CN114357538A - Authorization management method, system and storage medium for shield machine - Google Patents

Authorization management method, system and storage medium for shield machine Download PDF

Info

Publication number
CN114357538A
CN114357538A CN202111506446.8A CN202111506446A CN114357538A CN 114357538 A CN114357538 A CN 114357538A CN 202111506446 A CN202111506446 A CN 202111506446A CN 114357538 A CN114357538 A CN 114357538A
Authority
CN
China
Prior art keywords
machine
shield machine
module
password
authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111506446.8A
Other languages
Chinese (zh)
Inventor
刘绥美
杨梦柳
陈可
吴友兴
谭远良
黄山乙
刘祥
韩少锋
章龙管
李开富
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Railway Engineering Service Co Ltd
Original Assignee
China Railway Engineering Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Railway Engineering Service Co Ltd filed Critical China Railway Engineering Service Co Ltd
Priority to CN202111506446.8A priority Critical patent/CN114357538A/en
Publication of CN114357538A publication Critical patent/CN114357538A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

In the method, the system and the storage medium for managing the authorization of the shield machine, the machine code corresponding to the industrial personal computer of the shield machine is generated by the machine code generation module according to the CPU hardware serial number of the industrial personal computer of the shield machine, then the password generated according to the machine code is obtained through the decryption module, the password is decrypted, the starting time and the longest available days are obtained, the timing counting module counts down according to the starting time and the longest available days, when the count down is smaller than a time threshold value, the warning module is reminded to prompt, and when the count down is zero, the screen of the industrial personal computer is locked by the screen locking module. Therefore, the labor cost and the maintenance cost in the shield machine management are reduced. Meanwhile, the machine codes corresponding to the industrial personal computer one to one are generated, so that the same authorization can not be used in series, the authorization effect is improved, and the shield machine property right party can effectively, conveniently and safely manage the authorization of the shield machine.

Description

Authorization management method, system and storage medium for shield machine
Technical Field
The application relates to the technical field of shield machines, in particular to a shield machine authorization management method, a shield machine authorization management system and a storage medium.
Background
With the development of infrastructure, the development of underground space is greatly promoted, so that the demand of the shield machine is increased year by year. Due to the high price of the shield machine and the inequality between the construction period and the life period of the shield machine, the renting business mode of the shield machine is widely applied. However, how to prevent the lessee from continuing to use after the lease of the shield machine is over is a problem which needs to be solved urgently.
In the related art, there are two processing methods to solve the above problems:
the method I is characterized in that manual intervention is performed on the core hardware. For example, a core control unit or a data storage device of the shield machine equipment is disassembled, so that the shield machine cannot be started normally.
A second method and a software intervention means. For example, authorized time control is added on the software level of a PLC control unit of a shield machine controller, and due locking is carried out.
For the first method, personnel needs to be sent to the site where the shield tunneling machine is located to implement the first method, and extra labor cost is increased. For the second method, the PLC control software needs to be updated every time the lease expires, so that developers of the PLC control software need to frequently modify and package the PLC control software, and since there are many software providers, the situation of authorization string may occur, which results in poor authorization effect and also increases maintenance cost.
Disclosure of Invention
The application provides a method, a system and a storage medium for authorization management of a shield machine, which are used for at least solving the technical problems of high labor cost, high maintenance cost and poor authorization effect in the related technology.
An embodiment of a first aspect of the present application provides a shield machine authorization management system, including:
the machine code generating module is used for generating a machine code corresponding to the shield machine industrial control computer according to a CPU hardware serial number of the shield machine industrial control computer;
the decryption module is used for acquiring the password generated according to the machine code and decrypting the password to obtain the starting time and the longest available days;
the timing counting module is used for counting down according to the starting time and the longest available days;
the reminding and warning module is used for carrying out reminding when the countdown is less than a time threshold;
and the screen locking module is used for locking the screen of the industrial personal computer when the countdown is zero. An embodiment of a second aspect of the present application provides a method for managing authorization of a shield machine, including:
generating a machine code corresponding to the shield machine control machine according to a CPU hardware serial number of the shield machine control machine;
acquiring a password generated according to the machine code, and decrypting the password to obtain the starting time and the longest available days;
counting down according to the starting time and the longest available days;
when the countdown is smaller than a time threshold, prompting;
and when the countdown is zero, locking the screen of the industrial personal computer.
The technical scheme provided by the embodiment of the application at least has the following beneficial effects:
in the method, the system and the storage medium for managing the authorization of the shield machine, the machine code corresponding to the industrial personal computer of the shield machine is generated by the machine code generation module according to the CPU hardware serial number of the industrial personal computer of the shield machine, then the password generated according to the machine code is obtained by the decryption module, the password is decrypted, the starting time and the longest available days are obtained, the timing counting module counts down according to the starting time and the longest available days, when the count down is smaller than a time threshold value, the warning module is reminded to prompt, and when the count down is zero, the screen of the industrial personal computer is locked by the screen locking module. Therefore, the shield machine authorization management system can help the property right party to rule the behavior that the leasing party violates the leasing contract to use the shield machine, so that the labor cost and the maintenance cost in the shield machine management are reduced. Meanwhile, the machine codes corresponding to the industrial personal computer one to one are generated, so that the same authorization can not be used in series, the authorization effect is improved, and the shield machine property right party can effectively, conveniently and safely manage the authorization of the shield machine.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a schematic structural diagram of a shield machine authorization management system according to an embodiment of the present application;
fig. 2 is a schematic flow chart of a shield machine authorization management method according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary and intended to be used for explaining the present application and should not be construed as limiting the present application.
In the method, the system and the storage medium for managing the authorization of the shield machine, the machine code corresponding to the industrial personal computer of the shield machine is generated by the machine code generation module according to the CPU hardware serial number of the industrial personal computer of the shield machine, then the password generated according to the machine code is obtained by the decryption module, the password is decrypted, the starting time and the longest available days are obtained, the timing counting module counts down according to the starting time and the longest available days, when the count down is smaller than a time threshold value, the warning module is reminded to prompt, and when the count down is zero, the screen of the industrial personal computer is locked by the screen locking module. Therefore, the shield machine authorization management system can help the property right party to rule the behavior that the leasing party violates the leasing contract to use the shield machine, so that the labor cost and the maintenance cost in the shield machine management are reduced. Meanwhile, the machine codes corresponding to the industrial personal computer one to one are generated, so that the same authorization can not be used in series, the authorization effect is improved, and the shield machine property right party can effectively, conveniently and safely manage the authorization of the shield machine.
The following describes a method and a system for managing authorization of a shield machine according to an embodiment of the present application with reference to the accompanying drawings.
Example one
Fig. 1 is a schematic structural diagram of a shield machine authorization management system according to an embodiment of the present application, and as shown in fig. 1, the shield machine authorization management system may include:
the machine code generating module 101 is used for generating a machine code corresponding to the shield machine control machine according to a CPU hardware serial number of the shield machine control machine;
the decryption module 102 is configured to obtain a password generated according to the machine code, and decrypt the password to obtain a start time and the longest available days;
the timing counting module 103 is used for counting down according to the starting time and the longest available days;
a reminding and warning module 104, configured to prompt when the countdown is less than the time threshold;
and the screen locking module 105 is used for locking the screen of the industrial personal computer when the countdown is zero.
It should be noted that the machine code generation module is further configured to:
acquiring a CPU hardware serial number of a shield tunneling machine control machine;
performing MD5_32BIT calculation on the CPU hardware serial number;
and performing CRC32 calculation on the calculation result to obtain the machine code of the shield machine control machine.
In addition, in the embodiment of the disclosure, the length of the machine code of the shield machine controller obtained by the machine code generation module is a 16-system character string with 8 bits, and the machine code generated by each shield machine controller is unique, so that the machine codes generated by different shield machine controllers are different. Meanwhile, after the machine code generating module generates the machine code, the generated machine code is stored in the shield machine authorization management system so as to be directly read out in the subsequent use without regeneration.
Further, in embodiments of the present disclosure, the password generated from the machine code is server-side generated. Specifically, a 58-bit binary code is mixed with the machine code and then encrypted to generate a 10-bit character string containing only large letters and numbers. Among the embodiments of the present disclosure, the 58-bit binary code includes a dongle check bit, a machine code check bit, a start time, and the maximum available days.
Specifically, in the embodiment of the present disclosure, 1 to 6 bits of the 58-bit binary code are dongle check bits, 7 to 12 bits are machine code check bits, 13 to 30 bits are start time, 31 to 44 bits are the longest available days, and then 4 th, 8 th, 12 th, 16 th, 20 th, 24 th, 28 th, 32 th, 36 th, 40 th, 44 th, 48 th, 52 th, 56 th bits (4 times of digits) of the 58 bits are set as meaningless random bits on the basis of the existing 44 bits. After the decryption module decrypts, the set random bit is removed, then the random bit is verified with the machine code and the dongle data of the shield machine industrial personal computer, and the shield machine industrial personal computer can be authorized to use after the verification is successful, and the authorization time limit is counted down.
In an embodiment of the present disclosure, the start time in the 58-bit binary code is 18 bits of the current year, month and day when the server generates the password. For example, if the time for the server to generate the password is 2019, 10/1, 20191001-. And in the embodiment of the present disclosure, the available days in the 58-bit binary code are 31-44 bits that are obtained by converting the available days into 2-bit left-end complementary 0 and placing 14 bits into the 58-bit binary code.
Further, in the embodiment of the disclosure, the decryption module verifies the decrypted data with the machine code and the dongle data of the shield machine tool. Specifically, the decryption module obtains the value of the dongle data storage area from the dongle identification module, and then performs 32-bit decryption on the obtained value to convert the value into a binary system with a length of 20 bits, which is called a dogid for short. Comparing the 1-3 bits after the random bits are removed after decryption with the 3 bits before the dogid, comparing the 4-6 bits with the 17-19 bits of the dogid, and checking the machine code if the comparison is successful. Otherwise, the user directly prompts that the password input is wrong and the authorization fails.
Further, in the embodiment of the present disclosure, the decryption module converts the 16-ary machine code in the storage area into binary, called cid for short. And then comparing the 7-9 bits after the random bits are removed after decryption with the first 3 bits of the cid, comparing the 10-12 bits with the last 3 bits of the cid, and if the comparison is successful, authorizing the successful shield machine to start using. Otherwise, the user directly prompts that the password input is wrong and the authorization fails.
Further, in the embodiment of the disclosure, after the authorization is successful, the timing counting module may count down according to the start time and the maximum available days in the password, so as to effectively prevent the user from prolonging the authorization time by modifying the local time of the industrial personal computer.
Specifically, in the embodiment of the disclosure, if the start time is authorized successfully on the same day, the timing counting module converts the available days into minutes, counts down, and performs a subtraction operation of 1 per minute when the shield tunneling machine authorization management system operates every minute. If the user is not authorized on the same day at the starting time, the timing counting module calculates the difference between the time of the current password input and the starting time in the decryption module, subtracts the difference from the available days to obtain the final available days, and converts the final available days into minutes for countdown.
For example, assume that the authorization start time for acquisition is 20191021 and the available days are 30 days. Then if the user successfully authorizes the current day on day 21/10/2019, the time count module starts to count down from 30x24x 60-43200 minutes. If the user successfully authorizes the current day on day 23/10/2019, the time count module starts to count down from 40320 minutes (30- (23-21)) x24x 60.
In the embodiment of the disclosure, when the countdown is less than the time threshold, the reminding and warning module prompts. Optionally, the reminder alert module may prompt that the authorization is about to expire when the remaining time of the countdown of the time counting module is less than 100 hours. Alternatively, the reminder alert module may prompt that the authorization is about to expire when the remaining time of the countdown of the time counting module is less than 10 days.
And in the embodiment of the disclosure, when the countdown is zero, the screen locking module locks the screen of the industrial personal computer. In addition, under the state of screen locking, information security management is added, so that a user is prevented from cracking the shield machine authorization management system under the state of screen locking, and the use of the industrial personal computer is prolonged. Specifically, in the embodiment of the present disclosure, a hook keyboard may be added to the application layer keyboard hook; shielding three hot keys of alt + f4, ctrl + esc and win + tab; modifying the registry and shielding the task manager; the background finishes the desktop process and restores after unlocking; and reserving a shutdown operation entrance.
In some embodiments, the screen lock module is further configured to provide a password entry box and an unlock button. And the screen locking module is further used for:
step 1, acquiring an input unlocking password;
step 2, verifying the unlocking password;
and 3, when the verification is passed, unlocking the screen based on the unlocking password.
In the embodiment of the present disclosure, the verification method for the unlocking password may refer to the verification method for the decryption module, which is not described herein again.
In some embodiments, the screen lock module may also obtain an entered provisional password. Wherein, if the bits 31-36 are the same as the bits 25-30 in the 58-bit binary system after the temporary password is decrypted, the temporary password passes the verification. When the provisional password is verified, the screen may be unlocked for 24 hours.
In some embodiments, the screen lock module may also obtain an entered passkey. And if the bits 37-42 are the same as the bits 25-30 in the 58-bit binary system after the temporary password is decrypted, the universal password passes the verification. If the universal password passes the verification, the screen can be unlocked for 24 hours.
In summary, the shield machine authorization management system provided by the application generates the machine code corresponding to the shield machine control machine industrial personal computer according to the CPU hardware serial number of the shield machine control machine through the machine code generation module, then obtains the password generated according to the machine code through the decryption module, decrypts the password to obtain the start time and the longest available days, the timing counting module counts down according to the start time and the longest available days, when the count down is smaller than the time threshold, the warning module is reminded to prompt, and when the count down is zero, the screen of the industrial personal computer is locked by the screen locking module. Therefore, the shield machine authorization management system can help the property right party to rule the behavior that the leasing party violates the leasing contract to use the shield machine, so that the labor cost and the maintenance cost in the shield machine management are reduced. Meanwhile, the machine codes corresponding to the industrial personal computer one to one are generated, so that the same authorization can not be used in series, the authorization effect is improved, and the shield machine property right party can effectively, conveniently and safely manage the authorization of the shield machine.
Example two
Fig. 2 is a schematic flow chart of a shield machine authorization management method according to an embodiment of the present application, and as shown in fig. 2, the method may include:
step 201, generating a machine code corresponding to a shield machine control machine according to a CPU hardware serial number of the shield machine control machine;
step 202, obtaining a password generated according to the machine code, and decrypting the password to obtain the starting time and the longest available days;
step 203, counting down according to the starting time and the longest available days;
step 204, when the countdown is less than the time threshold, prompting;
and step 205, locking the screen of the industrial personal computer when the countdown is zero.
The method for generating the machine code corresponding to the shield machine tool according to the CPU hardware serial number of the shield machine tool in this embodiment may include the following steps:
step one, acquiring a CPU hardware serial number of a shield tunneling machine;
step two, performing MD5_32BIT calculation on the CPU hardware serial number;
and step three, performing CRC32 calculation on the calculation result to obtain a machine code of the shield machine control machine.
In order to implement the above embodiments, the present disclosure also provides a computer storage medium.
The computer storage medium provided by the embodiment of the disclosure stores an executable program; the executable program, when executed by a processor, is capable of implementing a method as shown in either of figures 1 or 2.
In order to implement the above embodiments, the present disclosure also provides a computer device.
The computer equipment provided by the embodiment of the disclosure comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor; the processor, when executing the program, is capable of implementing the method as shown in either fig. 1 or fig. 2.
In summary, according to the method, the system and the storage medium for managing the authorization of the shield machine provided by the application, the machine code corresponding to the industrial personal computer of the shield machine is generated according to the CPU hardware serial number of the industrial personal computer of the shield machine, then the password generated according to the machine code is obtained, the password is decrypted to obtain the start time and the longest available number of days, countdown is performed according to the start time and the longest available number of days, when the countdown is less than the time threshold, a prompt is performed, and when the countdown is zero, the screen of the industrial personal computer is locked. Therefore, the shield machine authorization management system can help the property right party to rule the behavior that the leasing party violates the leasing contract to use the shield machine, so that the labor cost and the maintenance cost in the shield machine management are reduced. Meanwhile, the machine codes corresponding to the industrial personal computer one to one are generated, so that the same authorization can not be used in series, the authorization effect is improved, and the shield machine property right party can effectively, conveniently and safely manage the authorization of the shield machine.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing steps of a custom logic function or process, and alternate implementations are included within the scope of the preferred embodiment of the present application in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.

Claims (10)

1. A shield machine authorization management system, characterized in that the system comprises:
the machine code generating module is used for generating a machine code corresponding to the shield machine control machine according to a CPU hardware serial number of the shield machine control machine;
the decryption module is used for acquiring the password generated according to the machine code and decrypting the password to obtain the starting time and the longest available days;
the timing counting module is used for counting down according to the starting time and the longest available days;
the reminding and warning module is used for carrying out reminding when the countdown is less than a time threshold;
and the screen locking module is used for locking the screen of the industrial personal computer when the countdown is zero.
2. The system of claim 1, further comprising:
and the softdog identification module is used for acquiring the value of the softdog data storage area of the shield machine controller.
3. The system of claim 1, wherein the machine code generation module is further configured to:
acquiring a CPU hardware serial number of the shield machine control machine;
performing MD5_32BIT calculation on the CPU hardware serial number;
and performing CRC32 calculation on the calculation result to obtain the machine code of the shield machine control machine.
4. The system of claim 1, wherein the password generated according to the machine code is generated by mixing a 58-bit binary code with the machine code and then encrypting the mixture to generate a 10-bit character string containing only large letters and numbers.
5. The system of claim 4, wherein the 58-bit binary code comprises a dongle check digit, a machine code check digit, a start time, and a maximum number of available days.
6. The shield machine authorization management system according to claim 1, characterized in that the screen locking module is further configured to provide a password input box and an unlocking button;
the screen locking module is further configured to:
acquiring an input unlocking password;
verifying the unlocking password;
and when the verification is passed, unlocking the screen based on the unlocking password.
7. A shield machine authorization management method is characterized by comprising the following steps:
generating a machine code corresponding to the shield machine control machine according to a CPU hardware serial number of the shield machine control machine;
acquiring a password generated according to the machine code, and decrypting the password to obtain the starting time and the longest available days;
counting down according to the starting time and the longest available days;
when the countdown is smaller than a time threshold, prompting;
and when the countdown is zero, locking the screen of the industrial personal computer.
8. The method for managing the authorization of the shield machine according to claim 6, wherein generating the machine code corresponding to the industrial personal computer of the shield machine according to the CPU hardware serial number of the industrial personal computer of the shield machine comprises:
acquiring a CPU hardware serial number of the shield machine control machine;
performing MD5_32BIT calculation on the CPU hardware serial number;
and performing CRC32 calculation on the calculation result to obtain the machine code of the shield machine control machine.
9. A computer storage medium, wherein the computer storage medium stores computer-executable instructions; the computer-executable instructions, when executed by a processor, are capable of performing the method of any one of claims 7-8.
10. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor when executing the program implementing the method according to any of claims 7-8.
CN202111506446.8A 2021-12-10 2021-12-10 Authorization management method, system and storage medium for shield machine Pending CN114357538A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111506446.8A CN114357538A (en) 2021-12-10 2021-12-10 Authorization management method, system and storage medium for shield machine

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111506446.8A CN114357538A (en) 2021-12-10 2021-12-10 Authorization management method, system and storage medium for shield machine

Publications (1)

Publication Number Publication Date
CN114357538A true CN114357538A (en) 2022-04-15

Family

ID=81099638

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111506446.8A Pending CN114357538A (en) 2021-12-10 2021-12-10 Authorization management method, system and storage medium for shield machine

Country Status (1)

Country Link
CN (1) CN114357538A (en)

Similar Documents

Publication Publication Date Title
US9203836B2 (en) Token for securing communication
CN102508791B (en) Method and device for encrypting hard disk partition
JP5964077B2 (en) Control program management system and control program change method
WO2019087443A1 (en) Data management system and data management method
US9497188B2 (en) Offline authentication with embedded authorization attributes
US20080189549A1 (en) Secure serial number
CN100395679C (en) Software authorizing and protecting device and method
CN105340211A (en) System and methods for encrypting data
EP2378414A2 (en) Remote update method for firmware
JP2008072613A (en) Management system, management device, and management method
CN110519056B (en) Login method, password generation method and related devices thereof
CN103970540A (en) Method and device for safely calling key function
CN109166199B (en) Password generation method, device and equipment
CN111159661B (en) Decompilation prevention method and device, electronic equipment and storage medium
CN104751028A (en) Application encrypting and decrypting method and device
CN114357538A (en) Authorization management method, system and storage medium for shield machine
CN112231651A (en) Method for preventing decompiling and tampering copyright authorization
KR102555647B1 (en) Big data access management system server that manages access to data stored on big data storage server
CN113468565B (en) Intelligent door lock control method and system
CN112668024B (en) Method for preventing tampering of data at gas meter end
CN115022035A (en) CAN communication encryption method and device, electronic equipment and storage medium
CN103745143A (en) Computer protection method
CN107272503B (en) Five-prevention unlocking card management method for transformer substation
CN104239777A (en) Method and system for releasing control of controlled equipment
EP4283502A1 (en) Method for installing electronic certificate and system for installing electronic certificate

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination