generating the unique identification of hardware to be encrypted to described identification information character string encryption.
In the specific implementation, first information acquiring unit 301, can be specifically for:
Dmidecode order is utilized to obtain the character string of the CPU information of hardware place to be encrypted treatment facility.
In the specific implementation, information encryption unit 303, can be specifically for:
Md5 encryption is performed to described identification information, obtains the unique identification of MD5 test value as hardware to be encrypted.
The above is only the preferred embodiment of the present invention; it should be pointed out that for those skilled in the art, under the prerequisite not departing from the technology of the present invention principle; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.
Claims (10)
1. an encryption and authentication method, is characterized in that, comprises and generates the step of encrypt file and the step to encrypt file certification; Wherein,
The step of described generation encrypt file comprises:
Obtain CPU information and the mac address of nic information of hardware place to be encrypted treatment facility;
Splice the identification information that described CPU information and described mac address of nic information generate hardware to be encrypted;
Described identification information encryption is generated to the unique identification of hardware to be encrypted; Unique identification according to hardware to be encrypted generates encrypt file;
The described step to encrypt file certification comprises;
The unique identification for the treatment of facility to be certified is generated by the step of described generation encrypt file;
Read the unique identification in encrypt file and obtain authentication result with the unique identification comparison of described treatment facility to be certified.
2. method according to claim 1, is characterized in that, described encrypt file is license file.
3. method according to claim 1, is characterized in that, described encrypt file also comprises deadline information;
Described method also comprises:
The useful life of described encrypt file is determined according to described deadline information.
4. method according to claim 1, is characterized in that, described CPU information comprises:
The character string of the CPU information of hardware place to be encrypted treatment facility.
5. method according to claim 4, is characterized in that, the character string of the CPU information of described hardware place to be encrypted treatment facility utilizes dmidecode order to obtain.
6. method according to claim 1, is characterized in that, the described unique identification described identification information encryption being generated to hardware to be encrypted, comprising:
Md5 encryption is performed to described identification information, obtains the unique identification of MD5 test value as hardware to be encrypted.
7. an encrypted authentication system, is characterized in that, comprising: encrypt file generation module and encrypt file authentication module;
Described encrypt file generation module, comprising:
First information acquiring unit, for obtaining CPU information and the mac address of nic information of hardware place to be encrypted treatment facility;
Information concatenation unit, generates the identification information of hardware to be encrypted for splicing described CPU information and described mac address of nic information;
Information encryption unit, for generating the unique identification of hardware to be encrypted to described identification information encryption; Unique identification according to hardware to be encrypted generates encrypt file;
Described encrypt file authentication module, comprising:
Second information acquisition unit, the step for generating encrypt file by encrypt file generation module obtains the unique identification for the treatment of facility to be certified;
Comparing unit, obtains authentication result with the unique identification comparison for the treatment of facility to be certified for the unique identification that reads in encrypt file.
8. system according to claim 7, is characterized in that, described first information acquiring unit, specifically for: the character string obtaining the CPU information of hardware place to be encrypted treatment facility;
Described information concatenation unit, specifically for splicing the character string of hardware place to be encrypted treatment facility CPU information and described mac address of nic information, generates the identification information character string of hardware to be encrypted;
Described information encryption unit, specifically for generating the unique identification of hardware to be encrypted to described identification information character string encryption.
9. system according to claim 8, is characterized in that, described first information acquiring unit, specifically for:
Dmidecode order is utilized to obtain the character string of the CPU information of hardware place to be encrypted treatment facility.
10. system according to claim 8, is characterized in that, described information encryption unit, specifically for:
Md5 encryption is performed to described identification information, obtains the unique identification of MD5 test value as hardware to be encrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510894323.4A CN105577644A (en) | 2015-12-07 | 2015-12-07 | Encryption and authentication method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510894323.4A CN105577644A (en) | 2015-12-07 | 2015-12-07 | Encryption and authentication method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105577644A true CN105577644A (en) | 2016-05-11 |
Family
ID=55887301
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510894323.4A Pending CN105577644A (en) | 2015-12-07 | 2015-12-07 | Encryption and authentication method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105577644A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106411513A (en) * | 2016-12-02 | 2017-02-15 | 美的智慧家居科技有限公司 | Method and device for key negotiation in local area network communication |
CN106603486A (en) * | 2016-11-03 | 2017-04-26 | 厦门雅迅网络股份有限公司 | Mobile terminal safety authorization method and system |
CN107483485A (en) * | 2017-09-13 | 2017-12-15 | 深圳市屯奇尔科技有限公司 | Generation method, authorization method, relevant apparatus and the terminal device of authorization code |
CN108880812A (en) * | 2017-05-09 | 2018-11-23 | 北京京东尚科信息技术有限公司 | The method and system of data encryption |
CN109086578A (en) * | 2017-06-14 | 2018-12-25 | 中兴通讯股份有限公司 | A kind of method that soft ware authorization uses, equipment and storage medium |
CN110096685A (en) * | 2019-04-28 | 2019-08-06 | 新华三信息安全技术有限公司 | A kind of device identification generation method and device |
CN110909316A (en) * | 2019-11-14 | 2020-03-24 | 武汉正维电子技术有限公司 | Encryption protection method of single chip microcomputer software and storage medium |
-
2015
- 2015-12-07 CN CN201510894323.4A patent/CN105577644A/en active Pending
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106603486A (en) * | 2016-11-03 | 2017-04-26 | 厦门雅迅网络股份有限公司 | Mobile terminal safety authorization method and system |
CN106603486B (en) * | 2016-11-03 | 2021-09-07 | 厦门雅迅网络股份有限公司 | Method and system for security authorization of mobile terminal |
CN106411513A (en) * | 2016-12-02 | 2017-02-15 | 美的智慧家居科技有限公司 | Method and device for key negotiation in local area network communication |
CN106411513B (en) * | 2016-12-02 | 2019-10-18 | 美的智慧家居科技有限公司 | Cryptographic key negotiation method and device in local area network communication |
CN108880812A (en) * | 2017-05-09 | 2018-11-23 | 北京京东尚科信息技术有限公司 | The method and system of data encryption |
CN108880812B (en) * | 2017-05-09 | 2022-08-09 | 北京京东尚科信息技术有限公司 | Method and system for data encryption |
CN109086578A (en) * | 2017-06-14 | 2018-12-25 | 中兴通讯股份有限公司 | A kind of method that soft ware authorization uses, equipment and storage medium |
CN107483485A (en) * | 2017-09-13 | 2017-12-15 | 深圳市屯奇尔科技有限公司 | Generation method, authorization method, relevant apparatus and the terminal device of authorization code |
CN110096685A (en) * | 2019-04-28 | 2019-08-06 | 新华三信息安全技术有限公司 | A kind of device identification generation method and device |
CN110096685B (en) * | 2019-04-28 | 2023-06-20 | 新华三信息安全技术有限公司 | Equipment identifier generation method and device |
CN110909316A (en) * | 2019-11-14 | 2020-03-24 | 武汉正维电子技术有限公司 | Encryption protection method of single chip microcomputer software and storage medium |
CN110909316B (en) * | 2019-11-14 | 2023-05-09 | 武汉正维电子技术有限公司 | Encryption protection method for singlechip software and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105577644A (en) | Encryption and authentication method and system | |
CN110519260B (en) | Information processing method and information processing device | |
CN110798315B (en) | Data processing method and device based on block chain and terminal | |
KR101362380B1 (en) | Method and device for Digital Rights Management | |
US20110016317A1 (en) | Key storage device, biometric authentication device, biometric authentication system, key management method, biometric authentication method, and program | |
CN106790156B (en) | Intelligent device binding method and device | |
CN111034120B (en) | Encryption key management based on identity information | |
CN109313690A (en) | Self-contained encryption boot policy verifying | |
EP2715598B1 (en) | Method and apparatus for authenticating a non-volatile memory device | |
US9734091B2 (en) | Remote load and update card emulation support | |
KR20160040322A (en) | System and method for key management for issuer security domain using global platform specifications | |
CN103460195A (en) | System and method for secure software update | |
JP2011028688A (en) | Information processing apparatus, program and information processing system | |
CN105518687A (en) | Secure data storage | |
CN106936588B (en) | Hosting method, device and system of hardware control lock | |
CN106033503A (en) | Method, device and system of online writing application secret key into digital content equipment | |
EP2503482A1 (en) | Electronic device with flash memory component | |
JP6553810B2 (en) | Payment authentication method and apparatus for mobile terminal and mobile terminal | |
JP2015104020A (en) | Communication terminal device, communication terminal association system, communication terminal association method and computer program | |
US9177123B1 (en) | Detecting illegitimate code generators | |
JP6318868B2 (en) | Authentication system and portable communication terminal | |
KR101711024B1 (en) | Method for accessing temper-proof device and apparatus enabling of the method | |
CN116527330A (en) | System login method and device, storage medium and electronic equipment | |
CN113316915B (en) | Unlocking a data storage device | |
CN101404573B (en) | Authorization method, system and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |