1271082 九、發明說明: 【發明所屬之技術領域】 本發明係有關於一種資料鎖定的方法與系統,且特別有關 於一種利用機器碼執行資料鎖定的方法與系統。 【先前技術】 近來線上遊戲帳號盜用情事在各遊戲營運商間廣為擴大, 玩家的虛擬貨幣、虛擬寶物等『有價品』損失惨重,衍生了一 些社會問題與浪費警力資源等。 為了有效解決盜用問題,各遊戲營運商紛紛提出對應的解 決方法。「遊戲橘子」推出採用公開金鑰基礎建設(Public Key Infrastructure,以下簡稱為PKI )與憑證技術的實體晶片卡 「PlaySAFE數位安全卡」,並且結合既有的遊戲帳號與加碼鎖 設計,以「帳號+密碼+ PlaySAFE數位安全卡」的3道安全機 制,以有效捍衛玩家權益。 PKI電子憑證可視為玩家的虛擬身分證,用來辨識使用者 在網路環境中的身分及確保網路資料的正確性,建立網路交易 雙方信賴關係。電子憑證通常由憑證機構或使用者的交易對象 (如銀行)核發,内容包含使用者基本資料(如使用者姓名、 序號、憑證機構名稱等)、憑證有效期限、用以加密訊息的公開 金鑰、用以驗證憑證真實性的憑證機構電子簽章以及其他作為 身分辨識等資訊。 「PlaySAFE數位安全卡」除了在玩家端使用PKI加密技術 外,在資料傳輸過程中也會經過SSL通道加密,而伺服端每次 都會回傳不同的一次性密碼(ONE-TIME PASSWORD)給晶片 卡再次認證,即使加密封包被駭客攔截並重新發出,只要沒有 0730-A21143TWF(N2);alexchen ⑧ 1271082 實體卡在手,照樣無法通過認證進入遊戲。 *此外,其它解決方案更包括利用指紋辨識㈣與金鑰隨身 碟等解決安全性問題,然而,其包括下述缺點。首先,硬體成 本偏高。指紋機、IC晶片卡與金输隨身碟均所費不實。其次, 體裝置不利攜帶行動和保管。若玩家需被迫隨身攜帶各 =各樣时全職裝置,*但攜帶困難,且若㈣遺失更為麻 ,显此:’上述資料加密方式仍非百分百安全。由於科技曰新 二I用上切體裝置進行f料認證與身分辨識的行為仍 …、法避免使用者資料被側錄。 體2二斤二為了解決玩家帳號被盜而造成損失並且克服硬 資料鎖定的方_統發㈣供了—碼執行 【發明内容】 基於上述目的,本發明實施例揭露了 資料敎的方法。制_電 胃執π 庫用裎切“… 應用程式,並藉由該 應用釭式所產生之_#作介面,將該電 -飼服端。在該操作介面中輸人 ^&碼|錄到 碼,然後對該使用者帳號與密碼執行一加密操:與::= 使用者帳號與使用者密碼登錄至該伺服端,並且據二 號與該使用者密碼分別轉換使用者帳 對該第一密碼與該第二密石馬執行一數學運算、^且 述兩種運算之結合。 t輯運异或上 本發明實施例更揭露了一種利用機器碼執行 法。利用一電腦裝置開啟一 、4、貞疋的方 應用私式並藉由該應用程式所產 0730-A21143TWF(N2);alexchen ⑧ 6 1271082 操作介面,將該電腦裝置的機器碼登錄到—舰端。在 介面中輸人-第-使用者帳號與密碼,對該第—使用者 =與密碼執行-加錢作,,然後將加密後的第—使用者帳號 斗:讼碼登錄至該伺服端。彻—行動裝置建立—包含複數控制 代碼之簡訊’其中該等控制代碼包括—軟體代碼、—第二使用 :帳號以及一操作代碼。將該簡訊傳送至該伺服端,並且對該 軟體代碼、該第二❹者帳號以及該操作代碼進行紐,並且 在涊證通過後執行對應該操作代碼之操作。 本發明實施例更揭露了 一種利用機器碼執行資料鎖定的系 統’包括-電腦裝置、一伺服端以及一客戶端。該客戶端利用 «腦裝置登人到該舰端’根據—使用者操作將該電腦裝置 的機器碼傳送到該舰端以進行登錄,利用—第—電腦裝置執 行一第-應用程式,藉由該第-制程式所產生之__操作介 面’將該第-電腦裝置的機器碼登錄到該伺服端,在該操作介 面中輸入—第—使用者帳號與-第-使用者密碼,對該第一使 用者帳號與第-密碼執行__加密操作,將加密後的第—使用者 帳號與第—使用者密碼登錄至該伺服端,並且據以執行一資料 鎖定操作。 、 該系統更包括一行動裝置,耦接於該伺服端,該客戶端利 用該行動裝置建立一包含複數控制代碼之簡訊,其中該等押制 代碼包^軟體代碼、一第二使用者帳號以及一操作二馬;然 後將该簡訊傳送至該伺服端。該伺服判斷對應該行動裝置的電 話號碼與預先登錄的電話號碼是否相同,若相同,則判斷該軟 體代碼、該第二使用者帳號以及該操作代碼是否與預設的^ 代碼、該第一使用者帳號以及操作代碼符合,且若符:則^該 第一使用者帳號自停用狀態改變為上鎖或解鎖狀態。口、7 ^ 0730-Α21143TWF(N2);alexchen 7 Ϊ271082 【實施方式】 為了讓本發明之目的、特徵、127. The invention relates to a method and system for data locking, and more particularly to a method and system for performing data locking using machine code. [Prior Art] Recently, online game account theft has been widely expanded among game operators. Players' virtual currency, virtual treasures and other "valuable goods" have suffered heavy losses, and some social problems and waste of police resources have been derived. In order to effectively solve the problem of misappropriation, various game operators have proposed corresponding solutions. "Game Orange" launched the physical CD card "PlaySAFE Digital Security Card" using Public Key Infrastructure (PKI) and voucher technology, combined with the existing game account and code lock design, with "account number" + Password + PlaySAFE Digital Security Card's 3-way security mechanism to effectively defend player rights. The PKI e-Certificate can be regarded as the player's virtual identity card, which is used to identify the user's identity in the network environment and ensure the correctness of the network data, and establish a trust relationship between the two parties. The electronic voucher is usually issued by the voucher institution or the user's transaction object (such as a bank), and the content includes the user's basic information (such as the user's name, serial number, certificate institution name, etc.), the validity period of the voucher, and the public key used to encrypt the message. The electronic signature of the certificate authority used to verify the authenticity of the voucher and other information such as identity identification. In addition to using PKI encryption technology on the player side, the "PlaySAFE Digital Security Card" will also be encrypted by the SSL channel during data transmission, and the server will return a different one-time password (ONE-TIME PASSWORD) to the chip card each time. Once again, even if the sealed package is intercepted and reissued by the hacker, as long as there is no 0730-A21143TWF (N2); alexchen 8 1271082 physical card is in hand, still can not enter the game through certification. * In addition, other solutions include the use of fingerprint identification (4) and key disk to solve security problems, however, it includes the following shortcomings. First, the hardware cost is high. Fingerprint machines, IC chip cards and gold-plated flash drives are all unrealistic. Second, the body device is unfavorable to carry action and storage. If the player needs to be forced to carry all the full-time devices, * but it is difficult to carry, and if (4) is more numb, it is obvious: 'The above data encryption method is still not 100% safe. Because of the technology, the new II I used the upper body device to perform the f-material authentication and identity identification behavior, and the method prevents the user data from being recorded. In order to solve the problem that the player account is stolen and the hard data is locked, the method is implemented. The invention is disclosed in the embodiment of the present invention. System_Electric stomach π 库 裎 裎 “ “ “ “ “ “ ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... Record the code, and then perform an encryption operation on the user account and password: and::= user account and user password are logged into the server, and the user account is converted according to the number 2 and the user password respectively. The first password and the second Mishima perform a mathematical operation, and the combination of the two operations. The embodiment of the present invention further discloses a method using machine code execution. 4, 贞疋 应用 应用 应用 应用 应用 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 - The first-user account and password, the first-user=and password-execution-additional money, and then the encrypted first-user account: the lawsuit code is registered to the server. - a newsletter containing multiple control codes 'of which The code includes a software code, a second use: an account number, and an operation code. The message is transmitted to the server, and the software code, the second account number, and the operation code are updated, and the certificate is verified. The operation of the corresponding operation code is performed by the following. The embodiment of the invention further discloses a system for performing data locking using machine code, including a computer device, a server and a client. The client uses the brain device to board the person. The ship terminal transmits the machine code of the computer device to the ship terminal for login according to the user operation, and executes a first application program by using the first computer device, and the __ generated by the first program is generated. The operation interface 'registers the machine code of the first computer device to the server, and inputs the first-user account and the -user-user password in the operation interface, and executes the first user account and the first password. __Encryption operation, the encrypted first-user account and the first-user password are logged into the server, and a data locking operation is performed accordingly. The mobile device is coupled to the server, and the client uses the mobile device to establish a short message including a plurality of control codes, wherein the coded code includes a software code, a second user account, and an operation And then transmitting the short message to the server. The servo determines whether the phone number corresponding to the mobile device is the same as the phone number registered in advance, and if the same, determining whether the software code, the second user account, and the operation code are Corresponding to the preset ^ code, the first user account and the operation code, and if the character: then ^ the first user account changes from the deactivated state to the locked or unlocked state. Port, 7 ^ 0730 - Α 21143TWF ( N2);alexchen 7 Ϊ271082 [Embodiment] In order to make the object, features, and features of the present invention
與糸統。 本發明實施例之資料鎖定方法係利用下述兩種方式達到其 目的,其 透過唯一With Sis. The data locking method in the embodiment of the present invention achieves the purpose by using the following two methods, which are unique
使用者帳號的鎖定狀態。 有關利用機器碼登錄與鎖定帳號的方式達到資料鎖定的實 施流程如下所述。 第1圖係顯示本發明實施例之利用機器碼執行資料鎖定的 方法步驟流程圖。首先,利用一電腦裝置開啟一應用程式以連 線到一伺服端(步驟S11),然後將該電腦裝置的機器碼登錄到 忒伺服端(步驟S12)。在本發明實施例中,主要係將該電腦裝 置之、满路卡的媒體存取控制控制(Media Access Control,以下 簡稱為MAC )位址登錄到該伺服端,但並非用以限定本發明, 其匕如中央處理器(Central Processing Unit,CPU )或其它硬體 裝置的唯一序號。 將機器碼登錄後’在一操作介面中利用一『螢幕小鍵盤』 輸入使用者資料(即使用者帳號(ID)與密碼(pw))(步驟S13)。 0730-A21143TWF(N2);alexchenThe lock status of the user account. The implementation process for data lock using the machine code to log in and lock the account is as follows. BRIEF DESCRIPTION OF THE DRAWINGS Figure 1 is a flow chart showing the steps of a method for performing data locking using machine code in an embodiment of the present invention. First, an application is opened by a computer device to connect to a server (step S11), and then the machine code of the computer device is registered to the server (step S12). In the embodiment of the present invention, the media access control (Media Access Control, hereinafter referred to as MAC) address of the full-channel card of the computer device is mainly registered to the server, but is not intended to limit the present invention. It is, for example, a unique serial number of a Central Processing Unit (CPU) or other hardware device. After the machine code is registered, the user profile (i.e., user account (ID) and password (pw)) is input using a "screen keypad" in an operation interface (step S13). 0730-A21143TWF(N2);alexchen
(步 B 1271082 利用『螢幕小鍵盤』可令使用者在前端輸入帳號與密碼時避免 被惡意程式擷取。接下來,對使用者輸入的帳號與密碼執行一 『改良式不可逆編碼』操作以進行加密(步驟S14),然後利用 安全交易傳輸層加密技術(Secure Socket Layer,以下簡稱為 SSL)將加密後的使用者資料傳送至該伺服端(步驟S15),令 使用者可據以執行各項資料鎖定操作。 接下來說明步驟S14中之『改良式不可逆編碼』的實施流 程。參考第2圖,其係顯示本發明實施例之改良式不可逆編碼 的步驟流程圖。 首先,根據使用者輸入的帳號(ID )和密碼(p w )),利用 信息摘要演算法第5版本(Message Digest version 5,MD5 )分 別計算出兩個對應值A與B ( A = MD5 ( ID )、B = MD5 ( PW )) (步驟 S21 與 S22 )。 例如,A = e802b92bbcecfl9967a7ddba2a926c41 (共 32 位元 > ,β _ 7ac66c0fl48de9519b8bd264312c4d64 (共 32 位元)。接 丧卜釆’將 A與B相加’故可得到 C值(步驟 S23 ) 52c8Ixxxxxxxxxxxxxxxxxxxxxxea9a5 (另等各位數相力σ 位予以計算)。然後,將Α值取倒數(Rev (不將進 14c629a2abdd7a76991fcecbb29b208e),然後與 b # 4 ^ ^ 、 值相加(步驟 524 ),故可得 D 二 Rev ( A 、 J ^ b ^ 8e8xxxxxxxxxxxxxxxxxxxxxxxxxxde2 ° 然後,蔣 τλ /丄 將D值右移3位 後的值與原來的D值相加,故可得到E值(E二; + Shlft (D) =8e846d690965486c500cd9c8e5a59858de2 (共 a _ ) 位 tl))(步 525 )。最後’將C值的後五碼(ea9a5 )依序插入到丘值中’ 驟S26),所得即為X值。例如,將C值的後五瑪分 、 值的第1、2、19、37與39位。 ^ 0730-A21143TWF(N2);alexchen 1271082 扩、二下t广明藉由手機簡訊控制使用者帳號之鎖定狀態的實 L私。利用全球行動通訊系統⑽姻System for M〇bil H:=tl〇n,GSM)本身的安全性,以簡訊發話端做認證, 並H 操作親,即可控制制者帳號的鎖定狀態。 號之鎖定«时㈣程w j之湘錢簡訊㈣使用者帳 在,行簡訊發送操作前,使用者縣經由—電腦裝置登錄 端二=㈤服端’且將加密後的使用者資料傳送到該伺服 :。者’使用者利用手機編寫包含控制代碼之簡訊(步驟 S31 ),其中控制代碼包括「一 .. 遊戲代碼」、「遊戲帳號」以及 从也, _'一 · w」…逛鉞恨5[」以及1操 m冊」著使用者利用手機將包含控制代碼的簡訊傳送至上 預(步驟S32)i後該伺服端判斷使用者的手機號碼與 之手機號碼是否相同(步驟阳)。若不同,則該伺服 錯誤訊息給使用者(步驟s36)。若相同,則該饲服 代碼中包含之「遊戲代碼」、「遊戲帳號」以及 回傳-錯誤訊息給使:=6。)…則該伺服端會 媸「p h 1 v驟S36)。右正確,則該伺服端根 呆彳碼」執订對應之鎖定操作(步驟S35),如帳號上鎖 或帳號解鎖操作。 、 上述實施流程’本發明實施例之資料敎方法利用電 硬體序號當作『機器碼』,並轉以提供遊戲帳號『上 ^鎖』肖『停雜號』的安全服務。此外,亦可透過 機簡訊方式執行上述功能。 遊戲帳號包括下列三種鎖定狀態,分別是『上鎖 U〇Cked)、『停用帳號』(St0P)與『解鎖』(Unlocked)。『上鎖』 、不僅能從敎的電腦裝置登人遊戲,『解鎖』表示可利用任何』 exchen 〇730-A21143TWF(N2);al ⑧ 1271082 =边置登人遊戲’而『停用帳號』表 不能登入遊戲。夂去铱1m ⑺仕何電恥裝置都 今『上鎖』、『解二二圖’利用任何電腦裝置可執行『解鎖』 .4〇 解鎖』今停用帳號』以及『上鎖』+『铲用綠咕 而::手定的電腦裝置可執行『上鎖』『解鎖:之操:。』 ^鎖』=執行『停用帳號…上鎖』與『停用帳號』 實做來第I::1:-4:所述之流程,以下說明各項操作的 的步驟流程圖。 本發明實施例之資料登錄與鎖定操作 選取『Α伴她时、 而先於5亥應用程式顯示的操作介面中 k取登錄機器碼』選項(步驟々n 的遊戲(步驟⑽),並且m然後選擇欲登錄機器碼 , )*伺服端接收到該登錄要求時,即執行—切%/#v ( ,; s::) 二=腦裝置的硬體序號(例如,網路卡的Μ = 帳號的機器瑪(步驟㈣),否則顯示一錯誤 鎖解完销成:器田碼姐登錄操作後,使用者即可執行刪除機器碼、上 鎖解鎖與停用帳號等操作(步驟以3〜料5)。 使用者可在該應用程式顯+ 碼』選項(步驟S43),介面中選取『刪除機器 S4,n , . …後、擇欲刪除機器碼的遊戲(步驟 S431),並且輸入遊戲帳號、密碼後送出要求(步驟觀)’告 舰端接❹m騎要㈣,㈣行—認證操作 輸入的遊戲帳號、密碼是否正確,以去 裝置的機器碼是否和該帳號所登 =入之電腦 项的铖夯碼相符(步驟S433 )。 0730-A21143TWF(N2);alexchen 1271082 ,:該伺,端即清除該帳號所登錄的機器碼,且若使用 不符或該機器碼尚夫J 豆錄機器碼』操作。若 ° 且、彔,則顯示一錯誤訊息(步驟S43 5 ) 〇 用者可在該應用程式顯示的操作 項(步驟S44),妒你、辟挪 r 上鎖』選 入遊戲^ — 上鎖的軸(步驟S441),並且輸 收到要求(步驟s442)。她刚服端接 ;: 即執行一認證操作以判斷使用者輸入的遊 :(v驟正確(步驟S443)。若錯誤,則顯示-錯誤訊 若正確,則接著判斷使用者用以登入之電腦裝 二驟=已登錄(,驟科若是,則將該遊戲帳號鎖 〜故僅允料過所登錄機器碼的電腦裝置登人遊 驟S446)。 «示—錯誤訊息(步 另外’使用者可在該應用程式顯示的操作介面中選取『停 用帳號』選項(步驟S44 ),鈇德撰搂%尸 S44n “认 L、、、後選擇欲停用帳號的遊戲(步驟 们服” 戲帳號、密碼後送出要求(步驟⑽)。當 接收到該停用帳號要求時,即執行—認證操作以判斷使 用者輸入的遊戲帳號、密碼是否正確(步驟s443)。若錯誤,則 ::一息(步:S’。若正確,則接著判斷使用者用以 Ϊ用:遊的機器碼是否已登錄(步驟S444)。若是,則將 戲步驟湘),故利用任何電腦裝置都無法使用 =帳=入遊戲,且僅可使用手機簡訊解除『停用帳號』的狀 『解销月nr #用帳5虎』+『上鎖』與『停用帳號』— 作)。若該電腦裝置的機器碼尚未登錄,則顯示一 錯誤訊息(步驟S446)。 使用者可在該應用程式顯示的操作介面中選取『解鎖』選 〇730-A2n43TWF(N2);alexchei 12 1271082 後選擇欲解鎖的遊戲(步驟則),並且輸 :要:、,:== 號、密碼是否正確(步驟S453 )。若錯輸入的士遊自戲帳 驟S456)。若正確,則接著判斷使用者用以登二^孔置= ==號所登錄的機_符(步驟== 則了將该遊戲帳號解除鎖定,故 驟叫若不符,則顯示一錯誤訊息?步=^(Step B 1271082 The "screen keypad" allows the user to avoid the malicious program when entering the account and password on the front end. Next, perform an "improved irreversible coding" operation on the account and password entered by the user. Encryption (step S14), and then using the Secure Socket Layer (Secure Socket Layer, hereinafter referred to as SSL) to transmit the encrypted user data to the server (step S15), so that the user can execute various items. Data Locking Operation Next, the implementation flow of the "improved irreversible coding" in the step S14 will be described. Referring to Fig. 2, it is a flow chart showing the steps of the improved irreversible coding in the embodiment of the present invention. Account number (ID) and password (pw), using the message digest version 5 (MD5) to calculate two corresponding values A and B (A = MD5 (ID), B = MD5 (PW) )) (Steps S21 and S22). For example, A = e802b92bbcecfl9967a7ddba2a926c41 (32 bits total), β _ 7ac66c0fl48de9519b8bd264312c4d64 (32 bits total). After receiving the 丧 釆 'Add A and B', you can get the C value (step S23) 52c8Ixxxxxxxxxxxxxxxxxxxxxxea9a5 (others The phase force σ bit is calculated.) Then, the Α value is reciprocal (Rev (will not enter 14c629a2abdd7a76991fcecbb29b208e), and then added with b # 4 ^ ^, value (step 524), so D two Rev (A, J) ^ b ^ 8e8xxxxxxxxxxxxxxxxxxxxxxxxxxde2 ° Then, Jiang τλ /丄 adds the value of D to the right by 3 bits and adds it to the original D value, so you can get the E value (E 2; + Shlft (D) = 8e846d690965486c500cd9c8e5a59858de2 (total a _ ) Bit tl)) (step 525). Finally, 'the last five codes of the C value (ea9a5) are sequentially inserted into the mound value' (S26), and the result is the X value. For example, the last five cents of the C value, Values 1, 2, 19, 37, and 39. ^ 0730-A21143TWF(N2);alexchen 1271082 Expanded, two under t Guangming uses mobile phone newsletter to control the locked state of user accounts. Communication system (10) marriage System for M bil H: = tl〇n, security GSM) itself, in order to make the originating text message authentication, and pro-H operation, the control system's account to a locked state. The lock of the number «time (four) process wj of the Hunan money newsletter (four) user account, before the line message transmission operation, the user county via the computer device login end two = (five) service end 'and the encrypted user data is transferred to the Servo:. The user uses the mobile phone to write a newsletter containing the control code (step S31), wherein the control code includes "one.. game code", "game account number", and from, _'一·w"... 钺 55 [" And the user can use the mobile phone to transmit the short message containing the control code to the upper pre-step (step S32) i, and the server determines whether the mobile phone number of the user is the same as the mobile phone number (step yang). If it is different, the servo error message is given to the user (step s36). If they are the same, the "game code", "game account number" and return-error message included in the feed code are: =6. )... The server will 媸 "p h 1 v S S36). If the right is correct, the server will perform the corresponding locking operation (step S35), such as account lock or account unlock operation. The above-mentioned implementation flow 'the data method of the embodiment of the present invention uses the serial number of the electrical hardware as the "machine code", and turns to provide the security service of the game account "upper lock" Xiao "stop miscellaneous number". In addition, the above functions can also be performed through the SMS. The game account includes the following three lock statuses: “Lock U〇Cked”, “Disable Account” (St0P) and “Unlocked”. "Locked", not only can you play the game from your computer device, "Unlock" means you can use any "exchen 〇730-A21143TWF(N2); al 8 1271082 = edge-to-board game" and "deactivate account" table Cannot log in to the game.夂 铱 m 1m (7) Shihe shame device is now "locked", "solution two two maps" can use any computer device to perform "unlock". 4 〇 unlock "now disable account" and "locked" + "shovel With green 咕:: The computer device that is fixed can be "locked" "Unlock: Exercise:. 』^Lock』=Execute "Disable Account...Lock" and "Disable Account" To do the process described in I::1:-4:, the following is a flow chart showing the steps of each operation. In the data registration and locking operation of the embodiment of the present invention, the option "take the login machine code in the operation interface displayed before the application of the 5 Hai application" is selected (the game of step 々n (step (10)), and m then Select the machine code to be logged in, ) * When the server receives the login request, it will execute - cut %/#v ( ,; s::) 2 = the hardware serial number of the brain device (for example, the network card Μ = account number Machine Ma (step (4)), otherwise it shows an error lock solution completed: After the device is registered, the user can perform operations such as deleting the machine code, unlocking and unlocking the account (steps to 3) 5) The user can select "Delete the machine S4, n, . . . , select the game to delete the machine code (step S431), and enter the game account in the application display code option (step S43). After the password is sent out (step view) 'The ship terminal is connected to the 骑m ride (4), (4) line - the game account and password entered by the authentication operation are correct, to determine whether the machine code of the device and the computer account that the account is registered The weights match (step S433). 073 0-A21143TWF(N2);alexchen 1271082,: The server will clear the machine code registered by the account, and if it uses the discrepancies or the machine code, the machine code is operated. If ° and 彔, the display An error message (step S43 5) The user can select the operation item displayed in the application (step S44), select the lock of the game, select the axis of the game (step S441), and input Receiving the request (step s442). She just served the termination;: Performing an authentication operation to determine the user-entered tour: (v is correct (step S443). If the error is displayed, the error message is correct, then Judging that the user is using the computer to log in 2 = registered (if the case is closed, the game account is locked ~ so only the computer device of the registered machine code is allowed to board the tour S446). «示——Error The message (step other 'users can select the "deactivate account" option in the operation interface displayed by the application (step S44), and the singer writes % corpse S44n "recognize L,, and then select the game to be deactivated. (Steps to serve) Screen account, password and send out (Step (10)). When the request for the deactivated account is received, the authentication-authentication operation is performed to determine whether the game account number and password input by the user are correct (step s443). If the error is made, the following: (: S'. If it is correct, then it is determined whether the user uses the code: whether the machine code of the swim has been registered (step S444). If so, the game step is used, so that the computer cannot be used by any computer device, and only You can use the mobile phone newsletter to release the "Deactivate Account" status "Uninstallation month nr #用帐5虎" + "Lock" and "Disable account" - if the machine code of the computer device is not registered, display An error message (step S446). The user can select "Unlock" option 730-A2n43TWF (N2) in the operation interface displayed by the application; select the game to be unlocked after alexchei 12 1271082 (step), and input: to:,,:== Is the password correct (step S453). If you enter the wrong taxi tour, you will be charged to S456). If it is correct, then it is determined that the user has used the machine _ symbol registered by the second hole === (step == then the game account is unlocked, so if the call does not match, an error message is displayed? Step = ^
系統顯示本發明實施例之利用機器躲行資料鎖定的 4 施例之資料敎純包括—客戶端_與·^服 m垃藉由一通信網路(例如,區域網路或網際網路) 到祠二;客戶端100利用一電腦裝置開啟-應用程式以登入 (例如4 00’然後根據一使用者操作將該電腦裝置的機器碼 料(即㈣小難』取得使用者資 ==與密碼並且根據-使用者操作對該帳號與 二订?良式不可逆編碼』操作(其實施流程如第2圖 行加密。然後根據一使用者操作利用ssl加密技術 击口使用者資料經由通信網路150傳送至飼服端細,令 本發明實施例之資料鎖定系統更包括一行動裝置(例如, (Personal Digital Assistant, PDA)) ’其藉由—GSM網路350麵接至飼服端200。行動裝置3〇〇 祀據使用者操作取知包含控制代碼之簡訊,其中該控制代碼 0730-A21143TWF(N2);alexchi 13 1271082 包括「遊戲代碼」、「遊戲帳號」以及「操作代碼」,然後經由 GSM網路350將包含控制代碼的簡訊傳送至伺服端200。伺服 • 端200取得該簡訊後,判斷註冊於行動裝置300的號碼與預先 , 登記之號碼是否相同,若相同則接著判斷該控制代碼中包含之 「遊戲代碼」、「遊戲帳號」以及「操作代碼」是否正確。若正 確,則伺服端200根據「操作代碼」執行對應帳號上鎖或帳號 解鎖操作。 本發明實施例之利用機器碼執行資料鎖定的方法與系統透 過限制機器碼登入的方式,加上利用手機簡訊對帳號進行上鎖 痛· 或解鎖,讓使用者可指定其遊戲帳號只能從某一已登錄的電腦 裝置登入遊戲,以提供更安全、更有保障的遊戲環境。此外, 利用手機發送簡訊以對遊戲帳號進行上鎖或解鎖操作的方式, 可省去額外的硬體成本。 本發明方法亦可使用於一般軟體保護以有效杜絕盜版。 雖然本發明已以較佳實施例揭露如上,然其並非用以限定 本發明,任何熟習此技藝者,在不脫離本發明之精神和範圍内, 當可作各種之更動與潤飾,因此本發明之保護範圍當視後附之 ^ 申請專利範圍所界定者為準。 0730-A21143TWF(N2);alexchen ⑧ 1271082 【圖式簡單說明】 第1圖係顯示本發明實施例之利用機器碼執行資料鎖定的 方法步驟流程圖。 第2圖係顯示本發明實施例之改良式不可逆編碼的步驟流 程圖。 第3圖係顯示本發明實施例之利用手機簡訊控制使用者帳 號之鎖定狀態的步驟流程圖。The system displays the data of the four embodiments of the embodiment of the present invention that utilizes the machine to hide data. The data includes: the client _ and the _ server are used by a communication network (for example, a regional network or an Internet). Second, the client 100 uses a computer device to open the application to log in (for example, 4 00' and then obtain the user code == and password according to the user's operation of the computer device's machine code (ie (4) small difficulty). According to the -user operation, the account and the two subscriptions are irreversible coded operations (the implementation process is encrypted as shown in FIG. 2), and then the user data is transmitted via the communication network 150 using the ssl encryption technology according to a user operation. The data locking system of the embodiment of the present invention further includes a mobile device (for example, (Personal Digital Assistant, PDA)), which is connected to the feeding end 200 by the GSM network 350. 3, according to the user operation to know the newsletter containing the control code, wherein the control code 0730-A21143TWF (N2); alexchi 13 1271082 includes "game code", "game account" and "operation code Then, the short message including the control code is transmitted to the server 200 via the GSM network 350. After the server 200 obtains the message, it is determined whether the number registered in the mobile device 300 is the same as the number registered in advance, and if it is the same, then it is determined. Whether the "game code", the "game account", and the "operation code" included in the control code are correct. If correct, the server 200 performs the corresponding account lock or account unlock operation according to the "operation code". The method of using the machine code to perform data locking and the system to restrict the login of the machine code, and the use of the mobile phone newsletter to lock the account or unlock the account, so that the user can specify that the game account can only be from a certain registered computer. The device is logged into the game to provide a safer and more secure game environment. In addition, the use of a mobile phone to send a message to lock or unlock the game account can save additional hardware costs. General software protection to effectively eliminate piracy. Although the invention has been disclosed in the preferred embodiments, However, it is not intended to limit the invention, and any person skilled in the art can make various modifications and retouchings without departing from the spirit and scope of the invention. Therefore, the scope of protection of the present invention is attached to the patent application. The scope is defined as follows: 0730-A21143TWF (N2); alexchen 8 1271082 [Simplified description of the drawings] Fig. 1 is a flow chart showing the steps of the method for performing data locking using machine code according to an embodiment of the present invention. A flow chart of the steps of the improved irreversible coding in the embodiment of the present invention. FIG. 3 is a flow chart showing the steps of controlling the locked state of the user account by using the mobile phone short message in the embodiment of the present invention.
第4圖係顯示本發明實施例之帳號鎖定狀態改變的示意圖。 第5圖係顯示本發明實施例之資料登錄與鎖定操作的步驟 流程圖。 第6圖係顯示本發明實施例之利用機器碼執行資料鎖定的 系統架構圖。 【主要元件符號說明】 100〜客戶端 150〜通信網路 200〜伺服端 300〜行動裝置 350〜GSM網路 0730-A21143TWF(N2);alexchen 15 ⑧Figure 4 is a diagram showing the change of the account lock status of the embodiment of the present invention. Figure 5 is a flow chart showing the steps of the data registration and locking operation of the embodiment of the present invention. Figure 6 is a diagram showing the system architecture for performing data locking using machine code in the embodiment of the present invention. [Main component symbol description] 100~Client 150~Communication network 200~Servo 300~Mobile device 350~GSM network 0730-A21143TWF(N2);alexchen 15 8