CN105915343A - Registered user off line activation method and system - Google Patents

Registered user off line activation method and system Download PDF

Info

Publication number
CN105915343A
CN105915343A CN201610216385.4A CN201610216385A CN105915343A CN 105915343 A CN105915343 A CN 105915343A CN 201610216385 A CN201610216385 A CN 201610216385A CN 105915343 A CN105915343 A CN 105915343A
Authority
CN
China
Prior art keywords
user
identifying code
active coding
code
rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610216385.4A
Other languages
Chinese (zh)
Other versions
CN105915343B (en
Inventor
吴光华
胡博
罗利辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kingdee Software China Co Ltd
Original Assignee
Kingdee Software China Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kingdee Software China Co Ltd filed Critical Kingdee Software China Co Ltd
Priority to CN201610216385.4A priority Critical patent/CN105915343B/en
Publication of CN105915343A publication Critical patent/CN105915343A/en
Application granted granted Critical
Publication of CN105915343B publication Critical patent/CN105915343B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a registered user off line activation method and system. When the registered user off line activation method performs activation on a registered user, a cloud end obtains a first activation code transmitted by a user, determines whether the user is a registered user according to the first activation code, if yes, the cloud end generate a first verification code according to the first activation code and issues the first verification code to the user; when receiving the first verification code, the user inputs the first verification code into an ERP client; and the first verification code is verified by a verification rule which is preset by the ERP client, and if the verification succeeds, the registered user is activated. Compared with the prior art, the ERP client can voluntarily finish verification on the first verification code, and thus can finish activation of the registered user when the ERP terminal and the cloud end are offline.

Description

A kind of registration user's off-line Activiation method and system
Technical field
The application relates to areas of information technology, more particularly, it relates to a kind of registration user's off-line activation side Method and system.
Background technology
ERP system is the abbreviation of Enterprise Resources Plan (Enterprise Resource Planning), refers to set up On Information Technology Foundation, with systematized management thought, decision-making is provided to transport for business decision layer and employee The management platform of row means.
Generally, user, when using ERP system, needs to register and activate.At present, generally use ERP activation line mode, i.e. user send active coding to high in the clouds, and high in the clouds receives active coding rear line end and sends out Sending identifying code, user asks high in the clouds to this checking in ERP client input validation code, EPR client again Code is verified, then activates registration user as being proved to be successful.
Above-mentioned Activiation method is used to carry out user when activating, it is necessary to assure ERP client is in line states, When ERP client is in off-line state, because communicating with high in the clouds, then cannot realize swashing of user Live.
Summary of the invention
In view of this, the application provides a kind of registration user's off-line Activiation method and system, with ERP client When end is in off-line state, complete the activation to registration user.
To achieve these goals, it is proposed that scheme as follows:
A kind of registration user's off-line Activiation method, including:
High in the clouds obtains the first active coding that user sends, and resolves described first active coding, it is judged that Whether described user is registration user;
The most then according to presetting identifying code create-rule, generate first corresponding with described first active coding Identifying code, and issue described first identifying code to described user;
ERP client receives described first identifying code that described user uploads, and according to the checking pre-set Described first identifying code is verified by rule, if being proved to be successful, activates registration user.
Preferably, described described first active coding is resolved, it is judged that whether described user is that registration is used Family, including:
According to default analytical algorithm, generate the first user identification code corresponding with described first active coding;
Judge the second user identification code that when whether described first user identification code is registered, high in the clouds generates with user Identical, and it is identical to reserve phone number when whether user's current phone number is registered with user;
If described first user identification code is identical with described second user identification code, and user's current phone number It is identical that code reserves phone number when registering with user, it is determined that described user is registration user.
Preferably, described basis presets identifying code create-rule, generates corresponding with described first active coding First identifying code, including:
Described first active coding and timestamp being carried out MD5 and obscures process, wherein said timestamp with sky is Unit;
To obscure the first digit after process as initial number, choose multiple numeral conduct of predetermined number Described first identifying code.
Preferably, described first identifying code is verified by the proof rule that described basis pre-sets, if It is proved to be successful and then activates registration user, including:
Obtain the second active coding and described identifying code create-rule that the high in the clouds prestored generates, wherein Second active coding is that high in the clouds is according to described second user identification code, the active coding generated according to preset algorithm;
Based on described identifying code create-rule, generate second identifying code corresponding with described second active coding;
Judge that described first identifying code is the most identical with described second identifying code;
The most then it is proved to be successful.
Preferably, described based on described identifying code create-rule, generate corresponding with described second active coding Second identifying code, including:
Described second active coding and timestamp being carried out MD5 and obscures process, wherein said timestamp with sky is Unit;
To obscure the first digit after process as initial number, choose multiple numeral conduct of predetermined number Described second identifying code.
A kind of registration user's off-line activation system, including high in the clouds and ERP client;
Wherein, described high in the clouds, for obtaining the first active coding that user sends, and activate described first Code resolves, it is judged that whether described user is registration user;
The most then according to presetting identifying code create-rule, generate first corresponding with described first active coding Identifying code, and issue described first identifying code to described user;
Described ERP client is used for receiving described first identifying code that described user uploads, and according to setting in advance Described first identifying code is verified by the proof rule put, if being proved to be successful, activates registration user.
Preferably, described high in the clouds includes:
First information collecting unit, for obtaining the first active coding that user sends;
Computing unit, for according to default analytical algorithm, generates first corresponding with described first active coding User identification code;
First judging unit, is used for judging when whether described first user identification code is registered with user, high in the clouds is raw The second user identification code become is identical;
Second judging unit, is used for judging user's current phone number reserves mobile phone when whether registering with user Number is identical;
If described first user identification code is identical with described second user identification code, and user's current phone number It is identical that code reserves phone number when registering with user, it is determined that described user is registration user;
First identifying code signal generating unit, for according to presetting identifying code create-rule, generating and described first The first identifying code that active coding is corresponding, and issue described first identifying code to described user.
Preferably, described ERP terminal includes:
Memory element, for storing the second active coding and the described identifying code create-rule that high in the clouds generates, Wherein the second active coding is high in the clouds according to described second user identification code, according to swashing that preset algorithm generates Code alive;
Second identifying code signal generating unit, for based on described identifying code create-rule, generates and described second The second identifying code that active coding is corresponding;
Authentication unit, is used for judging that described first identifying code is the most identical with described second identifying code;
The most then it is proved to be successful.
Preferably, described first identifying code signal generating unit includes:
First data process subelement, obscure place for described first active coding and timestamp are carried out MD5 Reason, wherein said timestamp is in units of sky;
First data decimation subelement, for obscure the first digit after process as initial number, choosing Take multiple numerals of predetermined number as described first identifying code.
Preferably, described second identifying code signal generating unit includes:
Second data process subelement, obscure place for described second active coding and timestamp are carried out MD5 Reason, wherein said timestamp is in units of sky;
Second data decimation subelement, for obscure the first digit after process as initial number, choosing Take multiple numerals of predetermined number as described second identifying code.
Through as shown from the above technical solution, this application discloses a kind of registration user's off-line Activiation method and be System.The method is when activating registration user, and high in the clouds obtains the first active coding that user sends, root Judge that whether this user is registration user according to the first active coding, the most then generate the according to the first active coding One identifying code, and issue this first identifying code to user.When user receives the first identifying code, by first Identifying code input ERP client, the first identifying code is tested by the proof rule that ERP client pre-sets Card, if being proved to be successful, then activates this registration user.Compared with prior art, ERP user in the present invention End can complete the checking to the first identifying code voluntarily, thus be in the state of off-line in ERP terminal and high in the clouds Time, it is also possible to complete to register the activation of user.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to reality Execute the required accompanying drawing used in example or description of the prior art to be briefly described, it should be apparent that below, Accompanying drawing in description is only embodiments of the invention, for those of ordinary skill in the art, not On the premise of paying creative work, it is also possible to obtain other accompanying drawing according to the accompanying drawing provided.
Fig. 1 shows a kind of flow process registering user's off-line Activiation method disclosed in one embodiment of the invention Schematic diagram;
Fig. 2 shows a kind of stream registering user's off-line Activiation method disclosed in another embodiment of the present invention Journey schematic diagram;
Fig. 3 shows a kind of knot registering user's off-line activation system disclosed in another embodiment of the present invention Structure schematic diagram.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out Clearly and completely describe, it is clear that described embodiment is only a part of embodiment of the present invention, and It is not all, of embodiment.Based on the embodiment in the present invention, those of ordinary skill in the art are not doing Go out the every other embodiment obtained under creative work premise, broadly fall into the scope of protection of the invention.
See Fig. 1 and show a kind of user off-line Activiation method registered disclosed in one embodiment of the invention Schematic flow sheet.
As shown in Figure 1, the method includes:
S11: high in the clouds obtains the first active coding that user sends, and resolves described first active coding, Judge whether described user is registration user.
User contains the note of the first active coding by mobile phone edit package, and sends this note to high in the clouds.Cloud End, by resolving this active coding, determines whether this user is the most chartered user.
S12: the most then according to presetting identifying code create-rule, generate corresponding with described first active coding First identifying code, and issue described first identifying code to described user.
When high in the clouds determines, when registering user during this user, high in the clouds is according to default identifying code create-rule, raw Become first identifying code corresponding with the first active coding, and notify registration user with the form of note.
S13:ERP client receives described first identifying code that described user uploads, and according to pre-setting Proof rule described first identifying code is verified, if being proved to be successful, activate registration user.
This first identifying code is inputted ERP client by registration user, and ERP client is according to the checking rule preset Then the first identifying code being verified, if being proved to be successful, then activating this registration user.
As seen from the above embodiment, this application discloses a kind of registration user's off-line Activiation method.The method When activating registration user, high in the clouds obtains the first active coding that user sends, and carries out swashing according to this Code of living judges whether this user is registration user, the most then generate the first identifying code according to this active coding, And issue this first identifying code to user.When user receives the first identifying code, by the first identifying code input ERP client, the first identifying code is verified by the proof rule that ERP client pre-sets, if checking Success, then activate this registration user.Compared with prior art, ERP user side can be the completeest in the present invention The checking of paired first identifying code, thus when ERP terminal and high in the clouds are in the state of off-line, it is also possible to complete Become the activation of registration user.
See Fig. 2 and show a kind of registration user's off-line Activiation method disclosed in another embodiment of the present invention Schematic flow sheet.
As shown in Figure 2, the method includes:
S21: high in the clouds obtains the first active coding that user sends.
S22: according to default analytical algorithm, generate the first user identification code corresponding with described first active coding.
It should be noted that when user registers beyond the clouds, user inputs name, mobile phone beyond the clouds The user profile such as number mailbox, high in the clouds is automatically inquired about and is distributed only one user identification code and uses to this registration Family, and according to the computational methods pre-set, generate one based on this user identification code and identify with this user The active coding that code is corresponding.After high in the clouds gets the first active coding can according to the analytical algorithm being pre-designed, Calculate the first user identification code corresponding with this first active coding.
S23: judge that the second user that when whether described first user identification code is registered with user, high in the clouds generates knows Other code-phase is same, and it is identical to reserve phone number when whether user's current phone number is registered with user.
As described in step S22, when user registers, high in the clouds generates the unique user identification code of this user, i.e. Second user identification code, and the phone number used when this second user identification code is registered with user is one by one Corresponding.
In actual applications in order to determine certain user be whether the registration user in this high in the clouds need simultaneously to Family identification code and phone number are verified.The first user identification i.e. parsed by the first active coding Code is the most consistent with the second user identification code that high in the clouds during registration generates, and sends the hands of the first active coding Plane No. code is the most consistent with the phone number of user's input during registration.
Wherein, when described first user identification code is identical with described second user identification code, and user is current Phone number is reserved with user identical, it is determined that described user is registration user when phone number is registered.
S24: according to default identifying code create-rule, generate first checking corresponding with described first active coding Code, and issue described first identifying code to described user.
When determining the registration user that this user is high in the clouds, this first active coding and timestamp are carried out by high in the clouds MD5 obscures process, and to obscure the first digit after process as initial number, chooses predetermined number Multiple numerals, as the first identifying code, feed back to user by the form of note.When it should be noted that this Between stab in units of sky.
S25:ERP client receives described first identifying code that described user uploads, and according to pre-setting Proof rule described first identifying code is verified, if being proved to be successful, activate registration user.
It should be noted that after user has registered beyond the clouds, second user of user is identified by high in the clouds Code, by second user identification code generate the second active coding, user profile, identifying code create-rule, The information such as identifying code proof rule are written in licence.And then, ERP terminal downloads the licence in this high in the clouds, Thus obtain the second active coding, identifying code create-rule and identifying code proof rule and store.
And then, when registering user and needing to activate, ERP terminal generates according to the second active coding and identifying code Rule, generates second identifying code corresponding with the second active coding.And then, according to identifying code proof rule and Second identifying code, concrete, described second active coding and timestamp are carried out MD5 and obscures process, wherein To obscure the first digit after process as initial number, choose multiple numerals of predetermined number as described Second identifying code.
When ERP terminal determines the first identifying code and the second identifying code is identical, then it is proved to be successful.
See Fig. 3 and show a kind of registration user's off-line activation system disclosed in another embodiment of the present invention Structural representation.This system includes high in the clouds 1 and ERP client 2.
Described high in the clouds 1 is for obtaining the first active coding that user sends, and solves described first active coding Analysis, it is judged that whether described user is registration user;
The most then according to presetting identifying code create-rule, generate first corresponding with described first active coding Identifying code, and issue described first identifying code to described user;
Described ERP client 2 is used for receiving described first identifying code that described user uploads, and according in advance Described first identifying code is verified by the proof rule arranged, if being proved to be successful, activates registration user.
Concrete, in other embodiments disclosed by the invention, this high in the clouds 1 specifically includes: first information collection Unit 11, computing unit the 12, first judging unit 13, second are by dot element 14 and the first identifying code Signal generating unit 15.
Wherein, first information collecting unit 11, for obtaining the first active coding that user sends, and will obtain The first active coding got sends to computing unit 12.
Computing unit 12 receives the first active coding that first information collecting unit 11 sends, and according to default solution Analysis algorithm, generates the first user identification code corresponding with described first active coding.
First judging unit 13 resolves the first user identification code obtained according to the first computing unit, it is judged that institute State the second user identification code that when whether first user identification code is registered, high in the clouds generates with user identical;
Second judging unit 14, is used for judging user's current phone number reserves hands when whether registering with user Plane No. code-phase is same.
Wherein, when first user identification code is identical with described second user identification code, and user's current phone Phone number is reserved with user identical, it is determined that described user is registration user when number is registered;
When this user is for registration user, the first identifying code signal generating unit 15 generates rule according to default identifying code Then, generate first identifying code corresponding with described first active coding, and issue described first to described user Identifying code.
Described EPR client specifically includes: memory element the 21, second identifying code signal generating unit 22 and testing Card unit 23.
Wherein, memory element 21, for storing the second active coding and the life of described identifying code that high in the clouds generates Become rule, wherein the second active coding be high in the clouds according to described second user identification code, according to preset algorithm The active coding generated.
Second identifying code signal generating unit 22, for based on described identifying code create-rule, generates and described the The second identifying code that two active codings are corresponding;
Authentication unit 23, is used for judging that described first identifying code is the most identical with described second identifying code;
The most then it is proved to be successful.
It should be noted that in other system embodiment disclosed by the invention, described the first of this system Identifying code signal generating unit includes: the first data process subelement, the first data decimation subelement.
First data process subelement, obscure place for described first active coding and timestamp are carried out MD5 Reason, wherein said timestamp is in units of sky.
First data decimation subelement, for obscure the first digit after process as initial number, choosing Take multiple numerals of predetermined number as described first identifying code.
Described second identifying code signal generating unit includes: the second data process subelement and the second data decimation Unit.
Second data process subelement, obscure place for described second active coding and timestamp are carried out MD5 Reason, wherein said timestamp is in units of sky;
Second data decimation subelement, for obscure the first digit after process as initial number, choosing Take multiple numerals of predetermined number as described second identifying code.
It should be noted that this device embodiment is corresponding with embodiment of the method, it performs process and performs former Managing identical, therefore not to repeat here.
Finally, in addition it is also necessary to explanation, in this article, the relational terms of such as first and second or the like It is used merely to separate an entity or operation with another entity or operating space, and not necessarily requires Or imply relation or the order that there is any this reality between these entities or operation.And, art Language " includes ", " comprising " or its any other variant are intended to comprising of nonexcludability, thus Make to include that the process of a series of key element, method, article or equipment not only include those key elements, and Also include other key elements being not expressly set out, or also include for this process, method, article or The key element that person's equipment is intrinsic.In the case of there is no more restriction, by statement " including ... " The key element limited, it is not excluded that also deposit in including the process of described key element, method, article or equipment In other identical element.
In this specification, each embodiment uses the mode gone forward one by one to describe, and each embodiment stresses Being the difference with other embodiments, between each embodiment, identical similar portion sees mutually.
Described above to the disclosed embodiments, makes professional and technical personnel in the field be capable of or uses The present invention.Multiple amendment to these embodiments will be aobvious and easy for those skilled in the art See, generic principles defined herein can without departing from the spirit or scope of the present invention, Realize in other embodiments.Therefore, the present invention is not intended to be limited to the embodiments shown herein, And it is to fit to the widest scope consistent with principles disclosed herein and features of novelty.

Claims (10)

1. registration user's off-line Activiation method, it is characterised in that including:
High in the clouds obtains the first active coding that user sends, and resolves described first active coding, it is judged that Whether described user is registration user;
The most then according to presetting identifying code create-rule, generate first corresponding with described first active coding Identifying code, and issue described first identifying code to described user;
ERP client receives described first identifying code that described user uploads, and according to the checking pre-set Described first identifying code is verified by rule, if being proved to be successful, activates registration user.
Method the most according to claim 1, it is characterised in that described described first active coding is entered Row resolves, it is judged that whether described user is registration user, including:
According to default analytical algorithm, generate the first user identification code corresponding with described first active coding;
Judge the second user identification code that when whether described first user identification code is registered, high in the clouds generates with user Identical, and it is identical to reserve phone number when whether user's current phone number is registered with user;
If described first user identification code is identical with described second user identification code, and user's current phone number It is identical that code reserves phone number when registering with user, it is determined that described user is registration user.
Method the most according to claim 1, it is characterised in that described basis is preset identifying code and generated Rule, generates first identifying code corresponding with described first active coding, including:
Described first active coding and timestamp being carried out MD5 and obscures process, wherein said timestamp with sky is Unit;
To obscure the first digit after process as initial number, choose multiple numeral conduct of predetermined number Described first identifying code.
Method the most according to claim 2, it is characterised in that the checking that described basis pre-sets Described first identifying code is verified by rule, if being proved to be successful, activates registration user, including:
Obtain the second active coding and described identifying code create-rule that the high in the clouds prestored generates, wherein Second active coding is that high in the clouds is according to described second user identification code, the active coding generated according to preset algorithm;
Based on described identifying code create-rule, generate second identifying code corresponding with described second active coding;
Judge that described first identifying code is the most identical with described second identifying code;
The most then it is proved to be successful.
Method the most according to claim 4, it is characterised in that described generate based on described identifying code Rule, generates second identifying code corresponding with described second active coding, including:
Described second active coding and timestamp being carried out MD5 and obscures process, wherein said timestamp with sky is Unit;
To obscure the first digit after process as initial number, choose multiple numeral conduct of predetermined number Described second identifying code.
6. registration user's off-line activation system, it is characterised in that include high in the clouds and ERP client;
Wherein, described high in the clouds, for obtaining the first active coding that user sends, and activate described first Code resolves, it is judged that whether described user is registration user;
The most then according to presetting identifying code create-rule, generate first corresponding with described first active coding Identifying code, and issue described first identifying code to described user;
Described ERP client is used for receiving described first identifying code that described user uploads, and according to setting in advance Described first identifying code is verified by the proof rule put, if being proved to be successful, activates registration user.
System the most according to claim 6, it is characterised in that described high in the clouds includes:
First information collecting unit, for obtaining the first active coding that user sends;
Computing unit, for according to default analytical algorithm, generates first corresponding with described first active coding User identification code;
First judging unit, is used for judging when whether described first user identification code is registered with user, high in the clouds is raw The second user identification code become is identical;
Second judging unit, is used for judging user's current phone number reserves mobile phone when whether registering with user Number is identical;
If described first user identification code is identical with described second user identification code, and user's current phone number It is identical that code reserves phone number when registering with user, it is determined that described user is registration user;
First identifying code signal generating unit, for according to presetting identifying code create-rule, generating and described first The first identifying code that active coding is corresponding, and issue described first identifying code to described user.
System the most according to claim 5, it is characterised in that described ERP terminal includes:
Memory element, for storing the second active coding and the described identifying code create-rule that high in the clouds generates, Wherein the second active coding is high in the clouds according to described second user identification code, according to swashing that preset algorithm generates Code alive;
Second identifying code signal generating unit, for based on described identifying code create-rule, generates and described second The second identifying code that active coding is corresponding;
Authentication unit, is used for judging that described first identifying code is the most identical with described second identifying code;
The most then it is proved to be successful.
Device the most according to claim 7, it is characterised in that described first identifying code signal generating unit Including:
First data process subelement, obscure place for described first active coding and timestamp are carried out MD5 Reason, wherein said timestamp is in units of sky;
First data decimation subelement, for obscure the first digit after process as initial number, choosing Take multiple numerals of predetermined number as described first identifying code.
Device the most according to claim 8, it is characterised in that described second identifying code signal generating unit Including:
Second data process subelement, obscure place for described second active coding and timestamp are carried out MD5 Reason, wherein said timestamp is in units of sky;
Second data decimation subelement, for obscure the first digit after process as initial number, choosing Take multiple numerals of predetermined number as described second identifying code.
CN201610216385.4A 2016-04-08 2016-04-08 A kind of offline Activiation method of registration user and system Active CN105915343B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610216385.4A CN105915343B (en) 2016-04-08 2016-04-08 A kind of offline Activiation method of registration user and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610216385.4A CN105915343B (en) 2016-04-08 2016-04-08 A kind of offline Activiation method of registration user and system

Publications (2)

Publication Number Publication Date
CN105915343A true CN105915343A (en) 2016-08-31
CN105915343B CN105915343B (en) 2019-07-23

Family

ID=56745706

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610216385.4A Active CN105915343B (en) 2016-04-08 2016-04-08 A kind of offline Activiation method of registration user and system

Country Status (1)

Country Link
CN (1) CN105915343B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107733891A (en) * 2017-10-17 2018-02-23 深圳市金立通信设备有限公司 A kind of user registering method, server and computer-readable recording medium
CN107800693A (en) * 2017-10-12 2018-03-13 深圳盈诺德信息技术有限公司 User activating method, device and storage medium based on Enterprise Resources Plan
CN107888656A (en) * 2017-10-09 2018-04-06 北京京东尚科信息技术有限公司 Service the call method and calling device of end interface
CN109299586A (en) * 2018-08-15 2019-02-01 广州市保伦电子有限公司 It is a kind of to decrypt Activiation method, system and storage medium offline
CN109359937A (en) * 2018-09-14 2019-02-19 厦门天锐科技股份有限公司 A method of it examines offline
CN110717173A (en) * 2019-10-25 2020-01-21 宁波奥克斯电气股份有限公司 Account activation method, account activation device, network terminal and computer readable storage medium
CN112395574A (en) * 2020-12-04 2021-02-23 航天信息股份有限公司 Safety login management method
AU2021302513B2 (en) * 2020-07-01 2023-02-09 Sphinx Electronics Gmbh & Co Kg Method and system for starting up or managing an offline control device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1618199A (en) * 2001-11-28 2005-05-18 特伦诺有限公司 Method for registering and enabling PKI functionalities
CN101102324A (en) * 2007-08-17 2008-01-09 北京移数通电讯有限公司 Authentication system and authentication method
CN102164141A (en) * 2011-04-24 2011-08-24 陈珂 Method for protecting security of account
CN103916400A (en) * 2014-04-17 2014-07-09 上海斐讯数据通信技术有限公司 User account management method and system
CN104104507A (en) * 2013-04-10 2014-10-15 比亚迪股份有限公司 Method and system for logging in to user service network
CN104579671A (en) * 2013-10-29 2015-04-29 中国银联股份有限公司 Authentication method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1618199A (en) * 2001-11-28 2005-05-18 特伦诺有限公司 Method for registering and enabling PKI functionalities
CN101102324A (en) * 2007-08-17 2008-01-09 北京移数通电讯有限公司 Authentication system and authentication method
CN102164141A (en) * 2011-04-24 2011-08-24 陈珂 Method for protecting security of account
CN104104507A (en) * 2013-04-10 2014-10-15 比亚迪股份有限公司 Method and system for logging in to user service network
CN104579671A (en) * 2013-10-29 2015-04-29 中国银联股份有限公司 Authentication method and system
CN103916400A (en) * 2014-04-17 2014-07-09 上海斐讯数据通信技术有限公司 User account management method and system

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107888656A (en) * 2017-10-09 2018-04-06 北京京东尚科信息技术有限公司 Service the call method and calling device of end interface
CN107800693A (en) * 2017-10-12 2018-03-13 深圳盈诺德信息技术有限公司 User activating method, device and storage medium based on Enterprise Resources Plan
CN107733891A (en) * 2017-10-17 2018-02-23 深圳市金立通信设备有限公司 A kind of user registering method, server and computer-readable recording medium
CN109299586A (en) * 2018-08-15 2019-02-01 广州市保伦电子有限公司 It is a kind of to decrypt Activiation method, system and storage medium offline
CN109359937A (en) * 2018-09-14 2019-02-19 厦门天锐科技股份有限公司 A method of it examines offline
CN109359937B (en) * 2018-09-14 2022-02-08 厦门天锐科技股份有限公司 Offline approval method
CN110717173A (en) * 2019-10-25 2020-01-21 宁波奥克斯电气股份有限公司 Account activation method, account activation device, network terminal and computer readable storage medium
CN110717173B (en) * 2019-10-25 2021-07-16 宁波奥克斯电气股份有限公司 Account activation method, account activation device, network terminal and computer readable storage medium
AU2021302513B2 (en) * 2020-07-01 2023-02-09 Sphinx Electronics Gmbh & Co Kg Method and system for starting up or managing an offline control device
CN115735205A (en) * 2020-07-01 2023-03-03 斯芬克斯电子有限责任两合公司 Method and system for commissioning or managing an offline control device
CN112395574A (en) * 2020-12-04 2021-02-23 航天信息股份有限公司 Safety login management method
CN112395574B (en) * 2020-12-04 2024-02-23 航天信息股份有限公司 Safe login management method

Also Published As

Publication number Publication date
CN105915343B (en) 2019-07-23

Similar Documents

Publication Publication Date Title
CN105915343A (en) Registered user off line activation method and system
US11361319B2 (en) Service processing method, apparatus, and system
CN105207996A (en) Account merging method and apparatus
CN109800598A (en) Certificate administration method, apparatus, electronic equipment and storage medium based on block chain
CN110297923B (en) Information processing method, information processing device, electronic equipment and computer readable storage medium
CN108650289B (en) Method and device for managing data based on block chain
WO2020207084A1 (en) Payment complaint method, device, server, and readable storage medium
CN105991709A (en) Cloud desktop account number management method and apparatus thereof
CN107633162B (en) Identity authentication method, device, system, equipment and storage medium
CN110659569A (en) Electronic signature method, device, storage medium and electronic equipment
CN110795763B (en) Electronic certificate processing method, query method, device, equipment, platform and medium
CN103064757A (en) Method and system for backing up data
CN110765137A (en) Electronic certificate processing method, device, equipment, platform and medium
CN105933374A (en) Mobile terminal data backup method, system and mobile terminal
CN111986794A (en) Anti-counterfeiting registration method and device based on face recognition, computer equipment and medium
CN105007571A (en) Information processing method and service equipment
CN104639546A (en) Multi-biometric feature comprehensive authentication method, device and system
CN104580428B (en) A kind of data routing method, data administrator and distributed memory system
CN110910141A (en) Transaction processing method, system, device, equipment and computer readable storage medium
KR20210106013A (en) Preventing transmission of incorrect copies of data records to distributed ledger systems
CN107147632A (en) Mutual authentication method and device, storage medium, electronic equipment
CN104392368A (en) Method and device for user system management in e-commerce platform
CN110084467B (en) Mobile label verification method, mobile label verification device, computer equipment and storage medium
CN111538967A (en) Data management platform based on information resource library
CN110874492B (en) Data processing method, device, computing equipment and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant