
所谓机器的机器码其实就是电脑的一些特征码,包括硬盘序列号、CPU编号、BIOS编号等等和硬件有关的编号。你可以用在VC++中获取这些编号,并用一定的算法将他们组合后,就生成了一个机器码,用这个机器码按照一定的算法生成一个注册码,这样就对你的软件进行了保护,使得只有拥有这个机器码的机器才能安装你的软件。获取硬盘序列号的方法如下(代码)以驱动器C为例:char m_Volume[256];//卷标名char m_FileSysName[256];DWORD m_SerialNum;//序列号DWORD m_FileNameLength;DWORD m_FileSysFlag;::GetVolumeInformation("c:\\",m_Volume,256,&m_SerialNum,&m_FileNameLength,&m_FileSysFlag,256);执行该函数后,m_Volume就是卷标名字符串,m_SerialNum就是序列号
#include <stdioh>
static inline void native_cpuid(unsigned int eax, unsigned int ebx,
unsigned int ecx, unsigned int edx)
{
/ ecx is often an input as well as an output /
asm volatile("cpuid"
: "=a" (eax),
"=b" (ebx),
"=c" (ecx),
"=d" (edx)
: "0" (eax), "2" (ecx));
}
int main(int argc, char argv)
{
unsigned eax, ebx, ecx, edx;
eax = 1; / processor info and feature bits / native_cpuid(&eax, &ebx, &ecx, &edx);
printf("stepping %d\n", eax & 0xF);
printf("model %d\n", (eax >> 4) & 0xF);
printf("family %d\n", (eax >> 8) & 0xF);
printf("processor type %d\n", (eax >> 12) & 0x3);
printf("extended model %d\n", (eax >> 16) & 0xF);
printf("extended family %d\n", (eax >> 20) & 0xFF);
}
最近测试反馈了一个问题,每次重启服务器,我们某个版本的业务系统中的机器码都会改变,导致根据机器码算出来的许可证失效,从而使软件无法使用。 这个问题反馈了有一段时间了,但是本地一直没复现。然后前几天测试说又复现了,马上去看了下测试环境,服务器是一台国产化FT S2500服务器,验证了下,果然如此,马上去看了下关键代码。
这下明白了,它是取的CPU序列号作为机器码。dmidecode的输出中有多个Serial Number,它只取了第一个,恰恰就是Processor Information,也就是我们常说的CPU序列号。
CPU支持过序列号功能,但是被人指责侵犯隐私,所以现在的规范中,CPU完全没有所谓的序列号。
关于CPU序列号,其实还有一段 历史 。在奔腾3中短暂地引入过这个功能,但是后来很快就被移除了。
EAX=3: Processor Serial Number
See also: Pentium III § Controversy about privacy issues(>
#include "StdAfxh"
#include "\puiddiskh"
#define _WIN32_DCOM
#include <iostream>
using namespace std;
#include <comdefh>
#include <Wbemidlh># pragma comment(lib, "wbemuuidlib")
CpuIDDisk::CpuIDDisk(void)
{
GetInfomation();
}CpuIDDisk::~CpuIDDisk(void)
{
}
int CpuIDDisk::GetInfomation(void)
{
HRESULT hres;
//步骤1:不是必须的,COM只须也只能初始化一次
hres = CoInitializeEx(0, COINIT_MULTITHREADED );
if (FAILED(hres))
{
return 1; //初始化COM异常:注意,COM只须也只能初始化一次
}
//步骤2:不是必须的,COM只须也只能设置一次
//Set general COM security levels
hres = CoInitializeSecurity(
NULL,
-1, // COM authentication
NULL, // Authentication services
NULL, // Reserved
RPC_C_AUTHN_LEVEL_DEFAULT, // Default authentication
RPC_C_IMP_LEVEL_IMPERSONATE, // Default Impersonation
NULL, // Authentication info
EOAC_NONE, // Additional capabilities
NULL // Reserved
);
if (FAILED(hres))
{
CoUninitialize();
return 1; // Program has failed
}
//以上不是必须的,若已有“::COMInit();”,则要跳过
//步骤3: Obtain the initial locator to WMI
IWbemLocator pLoc = NULL;
hres = CoCreateInstance(
CLSID_WbemLocator,
0,
CLSCTX_INPROC_SERVER,
IID_IWbemLocator, (LPVOID ) &pLoc);
if (FAILED(hres))
{
CoUninitialize();
return 1;//Failed to create IWbemLocator object
} //步骤4:Connect to WMI through the IWbemLocator::ConnectServer method
IWbemServices pSvc = NULL;
hres = pLoc->ConnectServer(
_bstr_t(L"ROOT\\CIMV2"), // Object path of WMI namespace
NULL, // User name NULL = current user
NULL, // User password NULL = current
0, // Locale NULL indicates current
NULL, // Security flags
0, // Authority (eg Kerberos)
0, // Context object
&pSvc // pointer to IWbemServices proxy
);
if (FAILED(hres))
{
pLoc->Release();
CoUninitialize();
return 1; // Program has failed
}
// 步骤5: Set security levels on the proxy
hres = CoSetProxyBlanket(
pSvc, // Indicates the proxy to set
RPC_C_AUTHN_WINNT, // RPC_C_AUTHN_xxx
RPC_C_AUTHZ_NONE, // RPC_C_AUTHZ_xxx
NULL, // Server principal name
RPC_C_AUTHN_LEVEL_CALL, // RPC_C_AUTHN_LEVEL_xxx
RPC_C_IMP_LEVEL_IMPERSONATE, // RPC_C_IMP_LEVEL_xxx
NULL, // client identity
EOAC_NONE // proxy capabilities
); if (FAILED(hres))
{
pSvc->Release();
pLoc->Release();
CoUninitialize();
return 1;
} // 步骤6:Use the IWbemServices pointer to make requests of WMI ----
IEnumWbemClassObject pEnumerator = NULL;
//计算CPUID
hres = pSvc->ExecQuery(
bstr_t("WQL"),
bstr_t("SELECT FROM Win32_Processor"),//Win32_OperatingSystem
WBEM_FLAG_FORWARD_ONLY | WBEM_FLAG_RETURN_IMMEDIATELY,
NULL,
&pEnumerator);
if (FAILED(hres))
{
pSvc->Release();
pLoc->Release();
CoUninitialize();
return 1;
}
// 步骤7:Get the data from the query
IWbemClassObject pclsObj;
ULONG uReturn = 0;
while (pEnumerator)
{
HRESULT hr = pEnumerator->Next(WBEM_INFINITE, 1,
&pclsObj, &uReturn); if(0 == uReturn)
{
break;
}
VARIANT vtProp;
VariantInit(&vtProp);
hr = pclsObj->Get(L"ProcessorId", 0, &vtProp, 0, 0);
strProcessID=_com_util::ConvertBSTRToString(vtPropbstrVal);//strProcessID:类级变量
} //计算硬盘系列号
hres = pSvc->ExecQuery(
bstr_t("WQL"),
bstr_t("SELECT FROM Win32_DiskDrive"),
WBEM_FLAG_FORWARD_ONLY | WBEM_FLAG_RETURN_IMMEDIATELY,
NULL,
&pEnumerator); if (FAILED(hres))
{
pSvc->Release();
pLoc->Release();
CoUninitialize();
return 1;
}
while (pEnumerator)
{
HRESULT hr = pEnumerator->Next(WBEM_INFINITE, 1,
&pclsObj, &uReturn); if(0 == uReturn)
{
break;
} VARIANT vtProp;
VariantInit(&vtProp);
hr = pclsObj->Get(L"PNPDeviceID", 0, &vtProp, 0, 0);
strDisk=_com_util::ConvertBSTRToString(vtPropbstrVal);
} pSvc->Release();
pLoc->Release();
pEnumerator->Release();
pclsObj->Release();
CoUninitialize(); return 0;
以上就是关于如何获取机器码全部的内容,包括:如何获取机器码、Linux系统下如何用C/C++语言编写程序查看cpu_id的值、cpuid和序列号背后的那些故事等相关内容解答,如果想了解更多相关内容,可以关注我们,你们的支持是我们更新的动力!
欢迎分享,转载请注明来源:内存溢出
微信扫一扫
支付宝扫一扫
评论列表(0条)