CN105610570B - Translation and compiling environment installs register method and system - Google Patents

Translation and compiling environment installs register method and system Download PDF

Info

Publication number
CN105610570B
CN105610570B CN201510967645.7A CN201510967645A CN105610570B CN 105610570 B CN105610570 B CN 105610570B CN 201510967645 A CN201510967645 A CN 201510967645A CN 105610570 B CN105610570 B CN 105610570B
Authority
CN
China
Prior art keywords
user
registration
computer
information
unique
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510967645.7A
Other languages
Chinese (zh)
Other versions
CN105610570A (en
Inventor
卢建兴
刘福标
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vanstone Electronic Beijing Co Ltd
Original Assignee
Vanstone Electronic Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vanstone Electronic Beijing Co Ltd filed Critical Vanstone Electronic Beijing Co Ltd
Priority to CN201510967645.7A priority Critical patent/CN105610570B/en
Publication of CN105610570A publication Critical patent/CN105610570A/en
Application granted granted Critical
Publication of CN105610570B publication Critical patent/CN105610570B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1015Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to users
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/107License processing; Key processing
    • G06F21/1078Logging; Metering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of translation and compiling environment installation register method and systems, are related to financial security field.This method comprises: the registration translation and compiling environment request that capture user in registration end issues;The unique check code issued described in the registration end of request in computer and relative users is calculated, computer unique encodings, user information and unique check code are then subjected to once signed encryption;Encrypted information is sent to top service device, obtain the encryption information with the user of registration permission and registers end where valid license is fed back to user, valid license is legal, succeeds in registration.The method of the invention registration is convenient, prevents user from replicating software and uses, prevents the Brute Force of user, realizes effective control.

Description

Translation and compiling environment installs register method and system
Technical field
The present invention relates to financial security field more particularly to a kind of translation and compiling environment installation register method and systems.
Background technique
Currently, POS machine is largely popularized, various industries are employed for, for the ease of the application and development of POS, are needed exploitation The various embedded compiled environment used are integrated, and the integrated software of company oneself research and development is by massive duplication, non-in order to prevent Method use, it is desirable to provide one kind register to use method for control use user group and its corresponding service life.
Summary of the invention
The purpose of the present invention is to provide a kind of translation and compiling environment installation register method and systems, to solve in the prior art Existing foregoing problems.
To achieve the goals above, translation and compiling environment of the present invention installs register method, this method comprises:
S1, the registration translation and compiling environment request that capture user in registration end issues;
Category is calculated according to the unique encodings and user information of the need registration computer carried in request in S2, registration end In unique check code of the computer and the user, then by the computer unique encodings, user information, described unique Check code carries out once signed encryption;
S3 registers end for encrypted information and is sent to top service device, and top service device judges whether the user has There is registration permission, if it is, examination & approval are qualified, into S4;If it is not, then the user is prompted not have registration permission;
S4, the encryption information of record registration permission qualification, and institute is sent to using the encryption information as valid license In the mailbox that user's offer is provided;
S5, whether the verifying valid license in registration end is legal, if legal, prompts user registration success;If no It is legal, then prompt user's registration unsuccessfully without access right.
Preferably, before step S1 further include: user fills in user information at registration end.
It is highly preferred that the user information includes: national title, Business Name, Personal name, effective email address and makes Use the time limit.
Preferably, the computer unique encodings include: the CPU sequence number and hard disk serial number of the computer.
Preferably, according to the unique encodings and user information of the need registration computer carried in request, using hash algorithm The unique check code for belonging to the computer and the user is calculated.
Preferably, step S3 is specifically realized as steps described below:
S31 judges whether the identity of the user is true, if it is, into S32;If it is not, then prompting the user Without registration permission;
S32 judges whether the service life of user's application is reasonable, if it is, examination & approval are qualified, into S4;If It is no, then prompt the user not have registration permission.
Preferably, step S5 is specifically realized as steps described below:
Registration termination receives the valid license of importing, is tested in real time the valid license using cured public key Card, obtains user information, computer unique encodings and unique check code;If using hash algorithm verify unique check code it is correct and The computer unique encodings are consistent with the unique encodings of computer where registration end, then prompt user registration success;Conversely, then prompting User's registration is unsuccessfully without access right.
A kind of translation and compiling environment installation Accreditation System, the system comprises: registration end module and top service device;
The registration end module includes: that user information fills in module, and computerized information trapping module, unique check code calculate mould Block, sends and receives information module and authentication module at encrypting module;
User information fills in module, stores user information, and the user information includes national title, Business Name, individual Title, effective email address and service life;
Computerized information trapping module, the unique encodings of computer where capture registration end, the unique encodings include: the electricity The CPU sequence number and hard disk serial number of brain;
Unique check code computing module fills in the user information of module storage according to user information and computerized information captures mould The unique encodings calculating of the computer of block capture belongs to the computer and unique check code of the user;
Encrypting module, using cured private key by the computer unique encodings, the user information, unique check code Carry out once signed encryption;
Module is sent and received information, top service device is sent by the information after encrypted signature, from top service device Receive valid license;
Authentication module, verifies whether the valid license has registration permission;
Top service device, top service device judge whether the user has registration permission, if it is, examination & approval qualification As a result it is sent to registration end;If it is not, then the prompt that the user does not have registration permission is sent to registration end.
The beneficial effects of the present invention are:
The method of the present invention has the advantages that convenient, colleges and universities and safety, specifically:
1, user's registration is convenient, it is only necessary to which filling in personal simple information click application for registration button can be completed registration.
2, License can only be one-to-one, and both a licence can only be used on a computer, prevents user's duplication soft Part uses.
3, the method can not be cracked substantially using asymmetric and current mainstream algorithm, can prevent user Brute Force, It is illegal to use.
4, application approval is handled in software publishing side, can check and control the letter such as usage amount and user group of current user Breath, can accomplish effectively to manage.
Detailed description of the invention
Fig. 1 is translation and compiling environment installation register method flow diagram;
Fig. 2 is translation and compiling environment installation Accreditation System structural schematic diagram.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing, to the present invention into Row is further described.It should be appreciated that the specific embodiments described herein are only used to explain the present invention, it is not used to Limit the present invention.
The characteristics of register method of the present invention be fill in conveniently, difficulty crack, user, can bullet after installing composing software A login dialog frame out, as long as following information is filled in the inside: country, company, user name, personal effectively mailbox, Service life, then application is clicked in networking, and after application, server will receive the application for registration of client, have special messenger to user information It is audited, audit, which has passed through to give, to be given an written reply, and a license can be sent to the email address of client, as long as user is this License imported into inside tool and can use.The license can repeatedly make on that computer that user applies With, avoid the problem that software reinstallation need repeatedly registration.License can be protected not using certain Encryption Algorithm when login By Brute Force, algorithm uses RSA-2048, Hash-256, SM4 etc. of mainstream, and uses self-defined structure and random number, Guarantee that the licence generated every time is different.
Embodiment
Referring to Fig.1, translation and compiling environment described in the present embodiment installs register method, this method comprises:
S1, registration end capture the registration translation and compiling environment request of user's sending;
Category is calculated according to the unique encodings and user information of the need registration computer for including in request in S2, registration end In unique check code of the computer and the user, then by the computer unique encodings, user information, described unique Once signed encryption is carried out after check code combination;
S3 registers end for encrypted information and is sent to top service device, and top service device judges whether the user has There is registration permission, if it is, examination & approval are qualified, into S4;If it is not, then the user is prompted not have registration permission;
S4, the encryption information of record registration permission qualification, and institute is sent to using the encryption information as valid license In the mailbox that user's offer is provided;
S5, whether the verifying valid license in registration end is legal, if legal, prompts user registration success;If no It is legal, then prompt user's registration unsuccessfully without access right.
Explanation is explained in more detail:
(1) before step S1 further include: user fills in user information at registration end.The user information includes: country Title, Business Name, Personal name, effective email address and service life.
(2) the computer unique encodings include: the CPU sequence number and hard disk serial number of the computer.
(3) it according to the unique encodings and user information of the need registration computer for including in request, is calculated using hash algorithm Obtain the unique check code for belonging to the computer and the user.
(4) step S3 is specifically realized as steps described below:
S31 judges whether the identity of the user is true, if it is, into S32;If it is not, then prompting the user Without registration permission;
S32 judges whether the service life of user's application is reasonable, if it is, examination & approval are qualified, into S4;If It is no, then prompt the user not have registration permission.
(5) step S5 is specifically realized as steps described below:
Registration termination receives the valid license of importing, is tested in real time the valid license using cured public key Card, obtains user information, computer unique encodings and unique check code;If using hash algorithm verify unique check code it is correct and The computer unique encodings are consistent with the unique encodings of computer where registration end, then prompt user registration success;Conversely, then prompting User's registration is unsuccessfully without access right.
It is a kind of to realize the system such as translation and compiling environment installation register method, the system comprises: registration end module and upper layer clothes Business device;
The registration end module includes: that user information fills in module, computerized information trapping module, unique check code calculating mould Block, sends and receives information module and authentication module at encrypting module;
User information fills in module, stores user information, and the user information includes national title, Business Name, individual Title, effective email address and service life;
Computerized information trapping module, the unique encodings of computer where capture registration end, the unique encodings include: the electricity The CPU sequence number and hard disk serial number of brain;
Unique check code computing module fills in the user information of module storage according to user information and computerized information captures mould The unique encodings calculating of the computer of block capture belongs to the computer and unique check code of the user;
Encrypting module, using cured private key by the computer unique encodings, the user information, unique check code Carry out once signed encryption;
Module is sent and received information, top service device is sent by the information after encrypted signature, from top service device Receive valid license;
Authentication module, verifies whether the valid license has registration permission;
Top service device, top service device judge whether the user has registration permission, if it is, examination & approval qualification As a result it is sent to registration end;If it is not, then the prompt that the user does not have registration permission is sent to registration end.
By using above-mentioned technical proposal disclosed by the invention, following beneficial effect has been obtained:
1, user's registration is convenient, it is only necessary to which filling in personal simple information click application for registration button can be completed registration.
2, License can only be one-to-one, and both a licence can only be used on a computer, prevents user's duplication soft Part uses.
3, the method can not be cracked substantially using asymmetric and current mainstream algorithm, can prevent user Brute Force, It is illegal to use.
4, application approval is handled in software publishing side, can check and control the letter such as usage amount and user group of current user Breath, can accomplish effectively to manage.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered Depending on protection scope of the present invention.

Claims (6)

1. a kind of translation and compiling environment installs register method, which is characterized in that this method comprises:
S1, the registration translation and compiling environment request that capture user in registration end issues;
S2, registration end are calculated according to the unique encodings and user information of the need registration computer carried in request and belong to institute Computer and unique check code of the user are stated, then by the computer unique encodings, the user information, unique verification Code carries out once signed encryption;
S3 registers end for encrypted information and is sent to top service device, and top service device judges whether the user has note Volume permission, if it is, examination & approval are qualified, into S4;If it is not, then the user is prompted not have registration permission;
S4, the encryption information of record registration permission qualification, and the use is sent to using the encryption information as valid license In the mailbox that family provides;
S5, whether the verifying valid license in registration end is legal, if legal, prompts user registration success;If illegal, Then prompt user's registration unsuccessfully without access right;
The step S3 is specifically realized as steps described below:
S31 judges whether the identity of the user is true, if it is, into S32;If it is not, then the user is prompted not have There is registration permission;
S32 judges whether the service life of user's application is reasonable, if it is, examination & approval are qualified, into S4;If it is not, then The user is prompted not have registration permission;
The step S5, specifically includes: registration termination receives the valid license of importing, using cured public key in real time to described Valid license is verified, and user information, computer unique encodings and unique check code are obtained;If verified using hash algorithm Unique check code is correct and the computer unique encodings are consistent with the registration end place unique encodings of computer, then prompts user's registration Success;Conversely, then prompting user's registration unsuccessfully without access right.
2. translation and compiling environment installs register method according to claim 1, which is characterized in that before step S1 further include: use User information is filled at registration end in family.
3. translation and compiling environment installs register method according to claim 2, which is characterized in that the user information includes: country Title, Business Name, Personal name, effective email address and service life.
4. translation and compiling environment installs register method according to claim 1, which is characterized in that the computer unique encodings include: The CPU sequence number and hard disk serial number of the computer.
5. translation and compiling environment installs register method according to claim 1, which is characterized in that need to register according to include in request The unique school for belonging to the computer and the user is calculated using hash algorithm for the unique encodings and user information of computer Test code.
6. a kind of system for realizing translation and compiling environment installation register method as described in claim 1, which is characterized in that the system packet It includes: registration end module and top service device;
The registration end module includes: that user information fills in module, computerized information trapping module, unique check code computing module, Encrypting module sends and receives information module and authentication module;
User information fills in module, stores user information, the user information include national title, Business Name, Personal name, Effective email address and service life;
Computerized information trapping module, the unique encodings of computer where capture registration end, the unique encodings include: the computer CPU sequence number and hard disk serial number;
Unique check code computing module fills in the user information of module storage according to user information and computerized information trapping module is caught The unique encodings calculating of the computer obtained belongs to the computer and unique check code of the user;
Encrypting module is carried out the computer unique encodings, the user information, unique check code using cured private key Once signed encryption;
Module is sent and received information, top service device is sent by the information after encrypted signature, is received from top service device Valid license;
Authentication module, verifies whether the valid license has registration permission;
Top service device, top service device judge whether the user has registration permission, if it is, the result that examination & approval are qualified It is sent to registration end;If it is not, then the prompt that the user does not have registration permission is sent to registration end.
CN201510967645.7A 2015-12-21 2015-12-21 Translation and compiling environment installs register method and system Active CN105610570B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510967645.7A CN105610570B (en) 2015-12-21 2015-12-21 Translation and compiling environment installs register method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510967645.7A CN105610570B (en) 2015-12-21 2015-12-21 Translation and compiling environment installs register method and system

Publications (2)

Publication Number Publication Date
CN105610570A CN105610570A (en) 2016-05-25
CN105610570B true CN105610570B (en) 2019-05-14

Family

ID=55990119

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510967645.7A Active CN105610570B (en) 2015-12-21 2015-12-21 Translation and compiling environment installs register method and system

Country Status (1)

Country Link
CN (1) CN105610570B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109800545A (en) * 2017-11-16 2019-05-24 航天信息股份有限公司 A kind of method and system based on national secret algorithm protection computer software
CN108595962B (en) * 2018-04-19 2022-06-03 深圳鼎智通讯股份有限公司 POS machine terminal decoding base authorization code checking method
CN109241702A (en) * 2018-09-03 2019-01-18 福建联迪商用设备有限公司 A kind of software use authorization method and client

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1782941A (en) * 2004-12-04 2006-06-07 鸿富锦精密工业(深圳)有限公司 Software authorizing and protecting device and method
CN101030855A (en) * 2006-03-02 2007-09-05 腾讯科技(深圳)有限公司 Method and server for verifying account register information
JP2009258820A (en) * 2008-04-14 2009-11-05 Nec Corp Account management system, account management device, and account management method
CN102932459A (en) * 2012-11-05 2013-02-13 广州杰赛科技股份有限公司 Security control method of virtual machine
CN103078858A (en) * 2012-12-31 2013-05-01 上海同岩土木工程科技有限公司 Web service and signature certificate-based software trial authorization method
CN103561037A (en) * 2013-11-11 2014-02-05 西安诺瓦电子科技有限公司 Method for building display terminal group and method and system for remotely controlling display terminals

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1782941A (en) * 2004-12-04 2006-06-07 鸿富锦精密工业(深圳)有限公司 Software authorizing and protecting device and method
CN101030855A (en) * 2006-03-02 2007-09-05 腾讯科技(深圳)有限公司 Method and server for verifying account register information
JP2009258820A (en) * 2008-04-14 2009-11-05 Nec Corp Account management system, account management device, and account management method
CN102932459A (en) * 2012-11-05 2013-02-13 广州杰赛科技股份有限公司 Security control method of virtual machine
CN103078858A (en) * 2012-12-31 2013-05-01 上海同岩土木工程科技有限公司 Web service and signature certificate-based software trial authorization method
CN103561037A (en) * 2013-11-11 2014-02-05 西安诺瓦电子科技有限公司 Method for building display terminal group and method and system for remotely controlling display terminals

Also Published As

Publication number Publication date
CN105610570A (en) 2016-05-25

Similar Documents

Publication Publication Date Title
CN104580264B (en) Login method, entering device and login and Accreditation System
CN103795724B (en) Method for protecting account security based on asynchronous dynamic password technology
CN110677376B (en) Authentication method, related device and system and computer readable storage medium
CN109951296A (en) A kind of remote data integrity verification method based on short signature
CN104735065B (en) A kind of data processing method, electronic equipment and server
CN103985036A (en) Two-dimension code payment method with biological characteristics
CN109145540A (en) A kind of intelligent terminal identity identifying method and device based on block chain
CN108989346A (en) The effective identity trustship agility of third party based on account concealment authenticates access module
CN102223374A (en) Third-party authentication security protection system and third-party authentication security protection method based on online security protection of electronic evidence
CN106060078B (en) User information encryption method, register method and verification method applied to cloud platform
CN105791259B (en) A kind of method of personal information protection
CN107196922A (en) Identity identifying method, user equipment and server
CN105554018B (en) Genuine cyber identification verification method
CN109547451A (en) The method of authentic authentication service authentication based on TEE
CN111210287A (en) Tax UKey-based invoicing method and system
CN106936588A (en) A kind of trustship method, the apparatus and system of hardware controls lock
CN105610570B (en) Translation and compiling environment installs register method and system
CN102281138A (en) Method and system for improving safety of verification code
CN106953732A (en) The key management system and method for chip card
WO2016115646A1 (en) An electronic voting method and system implemented in a portable device
GB2488310A (en) A method and system for authenticating a computer user by using an array of elements
CN105703910A (en) Dynamic password verifying method based on Wechat service number
CN105978855A (en) System and method for protecting personal information security in real-name system
CN105978994A (en) Web system oriented logging-in method
CN101674284A (en) Authentication method and system, user side server and authentication server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant