CN110445749B - Method for authorizing product production - Google Patents
Method for authorizing product production Download PDFInfo
- Publication number
- CN110445749B CN110445749B CN201910506854.XA CN201910506854A CN110445749B CN 110445749 B CN110445749 B CN 110445749B CN 201910506854 A CN201910506854 A CN 201910506854A CN 110445749 B CN110445749 B CN 110445749B
- Authority
- CN
- China
- Prior art keywords
- authorization
- production
- identity data
- cloud server
- tool
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000004519 manufacturing process Methods 0.000 title claims abstract description 73
- 238000000034 method Methods 0.000 title claims abstract description 16
- 238000013475 authorization Methods 0.000 claims abstract description 101
- 230000005540 biological transmission Effects 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Abstract
A method of product production authorization, comprising the steps of: (1) the production authorization tool logs in the cloud server and requests the cloud server to authorize the production authorization tool; (2) the production authorization tool reads the electronic equipment information; (3) the electronic equipment encodes the software version number and the unique code or the characteristic value of the equipment, and transmits the code serving as identity data to a production authorization tool; (4) the production authorization tool transparently transmits the identity data to the cloud server; (5) the cloud server inquires whether the identity data is legal or not; (6) the cloud server encrypts and operates the authorization file by taking the identity data as a secret key, and sends the encrypted authorization file to a production authorization tool; (7) the production authorization tool transmits the encrypted authorization file to the electronic equipment; (8) the electronic equipment decrypts the encrypted authorization file by using the identity data; (9) and the cloud server updates the data and lists the identity data as used. The invention can improve the safety of authorized production and simplify the production flow.
Description
Technical Field
The invention relates to a method for authorizing product production.
Background
With the development of technology, social division is more and more delicate, many companies are good at the research and development of products, many companies are good at the production and manufacturing of products, and the cooperative work-in-place production mode is increasingly popularized, and in the process, a producer can obtain certain design and production information of a developer. If a complete mechanism for controlling authorization is not provided, research results of developers can be repeatedly produced without limit, and benefits of the developers cannot be guaranteed.
CN201610235288 discloses a method for realizing authorized production and modification in home gateway device production test, which has many defects: 1, the authorization file is kept in the factory, and if the client modifies the corresponding specific character string of the device, for example, the mac address is the same address, the device can be illegally produced arbitrarily. 2, the authorization file is bound with the mac address of the specific pc, and only one computer can be used for production, so that the requirement of multiple production lines of a factory cannot be met. 3, because the adopted method is pre-authorization, and the authorization file is imported through the pc, the mac address and the device specific character string of the production pc need to be obtained in advance, which causes low efficiency.
Disclosure of Invention
The technical problem to be solved by the invention is to overcome the defects of the background technology and provide a method for authorizing product production, thereby improving the safety of authorized production and simplifying the production flow.
The technical scheme adopted by the invention for solving the technical problem is that the method for authorizing the production of the product comprises the following steps:
(1) the production authorization tool logs in the cloud server and requests the cloud server to authorize the production authorization tool;
(2) after the production authorization tool successfully authorizes, the production authorization tool reads the electronic equipment information;
(3) the electronic equipment encodes the software version number and the unique code or the characteristic value of the equipment, and transmits the code serving as identity data to a production authorization tool;
(4) after the production authorization tool receives the identity data, the identity data is transmitted to the cloud server;
(5) after receiving the identity data, the cloud server inquires whether the identity data is legal or not, and the identity data is ensured to be used legally;
(6) the cloud server uses the identity data as a secret key to carry out encryption operation on the authorization file and sends the encrypted authorization file to a production authorization tool;
(7) the production authorization tool transparently transmits the received encrypted authorization file to the electronic equipment;
(8) after receiving the encrypted authorization file, the electronic equipment decrypts the encrypted authorization file by using the identity data, judges the legality of the authorization file and ensures that the authorization file is used legally; if the authorization file is used legally, the electronic equipment is legally produced, and the electronic equipment is allowed to enter a normal working state;
(9) and the cloud server updates the data and lists the identity data as used.
Further, in the step (3), the device unique code refers to a chip ID.
Further, in step (3), the characteristic value refers to a physical MAC address.
Further, in the step (5), whether the authorization operation is legal or not means whether the authorization operation is within a specified time limit, whether the software version number is within an allowable upgrading range, and whether the device unique code or the characteristic value is within a valid range.
Further, in step (8), the validity refers to whether the authorized file is a predefined complete and correct file.
Compared with the prior art, the invention has the following advantages:
the production authorization tool authorizes by logging in the cloud server and requests production, an authorizer can control the production state, and products produced in non-production time are definitely illegal; the software version number is also considered to be coded, and when the software is upgraded and then authorized again, the authorization cannot be stopped because the cloud end distributes an authorization file to the ID of the electronic equipment; the production authorization tool only plays a role in information transmission, data is not reserved, data is not processed, risks of information leakage and data writing are prevented, meanwhile, the production flow is simplified, and the requirement of multiple production lines of a factory is met; after receiving the identity data key, the cloud server is inquired to ensure that the cloud server is used for the first time; if the product is not the first time, the product is determined to be an illegal product, and authorization is not performed; because the identity data key is unique, and each identity data key is different, the encrypted authorization file is also unique, and each authorization file is different, thereby solving the problem that the authorization file is copied and abused; the authorized file is transmitted transparently, cannot be reserved and cannot be processed, and the information safety is ensured.
Drawings
Fig. 1 is a schematic structural diagram of a product authorization system according to an embodiment of the present invention.
FIG. 2 is a flowchart illustrating a product authorization method according to an embodiment of the invention.
Fig. 3 is a flowchart of the electronic device of the embodiment shown in fig. 2.
Detailed Description
The invention is described in further detail below with reference to the figures and specific embodiments.
Referring to fig. 1, the product authorization system of the present embodiment includes: the system comprises a cloud server, a production authorization tool and electronic equipment, wherein the cloud server is connected with the production authorization tool, and the production authorization tool is connected with the electronic equipment. The production authorization tool is a computer or equipment such as NFC, RFID and the like.
Referring to fig. 2, the product authorization method of the present embodiment includes the following steps:
(1) the production authorization tool logs in the cloud server and requests the cloud server to authorize the production authorization tool;
(2) after the production authorization tool successfully authorizes, the production authorization tool reads the electronic equipment information;
(3) the electronic equipment encodes the software version number and the unique code or the characteristic value of the equipment, and transmits the code serving as identity data to a production authorization tool; in this embodiment, the unique device code is a chip ID, and the characteristic value is a physical MAC address;
(4) after the production authorization tool receives the identity data, the identity data is transmitted to the cloud server;
(5) after receiving the identity data, the cloud server inquires whether the identity data is legal or not, and the identity data is ensured to be used legally; whether the authorized operation is within the specified time limit, whether the software version number is within the allowable upgrading range, and whether the unique code or the characteristic value of the equipment is within the valid range is legal or not;
(6) the cloud server uses the identity data as a secret key to carry out encryption operation on the authorization file and sends the encrypted authorization file to a production authorization tool;
(7) the production authorization tool transparently transmits the received encrypted authorization file to the electronic equipment;
(8) after receiving the encrypted authorization file, the electronic equipment decrypts the encrypted authorization file by using the identity data, judges the legality of the authorization file and ensures that the authorization file is used legally; legitimacy here means whether the authorization file is a predefined complete, correct file; if the authorization file is used legally, the electronic equipment is legally produced, and the electronic equipment is allowed to enter a normal working state;
(9) and the cloud server updates the data and lists the identity data as used.
The production authorization tool authorizes by logging in the cloud server and requests production, an authorizer can control the production state, and products produced in non-production time are definitely illegal. The software version number is also considered to be coded, and when the software is upgraded and then authorized again, the cloud end does not stop authorization because the cloud end distributes an authorization file to the electronic equipment ID. The production authorization tool only plays a role in information transmission, data is not reserved, data is not processed, risks of information leakage and writing and modifying are prevented, and meanwhile, the production flow is simplified; the requirement of multiple production lines of a factory is met. After receiving the identity data key, the cloud server is inquired to ensure that the cloud server is used for the first time; if not, the product is determined to be illegal and no authorization is performed. Because the identity data key is unique, and each identity data key is different, the encrypted authorization file is also unique, and each authorization file is different, thereby solving the problem that the authorization file is copied and abused. The authorized file is transmitted transparently, cannot be reserved and cannot be processed, and the information safety is ensured.
Referring to fig. 3, the program of the electronic device has a judgment mechanism, the electronic device can normally operate only after being authorized, and if not authorized, the electronic device can only enter an authorization flow.
Various modifications and variations of the present invention may be made by those skilled in the art, and they are also within the scope of the present invention provided they are within the scope of the claims of the present invention and their equivalents.
What is not described in detail in the specification is prior art that is well known to those skilled in the art.
Claims (5)
1. A method of product production authorisation, comprising the steps of:
(1) the production authorization tool logs in the cloud server and requests the cloud server to authorize the production authorization tool;
(2) after the production authorization tool successfully authorizes, the production authorization tool reads the electronic equipment information;
(3) the electronic equipment encodes the software version number and the unique code or the characteristic value of the equipment, and transmits the code serving as identity data to a production authorization tool;
(4) after the production authorization tool receives the identity data, the identity data is transmitted to the cloud server;
(5) after receiving the identity data, the cloud server inquires whether the identity data is legal or not, and the identity data is ensured to be used legally; (6) the cloud server uses the identity data as a secret key to carry out encryption operation on the authorization file and sends the encrypted authorization file to a production authorization tool;
(7) the production authorization tool transparently transmits the received encrypted authorization file to the electronic equipment;
(8) after receiving the encrypted authorization file, the electronic equipment decrypts the encrypted authorization file by using the identity data, judges the legality of the authorization file and ensures that the authorization file is used legally; if the authorization file is used legally, the electronic equipment is legally produced, and the electronic equipment is allowed to enter a normal working state;
(9) and the cloud server updates the data and lists the identity data as used.
2. A method of product production authorisation as claimed in claim 1, characterised by: in the step (3), the device unique code refers to a chip ID.
3. A method of product production authorisation as claimed in claim 1 or 2, characterised in that: in the step (3), the characteristic value refers to a physical MAC address.
4. A method of product production authorisation as claimed in claim 1 or 2, characterised in that: in the step (5), whether the authorization operation is legal or not means whether the authorization operation is within a specified time limit, whether the software version number is within an allowable upgrading range or not, and whether the unique code or the characteristic value of the equipment is within a valid range or not.
5. A method of product production authorisation as claimed in claim 1 or 2, characterised in that: in step (8), the validity refers to whether the authorization file is a predefined complete and correct file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910506854.XA CN110445749B (en) | 2019-06-12 | 2019-06-12 | Method for authorizing product production |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910506854.XA CN110445749B (en) | 2019-06-12 | 2019-06-12 | Method for authorizing product production |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110445749A CN110445749A (en) | 2019-11-12 |
CN110445749B true CN110445749B (en) | 2022-04-01 |
Family
ID=68429110
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910506854.XA Active CN110445749B (en) | 2019-06-12 | 2019-06-12 | Method for authorizing product production |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110445749B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112114830A (en) * | 2020-09-16 | 2020-12-22 | 天津光电通信技术有限公司 | Method for protecting FPGA (field programmable Gate array) programming file |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101938627A (en) * | 2009-06-30 | 2011-01-05 | 中兴通讯股份有限公司 | System and method for realizing authentication monitoring |
CN102176723A (en) * | 2011-03-25 | 2011-09-07 | 北京航空航天大学 | Manufacturing cloud system for supporting on-demand use and dynamic collaboration of manufacturing resources and manufacturing capacities |
CN105159735A (en) * | 2015-10-22 | 2015-12-16 | 宁波市江北九方和荣电气有限公司 | Control method for software burn in electronic product production |
CN105915345A (en) * | 2016-04-15 | 2016-08-31 | 烽火通信科技股份有限公司 | Realization method for authorized production and reform in home gateway device production testing |
CN106845164A (en) * | 2017-02-04 | 2017-06-13 | 深圳泰科晶显科技有限公司 | One kind is based on network software authorization method |
CN106997533A (en) * | 2017-04-01 | 2017-08-01 | 福建实达电脑设备有限公司 | A kind of POS terminal product safety production authentication management system and method |
CN107426250A (en) * | 2017-09-12 | 2017-12-01 | 大唐广电科技(武汉)有限公司 | A kind of industrial digital information network platform based on block chain |
CN107483392A (en) * | 2016-11-02 | 2017-12-15 | 深圳市波普安创技术有限公司 | The production authorization system and method for information safety devices |
CN108494813A (en) * | 2018-01-24 | 2018-09-04 | 杭州谷逸网络科技有限公司 | A kind of manufacturer's remote equipment operation control system and method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10080136B2 (en) * | 2012-12-25 | 2018-09-18 | At&T Mobility Ip, Llc | Credibility token system for over the air multi-programming of a wireless device and method of operation |
-
2019
- 2019-06-12 CN CN201910506854.XA patent/CN110445749B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101938627A (en) * | 2009-06-30 | 2011-01-05 | 中兴通讯股份有限公司 | System and method for realizing authentication monitoring |
CN102176723A (en) * | 2011-03-25 | 2011-09-07 | 北京航空航天大学 | Manufacturing cloud system for supporting on-demand use and dynamic collaboration of manufacturing resources and manufacturing capacities |
CN105159735A (en) * | 2015-10-22 | 2015-12-16 | 宁波市江北九方和荣电气有限公司 | Control method for software burn in electronic product production |
CN105915345A (en) * | 2016-04-15 | 2016-08-31 | 烽火通信科技股份有限公司 | Realization method for authorized production and reform in home gateway device production testing |
CN107483392A (en) * | 2016-11-02 | 2017-12-15 | 深圳市波普安创技术有限公司 | The production authorization system and method for information safety devices |
CN106845164A (en) * | 2017-02-04 | 2017-06-13 | 深圳泰科晶显科技有限公司 | One kind is based on network software authorization method |
CN106997533A (en) * | 2017-04-01 | 2017-08-01 | 福建实达电脑设备有限公司 | A kind of POS terminal product safety production authentication management system and method |
CN107426250A (en) * | 2017-09-12 | 2017-12-01 | 大唐广电科技(武汉)有限公司 | A kind of industrial digital information network platform based on block chain |
CN108494813A (en) * | 2018-01-24 | 2018-09-04 | 杭州谷逸网络科技有限公司 | A kind of manufacturer's remote equipment operation control system and method |
Also Published As
Publication number | Publication date |
---|---|
CN110445749A (en) | 2019-11-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI747836B (en) | Device birth certificate | |
EP3099037B1 (en) | Providing a password for temporary access privilege escalation in a control program | |
US9280653B2 (en) | Security access method for automotive electronic control units | |
CN103685267B (en) | Data access method and device | |
US7108177B2 (en) | Proximity validation system and method | |
EP4081921B1 (en) | Contactless card personal identification system | |
EP3648396B1 (en) | Maintenance system and maintenance method | |
CN106658493A (en) | Key management method, device and system | |
CN111209558B (en) | Internet of things equipment identity authentication method and system based on block chain | |
CN101989982A (en) | Information processing apparatus, program, storage medium and information processing system | |
CN103067333A (en) | Method for verifying set top box access identity and authentication server | |
CN104717198A (en) | Updating software on a secure element | |
CN101841525A (en) | Secure access method, system and client | |
CN111314366B (en) | MQTT protocol-based secure login system and method | |
CN104954330A (en) | Method of accessing data resources, device and system | |
CN111347996B (en) | Remote vehicle locking control system and control method for new energy vehicle | |
CN113661699A (en) | System and method for pre-authentication of customer support calls | |
CN109583154A (en) | A kind of system and method based on Web middleware access intelligent code key | |
CN108768941B (en) | Method and device for remotely unlocking safety equipment | |
US20200226275A1 (en) | Activating or deactivating a feature of a vehicle | |
CN113765655A (en) | Access control method, device, equipment and storage medium | |
CN110445749B (en) | Method for authorizing product production | |
CN107968764B (en) | Authentication method and device | |
CN103559430A (en) | Application account management method and device based on android system | |
CN103260157A (en) | User management system based on satellite communication services and application method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |