CN110445749B - Method for authorizing product production - Google Patents

Method for authorizing product production Download PDF

Info

Publication number
CN110445749B
CN110445749B CN201910506854.XA CN201910506854A CN110445749B CN 110445749 B CN110445749 B CN 110445749B CN 201910506854 A CN201910506854 A CN 201910506854A CN 110445749 B CN110445749 B CN 110445749B
Authority
CN
China
Prior art keywords
authorization
production
identity data
cloud server
tool
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910506854.XA
Other languages
Chinese (zh)
Other versions
CN110445749A (en
Inventor
冯威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201910506854.XA priority Critical patent/CN110445749B/en
Publication of CN110445749A publication Critical patent/CN110445749A/en
Application granted granted Critical
Publication of CN110445749B publication Critical patent/CN110445749B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Abstract

A method of product production authorization, comprising the steps of: (1) the production authorization tool logs in the cloud server and requests the cloud server to authorize the production authorization tool; (2) the production authorization tool reads the electronic equipment information; (3) the electronic equipment encodes the software version number and the unique code or the characteristic value of the equipment, and transmits the code serving as identity data to a production authorization tool; (4) the production authorization tool transparently transmits the identity data to the cloud server; (5) the cloud server inquires whether the identity data is legal or not; (6) the cloud server encrypts and operates the authorization file by taking the identity data as a secret key, and sends the encrypted authorization file to a production authorization tool; (7) the production authorization tool transmits the encrypted authorization file to the electronic equipment; (8) the electronic equipment decrypts the encrypted authorization file by using the identity data; (9) and the cloud server updates the data and lists the identity data as used. The invention can improve the safety of authorized production and simplify the production flow.

Description

Method for authorizing product production
Technical Field
The invention relates to a method for authorizing product production.
Background
With the development of technology, social division is more and more delicate, many companies are good at the research and development of products, many companies are good at the production and manufacturing of products, and the cooperative work-in-place production mode is increasingly popularized, and in the process, a producer can obtain certain design and production information of a developer. If a complete mechanism for controlling authorization is not provided, research results of developers can be repeatedly produced without limit, and benefits of the developers cannot be guaranteed.
CN201610235288 discloses a method for realizing authorized production and modification in home gateway device production test, which has many defects: 1, the authorization file is kept in the factory, and if the client modifies the corresponding specific character string of the device, for example, the mac address is the same address, the device can be illegally produced arbitrarily. 2, the authorization file is bound with the mac address of the specific pc, and only one computer can be used for production, so that the requirement of multiple production lines of a factory cannot be met. 3, because the adopted method is pre-authorization, and the authorization file is imported through the pc, the mac address and the device specific character string of the production pc need to be obtained in advance, which causes low efficiency.
Disclosure of Invention
The technical problem to be solved by the invention is to overcome the defects of the background technology and provide a method for authorizing product production, thereby improving the safety of authorized production and simplifying the production flow.
The technical scheme adopted by the invention for solving the technical problem is that the method for authorizing the production of the product comprises the following steps:
(1) the production authorization tool logs in the cloud server and requests the cloud server to authorize the production authorization tool;
(2) after the production authorization tool successfully authorizes, the production authorization tool reads the electronic equipment information;
(3) the electronic equipment encodes the software version number and the unique code or the characteristic value of the equipment, and transmits the code serving as identity data to a production authorization tool;
(4) after the production authorization tool receives the identity data, the identity data is transmitted to the cloud server;
(5) after receiving the identity data, the cloud server inquires whether the identity data is legal or not, and the identity data is ensured to be used legally;
(6) the cloud server uses the identity data as a secret key to carry out encryption operation on the authorization file and sends the encrypted authorization file to a production authorization tool;
(7) the production authorization tool transparently transmits the received encrypted authorization file to the electronic equipment;
(8) after receiving the encrypted authorization file, the electronic equipment decrypts the encrypted authorization file by using the identity data, judges the legality of the authorization file and ensures that the authorization file is used legally; if the authorization file is used legally, the electronic equipment is legally produced, and the electronic equipment is allowed to enter a normal working state;
(9) and the cloud server updates the data and lists the identity data as used.
Further, in the step (3), the device unique code refers to a chip ID.
Further, in step (3), the characteristic value refers to a physical MAC address.
Further, in the step (5), whether the authorization operation is legal or not means whether the authorization operation is within a specified time limit, whether the software version number is within an allowable upgrading range, and whether the device unique code or the characteristic value is within a valid range.
Further, in step (8), the validity refers to whether the authorized file is a predefined complete and correct file.
Compared with the prior art, the invention has the following advantages:
the production authorization tool authorizes by logging in the cloud server and requests production, an authorizer can control the production state, and products produced in non-production time are definitely illegal; the software version number is also considered to be coded, and when the software is upgraded and then authorized again, the authorization cannot be stopped because the cloud end distributes an authorization file to the ID of the electronic equipment; the production authorization tool only plays a role in information transmission, data is not reserved, data is not processed, risks of information leakage and data writing are prevented, meanwhile, the production flow is simplified, and the requirement of multiple production lines of a factory is met; after receiving the identity data key, the cloud server is inquired to ensure that the cloud server is used for the first time; if the product is not the first time, the product is determined to be an illegal product, and authorization is not performed; because the identity data key is unique, and each identity data key is different, the encrypted authorization file is also unique, and each authorization file is different, thereby solving the problem that the authorization file is copied and abused; the authorized file is transmitted transparently, cannot be reserved and cannot be processed, and the information safety is ensured.
Drawings
Fig. 1 is a schematic structural diagram of a product authorization system according to an embodiment of the present invention.
FIG. 2 is a flowchart illustrating a product authorization method according to an embodiment of the invention.
Fig. 3 is a flowchart of the electronic device of the embodiment shown in fig. 2.
Detailed Description
The invention is described in further detail below with reference to the figures and specific embodiments.
Referring to fig. 1, the product authorization system of the present embodiment includes: the system comprises a cloud server, a production authorization tool and electronic equipment, wherein the cloud server is connected with the production authorization tool, and the production authorization tool is connected with the electronic equipment. The production authorization tool is a computer or equipment such as NFC, RFID and the like.
Referring to fig. 2, the product authorization method of the present embodiment includes the following steps:
(1) the production authorization tool logs in the cloud server and requests the cloud server to authorize the production authorization tool;
(2) after the production authorization tool successfully authorizes, the production authorization tool reads the electronic equipment information;
(3) the electronic equipment encodes the software version number and the unique code or the characteristic value of the equipment, and transmits the code serving as identity data to a production authorization tool; in this embodiment, the unique device code is a chip ID, and the characteristic value is a physical MAC address;
(4) after the production authorization tool receives the identity data, the identity data is transmitted to the cloud server;
(5) after receiving the identity data, the cloud server inquires whether the identity data is legal or not, and the identity data is ensured to be used legally; whether the authorized operation is within the specified time limit, whether the software version number is within the allowable upgrading range, and whether the unique code or the characteristic value of the equipment is within the valid range is legal or not;
(6) the cloud server uses the identity data as a secret key to carry out encryption operation on the authorization file and sends the encrypted authorization file to a production authorization tool;
(7) the production authorization tool transparently transmits the received encrypted authorization file to the electronic equipment;
(8) after receiving the encrypted authorization file, the electronic equipment decrypts the encrypted authorization file by using the identity data, judges the legality of the authorization file and ensures that the authorization file is used legally; legitimacy here means whether the authorization file is a predefined complete, correct file; if the authorization file is used legally, the electronic equipment is legally produced, and the electronic equipment is allowed to enter a normal working state;
(9) and the cloud server updates the data and lists the identity data as used.
The production authorization tool authorizes by logging in the cloud server and requests production, an authorizer can control the production state, and products produced in non-production time are definitely illegal. The software version number is also considered to be coded, and when the software is upgraded and then authorized again, the cloud end does not stop authorization because the cloud end distributes an authorization file to the electronic equipment ID. The production authorization tool only plays a role in information transmission, data is not reserved, data is not processed, risks of information leakage and writing and modifying are prevented, and meanwhile, the production flow is simplified; the requirement of multiple production lines of a factory is met. After receiving the identity data key, the cloud server is inquired to ensure that the cloud server is used for the first time; if not, the product is determined to be illegal and no authorization is performed. Because the identity data key is unique, and each identity data key is different, the encrypted authorization file is also unique, and each authorization file is different, thereby solving the problem that the authorization file is copied and abused. The authorized file is transmitted transparently, cannot be reserved and cannot be processed, and the information safety is ensured.
Referring to fig. 3, the program of the electronic device has a judgment mechanism, the electronic device can normally operate only after being authorized, and if not authorized, the electronic device can only enter an authorization flow.
Various modifications and variations of the present invention may be made by those skilled in the art, and they are also within the scope of the present invention provided they are within the scope of the claims of the present invention and their equivalents.
What is not described in detail in the specification is prior art that is well known to those skilled in the art.

Claims (5)

1. A method of product production authorisation, comprising the steps of:
(1) the production authorization tool logs in the cloud server and requests the cloud server to authorize the production authorization tool;
(2) after the production authorization tool successfully authorizes, the production authorization tool reads the electronic equipment information;
(3) the electronic equipment encodes the software version number and the unique code or the characteristic value of the equipment, and transmits the code serving as identity data to a production authorization tool;
(4) after the production authorization tool receives the identity data, the identity data is transmitted to the cloud server;
(5) after receiving the identity data, the cloud server inquires whether the identity data is legal or not, and the identity data is ensured to be used legally; (6) the cloud server uses the identity data as a secret key to carry out encryption operation on the authorization file and sends the encrypted authorization file to a production authorization tool;
(7) the production authorization tool transparently transmits the received encrypted authorization file to the electronic equipment;
(8) after receiving the encrypted authorization file, the electronic equipment decrypts the encrypted authorization file by using the identity data, judges the legality of the authorization file and ensures that the authorization file is used legally; if the authorization file is used legally, the electronic equipment is legally produced, and the electronic equipment is allowed to enter a normal working state;
(9) and the cloud server updates the data and lists the identity data as used.
2. A method of product production authorisation as claimed in claim 1, characterised by: in the step (3), the device unique code refers to a chip ID.
3. A method of product production authorisation as claimed in claim 1 or 2, characterised in that: in the step (3), the characteristic value refers to a physical MAC address.
4. A method of product production authorisation as claimed in claim 1 or 2, characterised in that: in the step (5), whether the authorization operation is legal or not means whether the authorization operation is within a specified time limit, whether the software version number is within an allowable upgrading range or not, and whether the unique code or the characteristic value of the equipment is within a valid range or not.
5. A method of product production authorisation as claimed in claim 1 or 2, characterised in that: in step (8), the validity refers to whether the authorization file is a predefined complete and correct file.
CN201910506854.XA 2019-06-12 2019-06-12 Method for authorizing product production Active CN110445749B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910506854.XA CN110445749B (en) 2019-06-12 2019-06-12 Method for authorizing product production

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910506854.XA CN110445749B (en) 2019-06-12 2019-06-12 Method for authorizing product production

Publications (2)

Publication Number Publication Date
CN110445749A CN110445749A (en) 2019-11-12
CN110445749B true CN110445749B (en) 2022-04-01

Family

ID=68429110

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910506854.XA Active CN110445749B (en) 2019-06-12 2019-06-12 Method for authorizing product production

Country Status (1)

Country Link
CN (1) CN110445749B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112114830A (en) * 2020-09-16 2020-12-22 天津光电通信技术有限公司 Method for protecting FPGA (field programmable Gate array) programming file

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101938627A (en) * 2009-06-30 2011-01-05 中兴通讯股份有限公司 System and method for realizing authentication monitoring
CN102176723A (en) * 2011-03-25 2011-09-07 北京航空航天大学 Manufacturing cloud system for supporting on-demand use and dynamic collaboration of manufacturing resources and manufacturing capacities
CN105159735A (en) * 2015-10-22 2015-12-16 宁波市江北九方和荣电气有限公司 Control method for software burn in electronic product production
CN105915345A (en) * 2016-04-15 2016-08-31 烽火通信科技股份有限公司 Realization method for authorized production and reform in home gateway device production testing
CN106845164A (en) * 2017-02-04 2017-06-13 深圳泰科晶显科技有限公司 One kind is based on network software authorization method
CN106997533A (en) * 2017-04-01 2017-08-01 福建实达电脑设备有限公司 A kind of POS terminal product safety production authentication management system and method
CN107426250A (en) * 2017-09-12 2017-12-01 大唐广电科技(武汉)有限公司 A kind of industrial digital information network platform based on block chain
CN107483392A (en) * 2016-11-02 2017-12-15 深圳市波普安创技术有限公司 The production authorization system and method for information safety devices
CN108494813A (en) * 2018-01-24 2018-09-04 杭州谷逸网络科技有限公司 A kind of manufacturer's remote equipment operation control system and method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10080136B2 (en) * 2012-12-25 2018-09-18 At&T Mobility Ip, Llc Credibility token system for over the air multi-programming of a wireless device and method of operation

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101938627A (en) * 2009-06-30 2011-01-05 中兴通讯股份有限公司 System and method for realizing authentication monitoring
CN102176723A (en) * 2011-03-25 2011-09-07 北京航空航天大学 Manufacturing cloud system for supporting on-demand use and dynamic collaboration of manufacturing resources and manufacturing capacities
CN105159735A (en) * 2015-10-22 2015-12-16 宁波市江北九方和荣电气有限公司 Control method for software burn in electronic product production
CN105915345A (en) * 2016-04-15 2016-08-31 烽火通信科技股份有限公司 Realization method for authorized production and reform in home gateway device production testing
CN107483392A (en) * 2016-11-02 2017-12-15 深圳市波普安创技术有限公司 The production authorization system and method for information safety devices
CN106845164A (en) * 2017-02-04 2017-06-13 深圳泰科晶显科技有限公司 One kind is based on network software authorization method
CN106997533A (en) * 2017-04-01 2017-08-01 福建实达电脑设备有限公司 A kind of POS terminal product safety production authentication management system and method
CN107426250A (en) * 2017-09-12 2017-12-01 大唐广电科技(武汉)有限公司 A kind of industrial digital information network platform based on block chain
CN108494813A (en) * 2018-01-24 2018-09-04 杭州谷逸网络科技有限公司 A kind of manufacturer's remote equipment operation control system and method

Also Published As

Publication number Publication date
CN110445749A (en) 2019-11-12

Similar Documents

Publication Publication Date Title
TWI747836B (en) Device birth certificate
EP3099037B1 (en) Providing a password for temporary access privilege escalation in a control program
US9280653B2 (en) Security access method for automotive electronic control units
CN103685267B (en) Data access method and device
US7108177B2 (en) Proximity validation system and method
EP4081921B1 (en) Contactless card personal identification system
EP3648396B1 (en) Maintenance system and maintenance method
CN106658493A (en) Key management method, device and system
CN111209558B (en) Internet of things equipment identity authentication method and system based on block chain
CN101989982A (en) Information processing apparatus, program, storage medium and information processing system
CN103067333A (en) Method for verifying set top box access identity and authentication server
CN104717198A (en) Updating software on a secure element
CN101841525A (en) Secure access method, system and client
CN111314366B (en) MQTT protocol-based secure login system and method
CN104954330A (en) Method of accessing data resources, device and system
CN111347996B (en) Remote vehicle locking control system and control method for new energy vehicle
CN113661699A (en) System and method for pre-authentication of customer support calls
CN109583154A (en) A kind of system and method based on Web middleware access intelligent code key
CN108768941B (en) Method and device for remotely unlocking safety equipment
US20200226275A1 (en) Activating or deactivating a feature of a vehicle
CN113765655A (en) Access control method, device, equipment and storage medium
CN110445749B (en) Method for authorizing product production
CN107968764B (en) Authentication method and device
CN103559430A (en) Application account management method and device based on android system
CN103260157A (en) User management system based on satellite communication services and application method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant