Permission authorization method and device based on machine identification code
A machine identification and identification code technology, applied in computer security devices, instruments, program/content distribution protection, etc., can solve problems such as unrealistic implementation, high cost, and complicated login services.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0065] Figure 4 It is the process of generating the machine identification code in the embodiment of the present invention. Such as Figure 4 As shown, in this embodiment, the generation process of the machine identification code includes the following steps:
[0066] The first step is to obtain the registry of the host to be authorized, and check whether the registry has added MAC address encryption string information. If it exists, obtain the value of the MAC address encryption string information as the MAC address part of the machine identification code. If it does not exist , then reacquire the MAC address of the host to be authorized, encrypt it into a string, and add it to the registry;
[0067] The second step is to obtain the value of the system serial number (the SN number is marked in the figure) of the host computer to be authorized;
[0068] The third step is to obtain the system UUID number of the host to be authorized;
[0069] The fourth step is to concaten...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com