TWI271082B - Method and system using machine code to lock data - Google Patents

Method and system using machine code to lock data Download PDF

Info

Publication number
TWI271082B
TWI271082B TW94120748A TW94120748A TWI271082B TW I271082 B TWI271082 B TW I271082B TW 94120748 A TW94120748 A TW 94120748A TW 94120748 A TW94120748 A TW 94120748A TW I271082 B TWI271082 B TW I271082B
Authority
TW
Taiwan
Prior art keywords
user
code
user account
password
account
Prior art date
Application number
TW94120748A
Other languages
Chinese (zh)
Other versions
TW200701733A (en
Inventor
Ching-Yuan Lai
Dung-Ru Wu
Jeng-Wei Tsai
Ming-Ren Yu
Original Assignee
Softstar Entertainment Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Softstar Entertainment Inc filed Critical Softstar Entertainment Inc
Priority to TW94120748A priority Critical patent/TWI271082B/en
Publication of TW200701733A publication Critical patent/TW200701733A/en
Application granted granted Critical
Publication of TWI271082B publication Critical patent/TWI271082B/en

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention relates to a method using machine code to lock data. The method includes steps of using a computer device to execute an application program and logging in a server end with the machine code of the computer device through an operation interface generated by the application program, inputting a user account number and a user password in the operation interface and performing an encryption operation on the user account number and the password, using the encrypted user account number and the user password to log in the server end and performing a data-locking operation accordingly, wherein the mentioned encryption operation employs an encryption algorithm to convert the user account number and the user password into a first password and a second password respectively, and a mathematical operation, a logical operation or a combination of both is executed with respect to the first password and the second password.

Description

1271082 九、發明說明: 【發明所屬之技術領域】 本發明係有關於一種資料鎖定的方法與系統,且特別有關 於一種利用機器碼執行資料鎖定的方法與系統。 【先前技術】 近來線上遊戲帳號盜用情事在各遊戲營運商間廣為擴大, 玩家的虛擬貨幣、虛擬寶物等『有價品』損失惨重,衍生了一 些社會問題與浪費警力資源等。 為了有效解決盜用問題,各遊戲營運商紛紛提出對應的解 決方法。「遊戲橘子」推出採用公開金鑰基礎建設(Public Key Infrastructure,以下簡稱為PKI )與憑證技術的實體晶片卡 「PlaySAFE數位安全卡」,並且結合既有的遊戲帳號與加碼鎖 設計,以「帳號+密碼+ PlaySAFE數位安全卡」的3道安全機 制,以有效捍衛玩家權益。 PKI電子憑證可視為玩家的虛擬身分證,用來辨識使用者 在網路環境中的身分及確保網路資料的正確性,建立網路交易 雙方信賴關係。電子憑證通常由憑證機構或使用者的交易對象 (如銀行)核發,内容包含使用者基本資料(如使用者姓名、 序號、憑證機構名稱等)、憑證有效期限、用以加密訊息的公開 金鑰、用以驗證憑證真實性的憑證機構電子簽章以及其他作為 身分辨識等資訊。 「PlaySAFE數位安全卡」除了在玩家端使用PKI加密技術 外,在資料傳輸過程中也會經過SSL通道加密,而伺服端每次 都會回傳不同的一次性密碼(ONE-TIME PASSWORD)給晶片 卡再次認證,即使加密封包被駭客攔截並重新發出,只要沒有 0730-A21143TWF(N2);alexchen ⑧ 1271082 實體卡在手,照樣無法通過認證進入遊戲。 *此外,其它解決方案更包括利用指紋辨識㈣與金鑰隨身 碟等解決安全性問題,然而,其包括下述缺點。首先,硬體成 本偏高。指紋機、IC晶片卡與金输隨身碟均所費不實。其次, 體裝置不利攜帶行動和保管。若玩家需被迫隨身攜帶各 =各樣时全職裝置,*但攜帶困難,且若㈣遺失更為麻 ,显此:’上述資料加密方式仍非百分百安全。由於科技曰新 二I用上切體裝置進行f料認證與身分辨識的行為仍 …、法避免使用者資料被側錄。 體2二斤二為了解決玩家帳號被盜而造成損失並且克服硬 資料鎖定的方_統發㈣供了—碼執行 【發明内容】 基於上述目的,本發明實施例揭露了 資料敎的方法。制_電 胃執π 庫用裎切“… 應用程式,並藉由該 應用釭式所產生之_#作介面,將該電 -飼服端。在該操作介面中輸人 ^&碼|錄到 碼,然後對該使用者帳號與密碼執行一加密操:與::= 使用者帳號與使用者密碼登錄至該伺服端,並且據二 號與該使用者密碼分別轉換使用者帳 對該第一密碼與該第二密石馬執行一數學運算、^且 述兩種運算之結合。 t輯運异或上 本發明實施例更揭露了一種利用機器碼執行 法。利用一電腦裝置開啟一 、4、貞疋的方 應用私式並藉由該應用程式所產 0730-A21143TWF(N2);alexchen ⑧ 6 1271082 操作介面,將該電腦裝置的機器碼登錄到—舰端。在 介面中輸人-第-使用者帳號與密碼,對該第—使用者 =與密碼執行-加錢作,,然後將加密後的第—使用者帳號 斗:讼碼登錄至該伺服端。彻—行動裝置建立—包含複數控制 代碼之簡訊’其中該等控制代碼包括—軟體代碼、—第二使用 :帳號以及一操作代碼。將該簡訊傳送至該伺服端,並且對該 軟體代碼、該第二❹者帳號以及該操作代碼進行紐,並且 在涊證通過後執行對應該操作代碼之操作。 本發明實施例更揭露了 一種利用機器碼執行資料鎖定的系 統’包括-電腦裝置、一伺服端以及一客戶端。該客戶端利用 «腦裝置登人到該舰端’根據—使用者操作將該電腦裝置 的機器碼傳送到該舰端以進行登錄,利用—第—電腦裝置執 行一第-應用程式,藉由該第-制程式所產生之__操作介 面’將該第-電腦裝置的機器碼登錄到該伺服端,在該操作介 面中輸入—第—使用者帳號與-第-使用者密碼,對該第一使 用者帳號與第-密碼執行__加密操作,將加密後的第—使用者 帳號與第—使用者密碼登錄至該伺服端,並且據以執行一資料 鎖定操作。 、 該系統更包括一行動裝置,耦接於該伺服端,該客戶端利 用該行動裝置建立一包含複數控制代碼之簡訊,其中該等押制 代碼包^軟體代碼、一第二使用者帳號以及一操作二馬;然 後將该簡訊傳送至該伺服端。該伺服判斷對應該行動裝置的電 話號碼與預先登錄的電話號碼是否相同,若相同,則判斷該軟 體代碼、該第二使用者帳號以及該操作代碼是否與預設的^ 代碼、該第一使用者帳號以及操作代碼符合,且若符:則^該 第一使用者帳號自停用狀態改變為上鎖或解鎖狀態。口、7 ^ 0730-Α21143TWF(N2);alexchen 7 Ϊ271082 【實施方式】 為了讓本發明之目的、特徵、127. The invention relates to a method and system for data locking, and more particularly to a method and system for performing data locking using machine code. [Prior Art] Recently, online game account theft has been widely expanded among game operators. Players' virtual currency, virtual treasures and other "valuable goods" have suffered heavy losses, and some social problems and waste of police resources have been derived. In order to effectively solve the problem of misappropriation, various game operators have proposed corresponding solutions. "Game Orange" launched the physical CD card "PlaySAFE Digital Security Card" using Public Key Infrastructure (PKI) and voucher technology, combined with the existing game account and code lock design, with "account number" + Password + PlaySAFE Digital Security Card's 3-way security mechanism to effectively defend player rights. The PKI e-Certificate can be regarded as the player's virtual identity card, which is used to identify the user's identity in the network environment and ensure the correctness of the network data, and establish a trust relationship between the two parties. The electronic voucher is usually issued by the voucher institution or the user's transaction object (such as a bank), and the content includes the user's basic information (such as the user's name, serial number, certificate institution name, etc.), the validity period of the voucher, and the public key used to encrypt the message. The electronic signature of the certificate authority used to verify the authenticity of the voucher and other information such as identity identification. In addition to using PKI encryption technology on the player side, the "PlaySAFE Digital Security Card" will also be encrypted by the SSL channel during data transmission, and the server will return a different one-time password (ONE-TIME PASSWORD) to the chip card each time. Once again, even if the sealed package is intercepted and reissued by the hacker, as long as there is no 0730-A21143TWF (N2); alexchen 8 1271082 physical card is in hand, still can not enter the game through certification. * In addition, other solutions include the use of fingerprint identification (4) and key disk to solve security problems, however, it includes the following shortcomings. First, the hardware cost is high. Fingerprint machines, IC chip cards and gold-plated flash drives are all unrealistic. Second, the body device is unfavorable to carry action and storage. If the player needs to be forced to carry all the full-time devices, * but it is difficult to carry, and if (4) is more numb, it is obvious: 'The above data encryption method is still not 100% safe. Because of the technology, the new II I used the upper body device to perform the f-material authentication and identity identification behavior, and the method prevents the user data from being recorded. In order to solve the problem that the player account is stolen and the hard data is locked, the method is implemented. The invention is disclosed in the embodiment of the present invention. System_Electric stomach π 库 裎 裎 “ “ “ “ “ “ ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... Record the code, and then perform an encryption operation on the user account and password: and::= user account and user password are logged into the server, and the user account is converted according to the number 2 and the user password respectively. The first password and the second Mishima perform a mathematical operation, and the combination of the two operations. The embodiment of the present invention further discloses a method using machine code execution. 4, 贞疋 应用 应用 应用 应用 应用 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 - The first-user account and password, the first-user=and password-execution-additional money, and then the encrypted first-user account: the lawsuit code is registered to the server. - a newsletter containing multiple control codes 'of which The code includes a software code, a second use: an account number, and an operation code. The message is transmitted to the server, and the software code, the second account number, and the operation code are updated, and the certificate is verified. The operation of the corresponding operation code is performed by the following. The embodiment of the invention further discloses a system for performing data locking using machine code, including a computer device, a server and a client. The client uses the brain device to board the person. The ship terminal transmits the machine code of the computer device to the ship terminal for login according to the user operation, and executes a first application program by using the first computer device, and the __ generated by the first program is generated. The operation interface 'registers the machine code of the first computer device to the server, and inputs the first-user account and the -user-user password in the operation interface, and executes the first user account and the first password. __Encryption operation, the encrypted first-user account and the first-user password are logged into the server, and a data locking operation is performed accordingly. The mobile device is coupled to the server, and the client uses the mobile device to establish a short message including a plurality of control codes, wherein the coded code includes a software code, a second user account, and an operation And then transmitting the short message to the server. The servo determines whether the phone number corresponding to the mobile device is the same as the phone number registered in advance, and if the same, determining whether the software code, the second user account, and the operation code are Corresponding to the preset ^ code, the first user account and the operation code, and if the character: then ^ the first user account changes from the deactivated state to the locked or unlocked state. Port, 7 ^ 0730 - Α 21143TWF ( N2);alexchen 7 Ϊ271082 [Embodiment] In order to make the object, features, and features of the present invention

與糸統。 本發明實施例之資料鎖定方法係利用下述兩種方式達到其 目的,其 透過唯一With Sis. The data locking method in the embodiment of the present invention achieves the purpose by using the following two methods, which are unique

使用者帳號的鎖定狀態。 有關利用機器碼登錄與鎖定帳號的方式達到資料鎖定的實 施流程如下所述。 第1圖係顯示本發明實施例之利用機器碼執行資料鎖定的 方法步驟流程圖。首先,利用一電腦裝置開啟一應用程式以連 線到一伺服端(步驟S11),然後將該電腦裝置的機器碼登錄到 忒伺服端(步驟S12)。在本發明實施例中,主要係將該電腦裝 置之、满路卡的媒體存取控制控制(Media Access Control,以下 簡稱為MAC )位址登錄到該伺服端,但並非用以限定本發明, 其匕如中央處理器(Central Processing Unit,CPU )或其它硬體 裝置的唯一序號。 將機器碼登錄後’在一操作介面中利用一『螢幕小鍵盤』 輸入使用者資料(即使用者帳號(ID)與密碼(pw))(步驟S13)。 0730-A21143TWF(N2);alexchenThe lock status of the user account. The implementation process for data lock using the machine code to log in and lock the account is as follows. BRIEF DESCRIPTION OF THE DRAWINGS Figure 1 is a flow chart showing the steps of a method for performing data locking using machine code in an embodiment of the present invention. First, an application is opened by a computer device to connect to a server (step S11), and then the machine code of the computer device is registered to the server (step S12). In the embodiment of the present invention, the media access control (Media Access Control, hereinafter referred to as MAC) address of the full-channel card of the computer device is mainly registered to the server, but is not intended to limit the present invention. It is, for example, a unique serial number of a Central Processing Unit (CPU) or other hardware device. After the machine code is registered, the user profile (i.e., user account (ID) and password (pw)) is input using a "screen keypad" in an operation interface (step S13). 0730-A21143TWF(N2);alexchen

(步 B 1271082 利用『螢幕小鍵盤』可令使用者在前端輸入帳號與密碼時避免 被惡意程式擷取。接下來,對使用者輸入的帳號與密碼執行一 『改良式不可逆編碼』操作以進行加密(步驟S14),然後利用 安全交易傳輸層加密技術(Secure Socket Layer,以下簡稱為 SSL)將加密後的使用者資料傳送至該伺服端(步驟S15),令 使用者可據以執行各項資料鎖定操作。 接下來說明步驟S14中之『改良式不可逆編碼』的實施流 程。參考第2圖,其係顯示本發明實施例之改良式不可逆編碼 的步驟流程圖。 首先,根據使用者輸入的帳號(ID )和密碼(p w )),利用 信息摘要演算法第5版本(Message Digest version 5,MD5 )分 別計算出兩個對應值A與B ( A = MD5 ( ID )、B = MD5 ( PW )) (步驟 S21 與 S22 )。 例如,A = e802b92bbcecfl9967a7ddba2a926c41 (共 32 位元 > ,β _ 7ac66c0fl48de9519b8bd264312c4d64 (共 32 位元)。接 丧卜釆’將 A與B相加’故可得到 C值(步驟 S23 ) 52c8Ixxxxxxxxxxxxxxxxxxxxxxea9a5 (另等各位數相力σ 位予以計算)。然後,將Α值取倒數(Rev (不將進 14c629a2abdd7a76991fcecbb29b208e),然後與 b # 4 ^ ^ 、 值相加(步驟 524 ),故可得 D 二 Rev ( A 、 J ^ b ^ 8e8xxxxxxxxxxxxxxxxxxxxxxxxxxde2 ° 然後,蔣 τλ /丄 將D值右移3位 後的值與原來的D值相加,故可得到E值(E二; + Shlft (D) =8e846d690965486c500cd9c8e5a59858de2 (共 a _ ) 位 tl))(步 525 )。最後’將C值的後五碼(ea9a5 )依序插入到丘值中’ 驟S26),所得即為X值。例如,將C值的後五瑪分 、 值的第1、2、19、37與39位。 ^ 0730-A21143TWF(N2);alexchen 1271082 扩、二下t广明藉由手機簡訊控制使用者帳號之鎖定狀態的實 L私。利用全球行動通訊系統⑽姻System for M〇bil H:=tl〇n,GSM)本身的安全性,以簡訊發話端做認證, 並H 操作親,即可控制制者帳號的鎖定狀態。 號之鎖定«时㈣程w j之湘錢簡訊㈣使用者帳 在,行簡訊發送操作前,使用者縣經由—電腦裝置登錄 端二=㈤服端’且將加密後的使用者資料傳送到該伺服 :。者’使用者利用手機編寫包含控制代碼之簡訊(步驟 S31 ),其中控制代碼包括「一 .. 遊戲代碼」、「遊戲帳號」以及 从也, _'一 · w」…逛鉞恨5[」以及1操 m冊」著使用者利用手機將包含控制代碼的簡訊傳送至上 預(步驟S32)i後該伺服端判斷使用者的手機號碼與 之手機號碼是否相同(步驟阳)。若不同,則該伺服 錯誤訊息給使用者(步驟s36)。若相同,則該饲服 代碼中包含之「遊戲代碼」、「遊戲帳號」以及 回傳-錯誤訊息給使:=6。)…則該伺服端會 媸「p h 1 v驟S36)。右正確,則該伺服端根 呆彳碼」執订對應之鎖定操作(步驟S35),如帳號上鎖 或帳號解鎖操作。 、 上述實施流程’本發明實施例之資料敎方法利用電 硬體序號當作『機器碼』,並轉以提供遊戲帳號『上 ^鎖』肖『停雜號』的安全服務。此外,亦可透過 機簡訊方式執行上述功能。 遊戲帳號包括下列三種鎖定狀態,分別是『上鎖 U〇Cked)、『停用帳號』(St0P)與『解鎖』(Unlocked)。『上鎖』 、不僅能從敎的電腦裝置登人遊戲,『解鎖』表示可利用任何』 exchen 〇730-A21143TWF(N2);al ⑧ 1271082 =边置登人遊戲’而『停用帳號』表 不能登入遊戲。夂去铱1m ⑺仕何電恥裝置都 今『上鎖』、『解二二圖’利用任何電腦裝置可執行『解鎖』 .4〇 解鎖』今停用帳號』以及『上鎖』+『铲用綠咕 而::手定的電腦裝置可執行『上鎖』『解鎖:之操:。』 ^鎖』=執行『停用帳號…上鎖』與『停用帳號』 實做來第I::1:-4:所述之流程,以下說明各項操作的 的步驟流程圖。 本發明實施例之資料登錄與鎖定操作 選取『Α伴她时、 而先於5亥應用程式顯示的操作介面中 k取登錄機器碼』選項(步驟々n 的遊戲(步驟⑽),並且m然後選擇欲登錄機器碼 , )*伺服端接收到該登錄要求時,即執行—切%/#v ( ,; s::) 二=腦裝置的硬體序號(例如,網路卡的Μ = 帳號的機器瑪(步驟㈣),否則顯示一錯誤 鎖解完销成:器田碼姐登錄操作後,使用者即可執行刪除機器碼、上 鎖解鎖與停用帳號等操作(步驟以3〜料5)。 使用者可在該應用程式顯+ 碼』選項(步驟S43),介面中選取『刪除機器 S4,n , . …後、擇欲刪除機器碼的遊戲(步驟 S431),並且輸入遊戲帳號、密碼後送出要求(步驟觀)’告 舰端接❹m騎要㈣,㈣行—認證操作 輸入的遊戲帳號、密碼是否正確,以去 裝置的機器碼是否和該帳號所登 =入之電腦 项的铖夯碼相符(步驟S433 )。 0730-A21143TWF(N2);alexchen 1271082 ,:該伺,端即清除該帳號所登錄的機器碼,且若使用 不符或該機器碼尚夫J 豆錄機器碼』操作。若 ° 且、彔,則顯示一錯誤訊息(步驟S43 5 ) 〇 用者可在該應用程式顯示的操作 項(步驟S44),妒你、辟挪 r 上鎖』選 入遊戲^ — 上鎖的軸(步驟S441),並且輸 收到要求(步驟s442)。她刚服端接 ;: 即執行一認證操作以判斷使用者輸入的遊 :(v驟正確(步驟S443)。若錯誤,則顯示-錯誤訊 若正確,則接著判斷使用者用以登入之電腦裝 二驟=已登錄(,驟科若是,則將該遊戲帳號鎖 〜故僅允料過所登錄機器碼的電腦裝置登人遊 驟S446)。 «示—錯誤訊息(步 另外’使用者可在該應用程式顯示的操作介面中選取『停 用帳號』選項(步驟S44 ),鈇德撰搂%尸 S44n “认 L、、、後選擇欲停用帳號的遊戲(步驟 们服” 戲帳號、密碼後送出要求(步驟⑽)。當 接收到該停用帳號要求時,即執行—認證操作以判斷使 用者輸入的遊戲帳號、密碼是否正確(步驟s443)。若錯誤,則 ::一息(步:S’。若正確,則接著判斷使用者用以 Ϊ用:遊的機器碼是否已登錄(步驟S444)。若是,則將 戲步驟湘),故利用任何電腦裝置都無法使用 =帳=入遊戲,且僅可使用手機簡訊解除『停用帳號』的狀 『解销月nr #用帳5虎』+『上鎖』與『停用帳號』— 作)。若該電腦裝置的機器碼尚未登錄,則顯示一 錯誤訊息(步驟S446)。 使用者可在該應用程式顯示的操作介面中選取『解鎖』選 〇730-A2n43TWF(N2);alexchei 12 1271082 後選擇欲解鎖的遊戲(步驟則),並且輸 :要:、,:== 號、密碼是否正確(步驟S453 )。若錯輸入的士遊自戲帳 驟S456)。若正確,則接著判斷使用者用以登二^孔置= ==號所登錄的機_符(步驟== 則了將该遊戲帳號解除鎖定,故 驟叫若不符,則顯示一錯誤訊息?步=^(Step B 1271082 The "screen keypad" allows the user to avoid the malicious program when entering the account and password on the front end. Next, perform an "improved irreversible coding" operation on the account and password entered by the user. Encryption (step S14), and then using the Secure Socket Layer (Secure Socket Layer, hereinafter referred to as SSL) to transmit the encrypted user data to the server (step S15), so that the user can execute various items. Data Locking Operation Next, the implementation flow of the "improved irreversible coding" in the step S14 will be described. Referring to Fig. 2, it is a flow chart showing the steps of the improved irreversible coding in the embodiment of the present invention. Account number (ID) and password (pw), using the message digest version 5 (MD5) to calculate two corresponding values A and B (A = MD5 (ID), B = MD5 (PW) )) (Steps S21 and S22). For example, A = e802b92bbcecfl9967a7ddba2a926c41 (32 bits total), β _ 7ac66c0fl48de9519b8bd264312c4d64 (32 bits total). After receiving the 丧 釆 'Add A and B', you can get the C value (step S23) 52c8Ixxxxxxxxxxxxxxxxxxxxxxea9a5 (others The phase force σ bit is calculated.) Then, the Α value is reciprocal (Rev (will not enter 14c629a2abdd7a76991fcecbb29b208e), and then added with b # 4 ^ ^, value (step 524), so D two Rev (A, J) ^ b ^ 8e8xxxxxxxxxxxxxxxxxxxxxxxxxxde2 ° Then, Jiang τλ /丄 adds the value of D to the right by 3 bits and adds it to the original D value, so you can get the E value (E 2; + Shlft (D) = 8e846d690965486c500cd9c8e5a59858de2 (total a _ ) Bit tl)) (step 525). Finally, 'the last five codes of the C value (ea9a5) are sequentially inserted into the mound value' (S26), and the result is the X value. For example, the last five cents of the C value, Values 1, 2, 19, 37, and 39. ^ 0730-A21143TWF(N2);alexchen 1271082 Expanded, two under t Guangming uses mobile phone newsletter to control the locked state of user accounts. Communication system (10) marriage System for M bil H: = tl〇n, security GSM) itself, in order to make the originating text message authentication, and pro-H operation, the control system's account to a locked state. The lock of the number «time (four) process wj of the Hunan money newsletter (four) user account, before the line message transmission operation, the user county via the computer device login end two = (five) service end 'and the encrypted user data is transferred to the Servo:. The user uses the mobile phone to write a newsletter containing the control code (step S31), wherein the control code includes "one.. game code", "game account number", and from, _'一·w"... 钺 55 [" And the user can use the mobile phone to transmit the short message containing the control code to the upper pre-step (step S32) i, and the server determines whether the mobile phone number of the user is the same as the mobile phone number (step yang). If it is different, the servo error message is given to the user (step s36). If they are the same, the "game code", "game account number" and return-error message included in the feed code are: =6. )... The server will 媸 "p h 1 v S S36). If the right is correct, the server will perform the corresponding locking operation (step S35), such as account lock or account unlock operation. The above-mentioned implementation flow 'the data method of the embodiment of the present invention uses the serial number of the electrical hardware as the "machine code", and turns to provide the security service of the game account "upper lock" Xiao "stop miscellaneous number". In addition, the above functions can also be performed through the SMS. The game account includes the following three lock statuses: “Lock U〇Cked”, “Disable Account” (St0P) and “Unlocked”. "Locked", not only can you play the game from your computer device, "Unlock" means you can use any "exchen 〇730-A21143TWF(N2); al 8 1271082 = edge-to-board game" and "deactivate account" table Cannot log in to the game.夂 铱 m 1m (7) Shihe shame device is now "locked", "solution two two maps" can use any computer device to perform "unlock". 4 〇 unlock "now disable account" and "locked" + "shovel With green 咕:: The computer device that is fixed can be "locked" "Unlock: Exercise:. 』^Lock』=Execute "Disable Account...Lock" and "Disable Account" To do the process described in I::1:-4:, the following is a flow chart showing the steps of each operation. In the data registration and locking operation of the embodiment of the present invention, the option "take the login machine code in the operation interface displayed before the application of the 5 Hai application" is selected (the game of step 々n (step (10)), and m then Select the machine code to be logged in, ) * When the server receives the login request, it will execute - cut %/#v ( ,; s::) 2 = the hardware serial number of the brain device (for example, the network card Μ = account number Machine Ma (step (4)), otherwise it shows an error lock solution completed: After the device is registered, the user can perform operations such as deleting the machine code, unlocking and unlocking the account (steps to 3) 5) The user can select "Delete the machine S4, n, . . . , select the game to delete the machine code (step S431), and enter the game account in the application display code option (step S43). After the password is sent out (step view) 'The ship terminal is connected to the 骑m ride (4), (4) line - the game account and password entered by the authentication operation are correct, to determine whether the machine code of the device and the computer account that the account is registered The weights match (step S433). 073 0-A21143TWF(N2);alexchen 1271082,: The server will clear the machine code registered by the account, and if it uses the discrepancies or the machine code, the machine code is operated. If ° and 彔, the display An error message (step S43 5) The user can select the operation item displayed in the application (step S44), select the lock of the game, select the axis of the game (step S441), and input Receiving the request (step s442). She just served the termination;: Performing an authentication operation to determine the user-entered tour: (v is correct (step S443). If the error is displayed, the error message is correct, then Judging that the user is using the computer to log in 2 = registered (if the case is closed, the game account is locked ~ so only the computer device of the registered machine code is allowed to board the tour S446). «示——Error The message (step other 'users can select the "deactivate account" option in the operation interface displayed by the application (step S44), and the singer writes % corpse S44n "recognize L,, and then select the game to be deactivated. (Steps to serve) Screen account, password and send out (Step (10)). When the request for the deactivated account is received, the authentication-authentication operation is performed to determine whether the game account number and password input by the user are correct (step s443). If the error is made, the following: (: S'. If it is correct, then it is determined whether the user uses the code: whether the machine code of the swim has been registered (step S444). If so, the game step is used, so that the computer cannot be used by any computer device, and only You can use the mobile phone newsletter to release the "Deactivate Account" status "Uninstallation month nr #用帐5虎" + "Lock" and "Disable account" - if the machine code of the computer device is not registered, display An error message (step S446). The user can select "Unlock" option 730-A2n43TWF (N2) in the operation interface displayed by the application; select the game to be unlocked after alexchei 12 1271082 (step), and input: to:,,:== Is the password correct (step S453). If you enter the wrong taxi tour, you will be charged to S456). If it is correct, then it is determined that the user has used the machine _ symbol registered by the second hole === (step == then the game account is unlocked, so if the call does not match, an error message is displayed? Step = ^

系統顯示本發明實施例之利用機器躲行資料鎖定的 4 施例之資料敎純包括—客戶端_與·^服 m垃藉由一通信網路(例如,區域網路或網際網路) 到祠二;客戶端100利用一電腦裝置開啟-應用程式以登入 (例如4 00’然後根據一使用者操作將該電腦裝置的機器碼 料(即㈣小難』取得使用者資 ==與密碼並且根據-使用者操作對該帳號與 二订?良式不可逆編碼』操作(其實施流程如第2圖 行加密。然後根據一使用者操作利用ssl加密技術 击口使用者資料經由通信網路150傳送至飼服端細,令 本發明實施例之資料鎖定系統更包括一行動裝置(例如, (Personal Digital Assistant, PDA)) ’其藉由—GSM網路350麵接至飼服端200。行動裝置3〇〇 祀據使用者操作取知包含控制代碼之簡訊,其中該控制代碼 0730-A21143TWF(N2);alexchi 13 1271082 包括「遊戲代碼」、「遊戲帳號」以及「操作代碼」,然後經由 GSM網路350將包含控制代碼的簡訊傳送至伺服端200。伺服 • 端200取得該簡訊後,判斷註冊於行動裝置300的號碼與預先 , 登記之號碼是否相同,若相同則接著判斷該控制代碼中包含之 「遊戲代碼」、「遊戲帳號」以及「操作代碼」是否正確。若正 確,則伺服端200根據「操作代碼」執行對應帳號上鎖或帳號 解鎖操作。 本發明實施例之利用機器碼執行資料鎖定的方法與系統透 過限制機器碼登入的方式,加上利用手機簡訊對帳號進行上鎖 痛· 或解鎖,讓使用者可指定其遊戲帳號只能從某一已登錄的電腦 裝置登入遊戲,以提供更安全、更有保障的遊戲環境。此外, 利用手機發送簡訊以對遊戲帳號進行上鎖或解鎖操作的方式, 可省去額外的硬體成本。 本發明方法亦可使用於一般軟體保護以有效杜絕盜版。 雖然本發明已以較佳實施例揭露如上,然其並非用以限定 本發明,任何熟習此技藝者,在不脫離本發明之精神和範圍内, 當可作各種之更動與潤飾,因此本發明之保護範圍當視後附之 ^ 申請專利範圍所界定者為準。 0730-A21143TWF(N2);alexchen ⑧ 1271082 【圖式簡單說明】 第1圖係顯示本發明實施例之利用機器碼執行資料鎖定的 方法步驟流程圖。 第2圖係顯示本發明實施例之改良式不可逆編碼的步驟流 程圖。 第3圖係顯示本發明實施例之利用手機簡訊控制使用者帳 號之鎖定狀態的步驟流程圖。The system displays the data of the four embodiments of the embodiment of the present invention that utilizes the machine to hide data. The data includes: the client _ and the _ server are used by a communication network (for example, a regional network or an Internet). Second, the client 100 uses a computer device to open the application to log in (for example, 4 00' and then obtain the user code == and password according to the user's operation of the computer device's machine code (ie (4) small difficulty). According to the -user operation, the account and the two subscriptions are irreversible coded operations (the implementation process is encrypted as shown in FIG. 2), and then the user data is transmitted via the communication network 150 using the ssl encryption technology according to a user operation. The data locking system of the embodiment of the present invention further includes a mobile device (for example, (Personal Digital Assistant, PDA)), which is connected to the feeding end 200 by the GSM network 350. 3, according to the user operation to know the newsletter containing the control code, wherein the control code 0730-A21143TWF (N2); alexchi 13 1271082 includes "game code", "game account" and "operation code Then, the short message including the control code is transmitted to the server 200 via the GSM network 350. After the server 200 obtains the message, it is determined whether the number registered in the mobile device 300 is the same as the number registered in advance, and if it is the same, then it is determined. Whether the "game code", the "game account", and the "operation code" included in the control code are correct. If correct, the server 200 performs the corresponding account lock or account unlock operation according to the "operation code". The method of using the machine code to perform data locking and the system to restrict the login of the machine code, and the use of the mobile phone newsletter to lock the account or unlock the account, so that the user can specify that the game account can only be from a certain registered computer. The device is logged into the game to provide a safer and more secure game environment. In addition, the use of a mobile phone to send a message to lock or unlock the game account can save additional hardware costs. General software protection to effectively eliminate piracy. Although the invention has been disclosed in the preferred embodiments, However, it is not intended to limit the invention, and any person skilled in the art can make various modifications and retouchings without departing from the spirit and scope of the invention. Therefore, the scope of protection of the present invention is attached to the patent application. The scope is defined as follows: 0730-A21143TWF (N2); alexchen 8 1271082 [Simplified description of the drawings] Fig. 1 is a flow chart showing the steps of the method for performing data locking using machine code according to an embodiment of the present invention. A flow chart of the steps of the improved irreversible coding in the embodiment of the present invention. FIG. 3 is a flow chart showing the steps of controlling the locked state of the user account by using the mobile phone short message in the embodiment of the present invention.

第4圖係顯示本發明實施例之帳號鎖定狀態改變的示意圖。 第5圖係顯示本發明實施例之資料登錄與鎖定操作的步驟 流程圖。 第6圖係顯示本發明實施例之利用機器碼執行資料鎖定的 系統架構圖。 【主要元件符號說明】 100〜客戶端 150〜通信網路 200〜伺服端 300〜行動裝置 350〜GSM網路 0730-A21143TWF(N2);alexchen 15 ⑧Figure 4 is a diagram showing the change of the account lock status of the embodiment of the present invention. Figure 5 is a flow chart showing the steps of the data registration and locking operation of the embodiment of the present invention. Figure 6 is a diagram showing the system architecture for performing data locking using machine code in the embodiment of the present invention. [Main component symbol description] 100~Client 150~Communication network 200~Servo 300~Mobile device 350~GSM network 0730-A21143TWF(N2);alexchen 15 8

Claims (1)

1271082 十、申睛專利範圍: 種&用機ϋ碼執行資料鎖定 利用一第—電腦震置執行—第一去匕括下列步驟: 藉由該第—庫…=*應、用程式; 褒置的機器碼登錄到二;服端生之-操作介面,將該第-電腦 碼·在該操作介面中輸入-第L使用者帳號與一第一使用者密 下列步驟:使用者帳5虎與第一密碼執行—加密操作,其包括 利用一加密演算法將該第一 碼分別議使用者後 運算與該第二加密碼執行-數學運算、-邏輯 异^上述兩種運鼻之結合;以及 將加密後的第-使用者帳號與 服端,並且據以執行-資料鎖定操作。錄至_ 的方i如Γ!專?ί圍,1項所述的利用機器碼執行資料鎖定 列步驟:〃,❹料鎖㈣作為—刪除機器碼操作,包括下 二應用程式以選擇一刪除機 利用一第二電腦裝置執行一第 器碼的操作介面; 要求; 輸入-第二使用者帳號與—第二使用者密碼後送出一上鎖 ,據該上鎖要求執行—認證操作以骑該第二使用者帳號 =第^用者密碼是否與該第—使用者帳號與該第—使用者 铪碼相符; 若該第二使用者帳號與該第二使用者密碼與該第一使用者 〇730-A21143TWF(N2);alexchen ⑧ 16 1271082 帳戒與該第—使用者密碼相符 碼是否與該第—使用亥弟二電腦裝置的機器 #乐使用者帳搞登錄的機 右兩機器碼相符,則自該伺 付,以及 登錄的機器碼。 】除5亥苐—使用者帳號所 3.如申請專利範圍第j項所述 的方法,其中,用機态碼執行資料鎖定 列步驟·· 鎖次#用操作,包括下 利用一第二電 停用的操作介面; 執行-第二應用程式以選擇 上鎖或 輸入一第二使用者帳號與一第 要求; 使用者费碼後送出一上鎖 根據該上鎖或停用要求執行一認證操 者帳號與該第二使用者密碼是否與 =第一使用 使用者密碼相符; 第使用者帳號與該第一 若該第二使用者帳號與該第二使用者㈣與該第—使 帳就與該第-❹者密碼相符,則判斷該第二電腦裝 碼是否已登錄於該伺服端;以及 义、機器 若該第二電腦裝置的機器碼已登錄於該词服端 一使用者帳號呈上鎖或停用狀態。 7 Μ 4. 如申請專利範圍第3項所述的利用機器碼執行資料 的方法,#中,當該第-使用者帳號呈上鎖狀態,則僅 = 該第一電腦裝置執行該第一應用程式。 9田 5. 如申請專利範圍第3項所述的利用機器碼執行資料鎖〜 的方法,其中,當該第一使用者帳號呈停用狀態,則無法 任何電腦裝置執行該第一應用程式。 错 6·如申請專利範圍第1項所述的利用機器碼執行資料鎖 0730-Α21143TWF(N2);alexchen 17 1271082 的方:用其中」該資料鎖定操作為-解鎖操作,包括下列牛驟. 操作:面弟二電腦裝置執行一第二應用程式以選擇-解〜驟的 要求輸入-第二使用者帳號與一第二使用者密碼後送出—解鎖 根據該解鎖要求執行_認證操相判斷 ,、該第二使用者密碼是 ^ 一用者帳號 密碼相符; &否^第使用者帳號與該第-使用者 帳號者帳號與該第二使用者密碼與該第-使用者 碼是二二 使用者帳唬所登錄的機器碼相符·以 若兩機器碼相符,則令該第一使用者帳號呈解鎖狀離 的方法,其;專斤述的利用機器碼執行資料鎖定 -電腦裝置執行;帳號呈解鎖狀態,一^^ 址或者_ 〇處理H裝置的機11碼為―網路卡之MAC位 〒夹處理為或其它硬體裝置的唯一序號。 的方:如所述的利用機器嫣執行資料鎖定 -使用者帳號與該第」二面:產生之-輸入介面輪入該第 的方Γ,如專利範圍第1項所述的利用機器碼執行資料鎖定 ,、中,利用一 sslj加密協定將該加密後的第蚀 帳號與第-使用者密碼傳送至該伺服端。4的第-使用者 種^機H碼執行資料敎的方法,包 利用-電腦裝置開啟-應用程式; 少驟. 0730-A21 l43TWF(N2);alexchen ⑧ 18 1271082 藉由該應用程式所產生夕_ 器碼登錄到-伺服端; $ 面’將該電《置的機 =作介面中輸入—第—使用者帳號與密碼; 對该第-使用者帳號與密碼執行—加密摔作. ::;密後:第一使用者帳號與密碼登錄至該飼服端; 利用一行動裝置建立一包 尺 等控制代碼包括-軟體代碼、—第二^ ^簡訊’其中該 碼; 者帳遽以及一操作代 將該簡訊傳送至該伺服端;以及 對该軟體代碼、該第二使用者 證,並^駿通職執行龍·作;作進行認 =如中請專利範圍第u項所述的利用機器碼執 =法’其中,該認證操作係判斷該軟 、使 及該操作代碼是否與預設於該飼服端中的軟用 以苐-使用者帳號以及操作代碼符合。 -戈馬 13.如申請專利範圍帛12 定的方:其I在執行該認心 、先登躲該舰端的電話㈣ 定的方法公中專利 八丁田β弟一使用者帳號呈停用壯萨0士 該對應該操作代碼之操作可令該第 ,則執行 狀態。 用者帳唬呈上鎖或解鎖 定的方專利乾圍第11項所述的利用機器碼執行資料鎖 疋的方法,其中,該電腦裝置的機 ’矾仃貝枓鎖 或者一中央處理器或其它硬體裝置的唯—序^路卡之MAC位址 16.如申請專利範圍第5項所述的利用^石馬執行資料鎖定 〇730-A21143TWF(N2);alexchen 19 1271082 、 一中,利用該操作介面所產生之一輸入介面輸入該第 一使用者帳號與密碼。 、17·如巾4專利範圍第5項所述的利賴器碼執行資料鎖定 的方夬”中,利用一 SSL加密協定將該加密後的第一使用者 帳號與密碼傳送至該伺服端。 18· 一種利用機器碼執行資料鎖定的系統,包括: 一電腦裝置; 一伺服端;以及 用端’其利㈣電腦裝置登人職伺服端,根據一使 =1將該電腦裝置的機器碼傳送到該伺服端以進行登錄, 二電::ί:ν-應用程式,_ 健诚ΐ 將該第一電腦裝置的機器碼登錄到該 在該操作介面中輸入—第—使用者帳號與_第_使用 =對5亥第—使用者帳號與第一密碼執行一加密操作,將 並=的Γ使用者帳號與第一使用者密碼登錄至該飼服端, 並且據以執行一資料鎖定操作。 定的㈣18韻述㈣關11碼執行資料鎖 密操作包括該客戶端利用-加密演算法 =第-使用者帳號與該第一使用者 = :碼:-第二加密碼,並且對該第-加密碼與該第加= 订一數學運算、—邏輯運算或上述兩種運算之結合在碼執 20·如申睛專利範圍第18項 定的系統,其中,該資㈣㈣用械杰碼執行資料鎖 接兮分^ 、科鎖疋刼作為一刪除機器碼操作,苴句 “客戶端利用一第二電腦裝置執 - 者密碼後送出一上鎖要求予該伺 …〃第-使用 门服鳊,该伺服端根據該上鎖要 〇730-A21143TWF(N2);a!exchen 20 1271082 求執行一認證操作以判 :是否與該第-使用者帳號;二用者帳號:該第二使用者密 付,則判斷該第二電腦裝置的使用者密碼相符,若相 所登錄的機器碼相符,若相从為碼疋否與該第一使用者帳號 錄的機器碼。 付則刪除该第一使用者帳號所登 ^ ^ ^ ^ ^ ^ ^^ ^ ^ ^ # t # ^ 括該客戶端利用一第二電觸;=為:ί鎖或停用操作,其包 上鎖或停用的操作介面,輸乂仃弟一應用程式以選擇一 者密碼後送出一上#座本名第一使用者帳號與一第二使用 停用要求執行^予該伺服端,該伺服端根據該上鎖或 用者密碼是否與該第一使用者詩㈣制者帳遽與该第二使 :相:則判斷該第二電腦裝置的機器碼是否已登錚二二 錄,則令該第一使用者帳號呈上鎖或停用狀態。右已登 =如巾請專利範圍第21項所料洲機器碼 疋的糸統,其中,♦兮笛 ^ . 貞科鎖 戚僅V丄 用者帳號呈上鎖狀態,則該客戶 ㈣可猎由該第-電腦裝置執行該第—應用程式。j/客戶 认如中請專利範圍第21項所述的利用機器碼執行 =糸統’其巾’當該第—使用者㈣呈停用狀態,則該客 鈿無法藉由任何電腦裝置執行該第一應用程式。 "戶 定的rrmf23項料的彻_魏行資料鎖 疋的糸、、先,其更包括一行動裝置’耦接於該伺服端 j 利用該行動裝置建立-包含複數控制代媽之簡訊,^ = 制代碼包括一軟體代碼、一第二使用者帳號以及::控 將該簡訊傳送至該伺服端,該伺服判斷對應該行動 石二 號碼與預先登錄的電話號碼是否相同’若相同,則_該:5 0730-A21143TWF(N2);alexchen 21 1271082 第二使用者帳號以及該操作代碼是否與預設的 # 使用者帳號以及操作代碼符合,且若符合則令兮第 -使用者帳號自停用狀態改變為上鎖或解鎖狀態。“該第 —25.如中請專利範㈣18項所述的利用機㈣執 =的糸統,其中’該資料鎖定操作為一解鎖操 括 戶端利用-第二電腦裝置執行一第二應用程式摆=該客 刼作介面,輸入-第二使用者帳號與一第二使用者密鎖的 -解鎖要求予該舰端,該飼服端根據該解鎖要求判斷^ = 使用者帳號與該第二使用者密碼是否與該第_使用^ ::使用者密碼相符’若相符’則判斷該第二電腦裝置:機= &疋否與該第一使用者帳號所登錄的機器碼相符,若相符則 令該第-使用者帳號呈解鎖狀態。 右相付,則 定的^專利^圍第25項所述的利用機器碼執行資料鎖 山、二、,、/、中,當该第一使用者帳號呈解鎖狀態,則該客戶 鈿可藉由任一電腦裝置執行該第一應用程式。 定的專利範圍第18項所㈣利㈣器碼執行資料鎖 糸、充,其中,該第一電腦裝置的機器碼為一網路卡之mac 位址或者—中央處理器或其它硬體裝置的唯—序號。 认如巾請專利範圍第18項所述的利用機器碼執行資料鎖 二::本其中’利用該操作介面所產生之-輸入介面輸入該 第一使用者帳號與該第一使用者密碼。 —/ ’士申叫專利範圍第18項所述的利用機器碼執行資料鎖 其中’利用—ssl加密協定將該加密後的第-使用 χ ^與第—使肖L馬傳送至該伺服端。 0730-A21143TWF(N2);alexchen 221271082 X. Applicable scope of the patent: The species & use the machine weight to perform data locking and use the first - computer to perform the execution - the first step is to include the following steps: By the first library - = * should, use the program; The machine code is registered to the second; the service end-operation interface, the first computer code is input in the operation interface - the L-th user account is locked with a first user. The following steps: user account 5 tiger Executing with the first password-encryption operation, comprising: combining the first code with the second encryption code execution-mathematic operation, and the logical combination of the two types of operations by using an encryption algorithm; And the encrypted first-user account and the server, and the data-locking operation is performed accordingly. Recorded to _ party i like this! Special?围, the use of machine code to perform data lock column steps as described in one: 〃, ❹ lock (4) as - delete machine code operation, including the next two applications to select a delete machine to use a second computer device to execute a device Code operation interface; request; input - second user account and - second user password and then send a lock, according to the lock request - authentication operation to ride the second user account = ^ user password Whether the first user account and the first user password match; if the second user account and the second user password and the first user 〇730-A21143TWF(N2); alexchen 8 16 1271082 Whether the account number and the first-user password match the code of the right machine code of the machine that uses the machine number of the user's account of the second computer device, the machine code from the server and the registered machine code . 】 In addition to 5 苐 苐 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者 使用者The disabled operation interface; the execution-second application to select to lock or input a second user account and a first request; the user fee code to send a lock according to the lock or disable request to perform an authentication operation Whether the user account and the second user password match the = first user password; the user account and the first if the second user account and the second user (4) and the first account are If the password of the first user matches, it is determined whether the second computer code is registered on the server; and if the machine code of the second computer device is registered in the user account, the user account is uploaded. Lock or deactivated state. 7 Μ 4. If the method for executing data by machine code is described in claim 3, in #, when the first user account is locked, only the first computer device executes the first application. Program. 9 Field 5. The method for executing a data lock using a machine code as described in claim 3, wherein when the first user account is in a disabled state, the computer application cannot execute the first application. False 6 · As described in the scope of claim 1, the use of machine code to execute data lock 0730-Α21143TWF (N2); alexchen 17 1271082 side: use the "data lock operation" - unlock operation, including the following cattle. Operation : the second brother computer device executes a second application to select-resolve the request input - the second user account and a second user password are sent out - the unlocking is performed according to the unlocking request, the authentication operation judgment is performed, The second user password is a user account password; & No ^ the user account and the first user account and the second user password and the first user code are used two or two The machine code registered by the account is matched. If the two machine codes match, the first user account is unlocked, and the computer code is used to perform data locking-computer device execution; In the unlocked state, the machine 11 code of the H device or the _ 〇 processing H device is the unique serial number of the MAC card of the network card or other hardware devices. The party: as described in the use of the machine 嫣 perform data lock - user account and the second side: the generated - input interface wheeled into the first square, as described in the patent scope of the first use of the machine code The data is locked, and the encrypted eclipse account and the first-user password are transmitted to the server by using an sslj encryption protocol. 4 of the first user-type machine H code to perform data 敎 method, package utilization - computer device open - application; less. 0730-A21 l43TWF (N2); alexchen 8 18 1271082 by the application _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ After the secret: the first user account and password are logged into the feeding service; using a mobile device to establish a control code such as a package rule, including - software code, - second ^ ^ newsletter, where the code; The operation generation transmits the short message to the server; and the software code, the second user certificate, and the execution of the dragon; and the use of the software; The machine code is in accordance with the method 'where the authentication operation determines whether the soft, the operation code matches the soft user-user account and the operation code preset in the feeding end. - Goma 13. If the patent application scope is 帛12, the party that is in the process of applying for the confession, first boarding the phone at the end of the ship (4), the method of the public patent, the eight-Ding Tian, a user account is suspended. 0 The operation of the code should be the same as the operation of the code. The user's account is locked or unlocked, and the method for performing data lock using the machine code described in Item 11 of the computer device is as follows: the computer device has a machine's mussel lock or a central processing unit or The MAC address of the other-order hardware card of the other hardware device is 16. The use of the stone horse to perform data locking as described in item 5 of the patent application scope 〇730-A21143TWF (N2); alexchen 19 1271082, one, use The input interface generated by the operation interface inputs the first user account and password. 17. In the method for performing data locking according to item 5 of the scope of the invention of the towel 4, the encrypted first user account and password are transmitted to the server by using an SSL encryption protocol. 18. A system for performing data locking using a machine code, comprising: a computer device; a server; and a server device for the user's (4) computer device, and transmitting the machine code of the computer device according to a Go to the server to log in, the second power:: ί: ν - application, _ Jian Cheng 登录 Log the machine code of the first computer device to the input in the operation interface - the first user account and _ _ use = pair 5 hai - user account and the first password to perform an encryption operation, the Γ user account and the first user password are logged to the feeding end, and accordingly a data locking operation is performed. The fixed (four) 18 rhyme (four) off 11 code execution data lock operation includes the client use - encryption algorithm = first - user account and the first user =: code: - second plus password, and the first - Add the password and the first plus = set a number The operation, the logical operation or the combination of the above two operations is in the system of the code 20, such as the scope of the application of the scope of the patent, in which the capital (4) (four) uses the instrument code to perform data locks, and the key locks. As a method of deleting the machine code, the haiku "the client uses a second computer device to execute the password, and then sends a lock request to the server..." - using the door service, the server is based on the lock 730 -A21143TWF(N2);a!exchen 20 1271082 seeking to perform an authentication operation to determine whether or not the first user account is used; the second user account: the second user pays in secret to determine the use of the second computer device The passwords match, if the machine code registered is the same, if the code is the same as the machine code recorded with the first user account. Pay to delete the first user account ^ ^ ^ ^ ^ ^ ^^ ^ ^ ^ # t # ^ The client uses a second electrical touch; = is: ί lock or disable operation, its package is locked Or the disabled operation interface, the application of the application is selected to select a password, and then the first user account and the second use deactivation request are executed to the server, and the server is Whether the lock or user password is associated with the first user's poem (four) and the second:: determining whether the machine code of the second computer device has been registered or not, A user account is locked or disabled. Right has been _======================================================================================================= The first application is executed by the first computer device. j/Customer recognizes that the use of machine code as described in item 21 of the patent scope = "the towel" is disabled. When the user- (4) is inactive, the customer cannot perform the operation by any computer device. The first application. "Customized rrmf23 item material _ wei line data lock 糸, first, it also includes a mobile device 'coupled to the server j to use the mobile device to establish - contains a complex control of the mother's newsletter, ^ = The code includes a software code, a second user account, and:: the control transmits the short message to the server, and the servo determines whether the action stone number is the same as the pre-registered phone number. _: 5 0730-A21143TWF (N2); alexchen 21 1271082 The second user account and the operation code are consistent with the preset # user account and operation code, and if it is met, the first user account is suspended. Change state to locked or unlocked state. "This No. -25. For the use of the machine (4) in accordance with Item 18 of the Patent Model (4), where the data locking operation is an unlocking operation and the second computer device executes a second application. Pendulum = the customer interface, input - the second user account and a second user lock - unlock request to the ship, the feeding end judges according to the unlocking request ^ = user account and the second Whether the user password matches the first _user^:user password 'if it matches', then the second computer device is determined: machine=& 疋 does not match the machine code registered by the first user account, if it matches Then, the first-user account is unlocked. If the right-hand pays, the first user is executed by using the machine code to execute the data lock mountain, the second, the, the /, and the first user. If the account is unlocked, the client can execute the first application by any computer device. The patent scope is the 18th item (4), and the fourth (4) device code performs data lock and charge, wherein the first computer device The machine code is the mac address of a network card or - The serial number of the processor or other hardware device. For example, please use the machine code to execute the data lock as described in Item 18 of the patent scope:: The input interface generated by the operation interface is used to input the first The user account and the first user password. —/ 'Shishen called the patent scope to perform the data lock using the machine code as described in item 18 of the patent, which uses the encrypted-ssl encryption protocol to encrypt the first-used χ ^ and - Transfer the Xiao L horse to the servo end. 0730-A21143TWF(N2);alexchen 22
TW94120748A 2005-06-22 2005-06-22 Method and system using machine code to lock data TWI271082B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW94120748A TWI271082B (en) 2005-06-22 2005-06-22 Method and system using machine code to lock data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW94120748A TWI271082B (en) 2005-06-22 2005-06-22 Method and system using machine code to lock data

Publications (2)

Publication Number Publication Date
TW200701733A TW200701733A (en) 2007-01-01
TWI271082B true TWI271082B (en) 2007-01-11

Family

ID=38430358

Family Applications (1)

Application Number Title Priority Date Filing Date
TW94120748A TWI271082B (en) 2005-06-22 2005-06-22 Method and system using machine code to lock data

Country Status (1)

Country Link
TW (1) TWI271082B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI403147B (en) * 2009-03-19 2013-07-21 Digicheese Technology & Interactive Co Ltd System and method for protecting a user data
TWI584151B (en) * 2016-06-02 2017-05-21 樹德科技大學 A flash drive with a safety mechanism and method

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI403146B (en) * 2009-01-21 2013-07-21 Chung Yu Lin Method and system for establishing network crime by telephone number and authorization code and source identification code
TWI497974B (en) * 2013-02-23 2015-08-21 Gamania Digital Entertainment Co Ltd An app launch method that integrates the startup account for a plurality of apps

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI403147B (en) * 2009-03-19 2013-07-21 Digicheese Technology & Interactive Co Ltd System and method for protecting a user data
TWI584151B (en) * 2016-06-02 2017-05-21 樹德科技大學 A flash drive with a safety mechanism and method

Also Published As

Publication number Publication date
TW200701733A (en) 2007-01-01

Similar Documents

Publication Publication Date Title
JP7121810B2 (en) Systems, methods, devices and terminals for secure blockchain transactions and sub-networks
CN102099810B (en) Mobile device assisted secure computer network communications
TWI274500B (en) User authentication system
CN105608577B (en) Method for realizing non-repudiation, payment management server and user terminal thereof
KR101075891B1 (en) Mass storage device with automated credentials loading
EP2634703B1 (en) Removable storage device, and data processing system and method based on the device
RU2560810C2 (en) Method and system for protecting information from unauthorised use (versions thereof)
JP2018530235A (en) Integrated authentication system that authenticates using disposable random numbers
CN101334884A (en) Method and system for enhancing bank transfer safety
TW201108696A (en) Account identification system, method and peripheral device of performing function thereof
TW201608406A (en) Computer network system with the function of one-click for quickly and safely logging in
CN105187382A (en) Multi-factor identity authentication method for preventing library collision attacks
JP2013512495A (en) PIN management method for user trusted device and user trusted device
TW201223225A (en) Method for personal identity authentication utilizing a personal cryptographic device
TWI271082B (en) Method and system using machine code to lock data
CN106453243A (en) Server, terminal and validation method of authorization code of terminal
CN101425901A (en) Control method and device for customer identity verification in processing terminals
EP3793163B1 (en) Control method, information processing apparatus, control program, and information processing system
US20100146605A1 (en) Method and system for providing secure online authentication
CN105072136B (en) A kind of equipment room safety certifying method and system based on virtual drive
JP2006004020A (en) One-time password authentication system and method
JP2004295761A (en) Terminal device and information processor
CN103854177A (en) Safe E-bank implementation method
CN102868705A (en) Device for achieving network login certification by using dynamic passwords and using method of device
Arnosti et al. Secure physical access with NFC-enabled smartphones