A hardware device authorization method and system

A technology of hardware equipment and hardware information, applied in the field of data processing, can solve the problems of consuming human resources and different content of hardware information, and achieve the effect of saving human resources

Active Publication Date: 2019-10-29
BEIJING NAURA MICROELECTRONICS EQUIP CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since there are many different types of computers at present, the content of the obtained hardware information is different, so it is necessary to use different authorization software for authorization
It can be understood that this method requires the development of multiple licensed software, and the need to manually select the appropriate licensed software, so the company needs to spend a lot of human resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A hardware device authorization method and system
  • A hardware device authorization method and system
  • A hardware device authorization method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0048] Key components in a hardware device can be identified using different hardware information, and the hardware information can be used as a basis for how to authorize the hardware device. Hardware information can be read in several ways. Specifically, when an authorized operation is required for a hardware device, first read the hardware information of a key component in the hardware device, for example, read the ID number of the hard disk or the central processing unit CPU as the ID of the entire hardware device number, and then authorize the hardware device based on the ID number.

[0049] However, due to different manufacturers and different hardware types of key components of hardware devices, it is very likely that the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a hardware device authorization method and system, wherein the method includes: reading hardware information corresponding to the hardware device; using the hardware information and a preset character set to determine the authorized application object of the hardware device ; Use the authorization application object to authorize the hardware device. The present invention is applicable to all brands and types of hardware devices, instead of being only applicable to a single brand or type of hardware devices, so that the authorization operation can be adapted to all hardware systems. At the same time, the application of the present invention can avoid the need to manually select and use different authorized software for operation due to different hardware, improve the efficiency of authorization and reduce manual operations, effectively saving a lot of human resources.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to an authorization method for hardware devices and an authorization system for hardware devices. Background technique [0002] Information security is one of the basic guarantees for enterprises to maintain healthy and sustainable development. With the deteriorating network environment and the development of enterprises themselves, along with the occurrence of more and more commercial leaks, information security issues have gradually been put on the agenda, and enterprise managers have gradually realized that information security construction is an important aspect of enterprises. Tasks, some small and medium-sized enterprises have also joined this increasingly large team. In the near future, information security will be more concerned by enterprises, and more enterprises will join the ranks of security, which is also a key step for the survival and development of enterpri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12
CPCG06F21/123G06F21/1011
Inventor 王晶张京华
Owner BEIJING NAURA MICROELECTRONICS EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products