CN108629161A - Authorize monitoring method, server and readable storage medium storing program for executing - Google Patents

Authorize monitoring method, server and readable storage medium storing program for executing Download PDF

Info

Publication number
CN108629161A
CN108629161A CN201810441038.0A CN201810441038A CN108629161A CN 108629161 A CN108629161 A CN 108629161A CN 201810441038 A CN201810441038 A CN 201810441038A CN 108629161 A CN108629161 A CN 108629161A
Authority
CN
China
Prior art keywords
manufacturer
information
authorization message
authorization
legal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810441038.0A
Other languages
Chinese (zh)
Inventor
郭立
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Lingdu Intelligent Control Technology Co Ltd
Original Assignee
Shenzhen Lingdu Intelligent Control Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Lingdu Intelligent Control Technology Co Ltd filed Critical Shenzhen Lingdu Intelligent Control Technology Co Ltd
Priority to CN201810441038.0A priority Critical patent/CN108629161A/en
Publication of CN108629161A publication Critical patent/CN108629161A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of mandate monitoring method, server and readable storage medium storing program for executing, the mandate monitoring method includes the following steps:It is receiving when the authorization requests of authorized component, is obtaining the authorization message in request, the authorization message includes that identification information is numbered with manufacturer;By the authorization message stored in server, whether legal, and after authorization message verification is legal, is sent to manufacturer and obtain active information request if verifying the authorization message;The active information of manufacturer's transmission is received and verifies, active information is legal information if detecting, treats authorized component and is authorized.The present invention effectively prevents infringement of the criminal by copy right piracy to copyright owner's just rights and interests by carrying out mandate monitoring to functional unit, and conveniently legal functional unit can carry out authorization control.

Description

Authorize monitoring method, server and readable storage medium storing program for executing
Technical field
The present invention relates to a kind of communications field more particularly to mandate monitoring method, server and readable storage medium storing program for executing.
Background technology
With the development in an all-round way of intelligent terminal function, the function device and application software in intelligent terminal are also more and more, And function device, such as processor, chip etc. have higher technology content and Value of Science & Technology, or use valence with higher When the application software of value is applied in intelligent terminal, needed by the way that use can be normally carried out after authorizing.And it is many illegal Molecule can select using piracy in order to reduce production cost or the modes such as usurp and be authorized to evade, to reach illegal reduction Purpose at low cost.Therefore be also pirate for function device, the severely afflicated area of behaviors such as usurp, it is pirate phenomena such as lead to function device The technology owner by serious interests lose, be all very unfavorable for industry development and scientific and technological progress.
Invention content
The main purpose of the present invention is to provide a kind of mandate monitoring methods, it is intended to solve functional unit copyright owner couple In functional unit license can not effective monitoring the technical issues of.
To achieve the above object, the present invention provides a kind of mandate monitoring method, and the mandate monitoring method includes following step Suddenly:
It is receiving when the authorization requests of authorized component, is obtaining the authorization message in request, the authorization message includes Identification information is numbered with manufacturer;
By the authorization message stored in server, whether legal, and in authorization message if verifying the authorization message Verify it is legal after, to manufacturer send obtain active information request;
The active information of manufacturer's transmission is received and verifies, active information is legal information if detecting, treats mandate Component is authorized.
Optionally, the authorization message by being stored in server verifies whether the authorization message is legal Step includes:
It whether is stored in detection service device in the licensed-type production quotient number of authorization message comprising in the authorization message Manufacturer numbers;
If not comprising manufacturer's number in the authorization message, judge that authorization message is illegal.
Optionally, it stores in the licensed-type production quotient number of authorization message and whether is awarded comprising described in the detection service device Include after the step of weighing manufacturer's number in information:
It is numbered comprising the manufacturer in the authorization message in the licensed-type production quotient number of authorization message if detecting, Judgement manufacturer's number is that licensed-type production quotient has numbered;
Whether detect in the authorization identification information of the raw supplier number includes authorization message identification information.
Optionally, whether include mark letter in authorization message in the authorization identification information of the detection raw supplier number Further include after the step of breath:
If detecting in the authorization identification information comprising the raw supplier number to include authorization message identification information, sentence It is legal to determine authorization message verification.
Optionally, described detect in the authorization identification information comprising the raw supplier number includes to be identified in authorization message Information then judges that authorization message verifies legal step and includes later:
If it is determined that authorization message is illegal, then the prompt message for waiting for that authorized component is stolen is sent to the raw manufacturer.
Optionally, the active information received and verify manufacturer's transmission, if it is detected that when active information is legal, it is right Wait for that the step of authorized component is authorized includes:
The active information received is matched with the verification information of corresponding identification information, if active information is believed with verification Manner of breathing simultaneously, then judges that active information is legal.
Optionally, described to match the active information received with the verification information of corresponding identification information, if activation When information is identical as verification information then, include after the step of judgement successful match:
If active information is differed with verification information, judge that active information is illegal, and sends and activate to manufacturer The prompt message of failure.
Optionally, if it is described detect active information be legal information, treat the step of authorized component is authorized it After include:
The open authorized order for waiting for authorized component access right is sent to waiting for authorized component.
In addition, to achieve the above object, the present invention also provides a kind of server, the server includes:Memory, processing Device and it is stored in the device authorization monitoring programme that can be run on the memory and on the processor, the device authorization prison Control program realizes the step of authorizing monitoring method as described above when being executed by the processor.
In addition, to achieve the above object, it is described computer-readable the present invention also provides a kind of computer readable storage medium The device authorization monitoring programme stored on storage medium, the device authorization monitoring programme realize institute as above when being executed by processor The step of mandate monitoring method stated.
The present invention receives the authorization message for waiting for authorization function component by server, and to receiving the legal of authorization message Property is verified, so as to quickly judge to wait for whether authorized component is legal.And pass through after judgement waits for that authorized component is legal It asks active information to carry out the verification of legitimacy to the behavior of this authorization requests to manufacturer, can have by the verification of multilayer The functional unit to legal manufacturer of effect is correctly authorized, and criminal is avoided to encroach on function by copy right piracy The interests of component copyright owner and legal manufacturer, and the normal function of the functional unit illegally used can be limited, it realizes Effective authorize is carried out to functional unit to monitor.
Description of the drawings
Fig. 1 be the hardware running environment that the embodiment of the present invention is related to terminal apparatus structure schematic diagram;
Fig. 2 is that the present invention authorizes one embodiment flow diagram of monitoring method;
Fig. 3 is that the present invention authorizes the refinement flow diagram in another embodiment the step of S20 in monitoring method.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific implementation mode
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
As shown in Figure 1, the terminal structure schematic diagram for the hardware running environment that Fig. 1, which is the embodiment of the present invention, to be related to.
Terminal of the embodiment of the present invention can be smart mobile phone, tablet computer, E-book reader, MP3 (Moving Picture Experts Group Audio Layer III, dynamic image expert's compression standard audio level 3) player, MP4 (Moving Picture Experts Group Audio Layer IV, dynamic image expert's compression standard audio level 3) player, pocket computer etc. have the packaged type mobile terminal of display function.
As shown in Figure 1, the terminal may include:Processor 1001, such as CPU, network interface 1004, user interface 1003, memory 1005, communication bus 1002.Wherein, communication bus 1002 is for realizing the connection communication between these components. User interface 1003 may include display screen (Display), input unit such as keyboard (Keyboard), optional user interface 1003 can also include standard wireline interface and wireless interface.Network interface 1004 may include optionally that the wired of standard connects Mouth, wireless interface (such as WI-FI interfaces).Memory 1005 can be high-speed RAM memory, can also be stable memory (non-volatile memory), such as magnetic disk storage.Memory 1005 optionally can also be independently of aforementioned processor 1001 storage device.
Optionally, terminal can also include camera, RF (Radio Frequency, radio frequency) circuit, sensor, audio Circuit, WiFi module etc..Wherein, sensor such as optical sensor, motion sensor and other sensors.Specifically, light Sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can according to the light and shade of ambient light come The brightness of display screen is adjusted, proximity sensor can close display screen and/or backlight when mobile terminal is moved in one's ear.As One kind of motion sensor, gravity accelerometer can detect in all directions the size of (generally three axis) acceleration, quiet Size and the direction that can detect that gravity when only, the application that can be used to identify mobile terminal posture are (such as horizontal/vertical screen switching, related Game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Certainly, mobile terminal can also match The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor are set, details are not described herein.
It will be understood by those skilled in the art that the restriction of the not structure paired terminal of terminal structure shown in Fig. 1, can wrap It includes than illustrating more or fewer components, either combines certain components or different components arrangement.
As shown in Figure 1, as may include that operating system, network are logical in a kind of memory 1005 of computer storage media Believe module, Subscriber Interface Module SIM and device authorization monitoring programme.
In terminal shown in Fig. 1, network interface 1004 is mainly used for connecting background server, is carried out with background server Data communicate;User interface 1003 is mainly used for connecting client (user terminal), with client into row data communication;And processor 1001 can be used for calling the device authorization monitoring programme stored in memory 1005, and execute following operation:
Further, processor 1001 can call the device authorization monitoring programme stored in memory 1005, also execute It operates below:
Further, processor 1001 can call the device authorization monitoring programme stored in memory 1005, also execute It operates below:
With reference to Fig. 2, first embodiment of the invention provides a kind of mandate monitoring method, and the mandate monitoring method includes:
Step S10 is being received when the authorization requests of authorized component, obtains the authorization message in request, the mandate Information includes that identification information is numbered with manufacturer;
Specifically, the component of authorization server unauthorized in receiving terminal device, including doing can hardware and software journey Sequence when the authorization requests of transmission, can obtain authorization requests identification information and manufacturer's number.
Step S20, whether by the authorization message stored in server, it is legal to verify the authorization message, and After authorization message verification is legal, is sent to manufacturer and obtain active information request;
Specifically, authorization server numbers whether verification manufacturer is licensed-type production quotient according to manufacturer, after being proved to be successful Whether comprising the identification information received in verifying the component that the manufacturer authorizes, so as to the legitimacy to authorization message Effectively verified.
Step S30, receives and verifies the active information of manufacturer's transmission, if detecting, active information is legal information, Authorized component is treated to be authorized.
Specifically, authorization server is after verification authorization message is legal authorization message, it is also necessary to which manufacturer swashs It lives to complete to authorize, manufacturer can be caused by unnecessary damage to avoid waiting for that authorized component is stolen by manufacturer's activation It loses, and further protects technical solution.
Intelligent terminal, such as mobile phone, intelligent computer etc. are assembled by the component of many different function, and intelligent terminal Main performance be to be determined by some of important assembly properties, such as chip, processor, or be relevant soft Part etc..And some criminals can use the functional unit of some piracies to obtain the market interest of functional unit at present Production and sales are carried out, such as the means such as replicate, usurp, and functional unit factory can be caused using functional unit by illegal means The legitimate interests of quotient are encroached on, and are also harmful for market competition, thus at present be required to functional unit into The effective legitimate rights and interests for authorizing monitoring to come security function component manufacturer of row.
Functional unit manufacturer often sets functional unit to ensure the interests of itself and the normal order in market Normal use can be carried out after mandate, and the function of the functional unit by mandate can not be restricted or can not be just It is often used, for manufacturer after obtaining mandate, the functional unit licensed can be added to authorization control by functional unit manufacturer In server, manufacturer can be indicated in background server by manufacturer's number or other forms, and be authorized The identification information of the functional unit used carries out corresponding with manufacturer's number.Such as a collection of chip is licensed in manufacturer's A acquisitions, The identification information of chip is 001 to 100 totally 100 chips, and this batch of chip is then corresponding awarding in manufacturer A in the server It weighs in component.It can be corresponded from manufacturer to functional unit in this way, increase the efficiency and correctness of empowerment management. And manufacturer's number is sent to server after being uniformly packaged with identification information when sending authorization message.
Server can be made to determine that manufacturer sets with corresponding function by manufacturer's number and the identification information of functional unit Standby information is correct, but if criminal illegally got manufacturer number and identification information, criminal according to It is old to obtain mandate, therefore server is after verification manufacturer number and the legitimacy of identification information, it is also necessary to manufacturer sends out Active information is sent to complete the mandate to functional unit.Active information is sent by manufacturer, equipment can be avoided to be stolen In the case of, authorisation device the case where being illegally used that manufacturer obtains, while the empowerment management for increasing functional unit, The legitimate interests of manufacturer can also be avoided to receive loss.
Mandate monitoring method of the present invention carries out authorization control by authorization control server to functional unit, need not make It is manually operated, server passes through the relevant information that will be got in the authorization requests received and the authorization message of storage It is verified, you can quickly learn whether functional unit is legal use, then in the active information pair by receiving manufacturer The legal row of operation of authorization requests is confirmed, to which completion quickly and accurately monitors the mandate of functional unit.To obtain It takes the functional unit of mandate that can not be normally carried out to use, in this way it is possible to prevente effectively from stolen, duplication of functional unit etc. is normal The copy right piracy seen loses to functional unit manufacturer with caused by legal manufacturer, the specification normal order in market.
Further, with reference to Fig. 3, step S20 includes the authorization message by being stored in server, verifies the mandate Whether information is that legal step includes:
Whether step S21, it includes the mandate to store in detection service device in the licensed-type production quotient number of authorization message Manufacturer's number in information;
If step S22 judges that authorization message is illegal not comprising manufacturer's number in the authorization message.
Specifically, after server gets authorization requests, whether first choice needs to verify manufacturer's number in authorization requests For the number of the legal manufacturer authorized, and the number of the legal manufacturer authorized can be stored in the database of server In, it then detects whether comprising the manufacturer's number received in the legal manufacturer number of storage, if including, then judge to give birth to Business men number is legal, otherwise judges that manufacturer's number is illegal.
The identification information that the legal manufacturer and corresponding functional unit for obtaining and authorizing is stored in server, is connecing When receiving authorization requests, server first verifies that manufacturer numbers, because identification information is corresponding with manufacturer's number, institute With when verify manufacturer number it is illegal when, identification information can also be determined as it is illegal, without being verified.Service Whether device is by detecting the manufacturer received number comprising in the legal manufacturer number stored in the database, you can quick To manufacturer number verify, therefore by first to manufacturer number verification, can be quickly to illegal production quotient It is identified.
Further, stored in step S21 detection services device authorization message licensed-type production quotient number in whether include Include after manufacturer's number in the authorization message:
Step S23, if comprising the production in the authorization message in detecting the licensed-type production quotient number of authorization message Quotient numbers, then judges that manufacturer's number is that licensed-type production quotient has numbered;
Whether step S24, it includes authorization message identification information to detect in the authorization identification information of the raw supplier number
Specifically, server detects in the supplier number of licensed-type production stored in database comprising the production received Quotient numbers, then shows that the manufacturer for sending authorization requests is the legal manufacturer by mandate, at this time then further to beautiful letter Breath is verified, and the verification mode of identification information is identical as the verification of manufacturer, that is, detects the mandate mark corresponding to manufacturer Whether comprising the identification information that receives in information, to decision-making function component whether be legal authorization functional unit.
After server authentication manufacturer is legal manufacturer, by the manufacturer of the identification information received and storage Whether corresponding authorization function component identification information is matched, i.e., include to receive in the corresponding identification information of manufacturer Identification information, so that it is determined that whether the functional unit for this time sending authorization requests is legal functional unit.
Further, whether detected with reference to Fig. 3, step S24 in the authorization identification information of the raw supplier number includes to award Further include after the step of weighing information identification information:
If step S25 is detected in the authorization identification information comprising the raw supplier number comprising mark letter in authorization message Breath then judges that authorization message verification is legal.
Specifically, whether the corresponding identification information of manufacturer stored in server meeting Test database includes to receive Identification information includes then to judge that authorization message is legal if detecting.
When server detects that manufacturer's number is all consistent with the content stored in data with identification information, then it can sentence Surely the functional unit of transmission authorization requests is legal functional unit.The verification process of authorization requests is very simple, verifies simultaneously Speed can be very fast, therefore may be implemented quickly and easily to complete the verification of authorization message in authorization control.
Further, step S25 detects in the authorization identification information comprising the raw supplier number to include authorization message Identification information then judges that authorization message verifies legal step and includes later:
Step S26 then sends the prompt for waiting for that authorized component is stolen if it is determined that authorization message is illegal to the raw manufacturer Information.
Specifically, when detecting that authorization message is illegal, show that functional unit is being carried out the robber such as usurping by criminal Version behavior reminds manufacturer's note by sending the prompt message that functional unit to be authorized illegally is being usurped to manufacturer Meaning product safety.
In order to it is significantly more efficient improve product production safety, server when detecting illegal authorization requests, Manufacturer can be reminded by sending the modes such as prompt message in time, manufacturer then can at the first time obtain in its product The message that functional unit is used by piracy, can allow manufacturer that can more efficiently copy right piracy be made a response and be answered in this way It is right, avoid the loss of manufacturer from further expanding.Manufacturer can also be increased to feed back the use of functional unit manufacturer, improved Usage experience.
Further, after the step of step S26 waits for authorized component stolen prompt message to raw manufacturer's transmission Including:
The active information received is matched with the verification information of corresponding identification information, if active information is believed with verification Manner of breathing simultaneously, then judges that active information is legal.
Specifically, the active information received prompt message corresponding with the manufacturer of storage is suppressed, if the two Identical then decision verification success, active information then show that active information is legal active information after being proved to be successful.
Active information is that manufacturer inputs, therefore other uses can be avoided to wait for that authorization function component is authorized The case where request, then shows to wait for authorization function so when active information is identical as the active information verification of the storage in database Component is legal, and can be authorized.
Further, step S30 matches the active information received with the verification information of corresponding identification information, if When active information is identical as verification information then, include after the step of judgement successful match:
Step S31 judges that active information is illegal if active information is differed with verification information, and to manufacturer Send the prompt message of activation failure.
Specifically, after server receives the active information that manufacturer sends, active information is verified, and is testing Card obtain active information it is illegal when, to manufacturer send activation failure information remind.
Licensing process can be confirmed in many ways by obtaining active information, as long as without causing unauthorized person to use Correct equipment can complete the case where activation, such as lawless people steals the functional unit of manufacturer.Although the step of activation The rapid flow for increasing mandate, but activate the functional unit progressive activation that behavior can be disposably most, i.e., it is primary to swash The mandate of the living functional unit for completing a batch, so also can family meet the feelings of actual production manufacturing process medium quantity batch processing Condition increases the efficiency of activation.So as to while increasing functional unit mandate monitoring safety, ensure and authorize monitoring Efficiency is authorized not have large effect.
And due to activation be a process manually carried out (authorization requests can when intelligent terminal initializes it is automatic Carry out), the pertinent authorization information for the functional unit that network intrusions make manufacturer legal, including manufacturer can also be avoided in this way Number and identification information, be stolen laggard pirate version.Manufacturer completes activation by inputting active information, and step is simple and effective, So as to ensure the legitimate interests of manufacturer to the greatest extent.
Further, if step S30 detects that active information is legal information, the step that authorized component is authorized is treated Include after rapid:
Step S40 sends the open authorized order for waiting for authorized component access right to waiting for authorized component.
Specifically, server complete the step of all authority checkings and all judge it is legal after, then can be by function The authorized order of correlation function access right is sent in an intelligent terminal or functional unit to be authorized in component, to open It waits for the confined function of authorized component, completes to authorize.
The purpose of mandate is can normally to use functional unit, therefore server judgement waits for that authorized component is legal Functional unit after, then by send authorized order come control release wait for correlation function in authorized component use limit, make to wait for Authorized component can be normally carried out use.
The present invention also provides a kind of servers.
The server of mandate monitoring method of the present invention includes:It memory, processor and is stored on the memory and can The mandate monitoring programme run on the processor, the mandate monitoring programme realize institute as above when being executed by the processor The mandate monitoring method step stated.
Wherein, the mandate monitoring programme run on the processor is performed realized method and can refer to the present invention The each embodiment of monitoring method is authorized, details are not described herein.
In addition the embodiment of the present invention also proposes a kind of computer readable storage medium.
Mandate monitoring programme is stored on computer readable storage medium of the present invention, the mandate monitoring programme is by processor The step of authorizing monitoring method as described above is realized when execution.Wherein, the mandate monitoring programme run on the processor It is performed realized method and can refer to the present invention mandate each embodiment of monitoring method, details are not described herein
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that process, method, article or system including a series of elements include not only those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or system institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this There is also other identical elements in the process of element, method, article or system.
The embodiments of the present invention are for illustration only, can not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be expressed in the form of software products, which is stored in one as described above In storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that mobile terminal (can be mobile phone, Computer, server, mobile terminal or network equipment etc.) execute method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of mandate monitoring method, which is characterized in that the mandate monitoring method includes the following steps:
It is receiving when the authorization requests of authorized component, is obtaining the authorization message in request, the authorization message includes mark Information is numbered with manufacturer;
By the authorization message stored in server, whether legal, and verified in authorization message if verifying the authorization message After legal, sent to manufacturer and obtain active information request;
The active information of manufacturer's transmission is received and verifies, active information is legal information if detecting, treats authorized component It is authorized.
2. authorizing monitoring method as described in claim 1, which is characterized in that the mandate by being stored in server is believed Breath, verifies whether the authorization message is that legal step includes:
It whether is stored in detection service device in the licensed-type production quotient number of authorization message comprising the production in the authorization message Quotient numbers;
If not comprising manufacturer's number in the authorization message, judge that authorization message is illegal.
3. authorizing monitoring method as claimed in claim 2, which is characterized in that store authorization message in the detection service device Licensed-type production quotient number in whether comprising the step of manufacturer's number in the authorization message include later:
If detecting in the licensed-type production quotient number of authorization message comprising manufacturer's number in the authorization message, judge Manufacturer's number is that licensed-type production quotient has numbered;
Whether detect in the authorization identification information of the raw supplier number includes authorization message identification information.
4. authorizing monitoring method as claimed in claim 3, which is characterized in that the mandate mark of the detection raw supplier number Further include after the step of whether knowing in information comprising authorization message identification information:
If it includes authorization message identification information to detect in the authorization identification information comprising the raw supplier number, judgement is awarded It is legal to weigh Information Authentication.
5. authorizing monitoring method as claimed in claim 4, which is characterized in that described to detect comprising the raw supplier number Include authorization message identification information in authorization identification information, then judges that authorization message verifies legal step and includes later:
If it is determined that authorization message is illegal, then the prompt message for waiting for that authorized component is stolen is sent to the raw manufacturer.
6. authorizing monitoring method as claimed in claim 5, which is characterized in that described sent to the raw manufacturer waits for authorized component Include after the step of stolen prompt message:
The active information received is matched with the verification information of corresponding identification information, if active information and verification information phase Meanwhile then judging that active information is legal.
7. authorizing monitoring method as described in claim 1, which is characterized in that described by the active information received and corresponding mark Know information verification information matched, when active information is identical with verification information if, judgement successful match the step of after Including:
If active information is differed with verification information, judge that active information is illegal, and activation failure is sent to manufacturer Prompt message.
8. authorizing monitoring method as described in claim 1, which is characterized in that if described detect that active information is legal letter Breath, then treating the step of authorized component is authorized includes later:
The open authorized order for waiting for authorized component access right is sent to waiting for authorized component.
9. a kind of server, which is characterized in that the server includes:It memory, processor and is stored on the memory And the device authorization monitoring programme that can be run on the processor, the device authorization monitoring programme are executed by the processor The step of Shi Shixian such as mandate monitoring methods described in any item of the claim 1 to 8.
10. a kind of computer readable storage medium, which is characterized in that be stored with equipment on the computer readable storage medium and award Monitoring programme is weighed, is realized as described in any item of the claim 1 to 8 when the device authorization monitoring programme is executed by processor The step of authorizing monitoring method.
CN201810441038.0A 2018-05-08 2018-05-08 Authorize monitoring method, server and readable storage medium storing program for executing Withdrawn CN108629161A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810441038.0A CN108629161A (en) 2018-05-08 2018-05-08 Authorize monitoring method, server and readable storage medium storing program for executing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810441038.0A CN108629161A (en) 2018-05-08 2018-05-08 Authorize monitoring method, server and readable storage medium storing program for executing

Publications (1)

Publication Number Publication Date
CN108629161A true CN108629161A (en) 2018-10-09

Family

ID=63692344

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810441038.0A Withdrawn CN108629161A (en) 2018-05-08 2018-05-08 Authorize monitoring method, server and readable storage medium storing program for executing

Country Status (1)

Country Link
CN (1) CN108629161A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111582869A (en) * 2020-04-21 2020-08-25 海南电网有限责任公司 Information security protection method, device and equipment
CN111881441A (en) * 2020-08-03 2020-11-03 苏州思必驰信息科技有限公司 Method for online activation of device, electronic device and storage medium
CN112417383A (en) * 2020-11-23 2021-02-26 深圳市德卡科技股份有限公司 Card reader anti-counterfeiting method and card reader anti-counterfeiting system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111582869A (en) * 2020-04-21 2020-08-25 海南电网有限责任公司 Information security protection method, device and equipment
CN111881441A (en) * 2020-08-03 2020-11-03 苏州思必驰信息科技有限公司 Method for online activation of device, electronic device and storage medium
CN111881441B (en) * 2020-08-03 2022-07-05 思必驰科技股份有限公司 Method for online activation of device, electronic device and storage medium
CN112417383A (en) * 2020-11-23 2021-02-26 深圳市德卡科技股份有限公司 Card reader anti-counterfeiting method and card reader anti-counterfeiting system

Similar Documents

Publication Publication Date Title
CN102984199B (en) Resource access authorization
CN103975335B (en) Utilize the certification of two level ratifier
US9703971B2 (en) Sensitive operation verification method, terminal device, server, and verification system
EP3732597B1 (en) Account verification system
CN108347444A (en) Identity identifying method, device based on block chain and computer readable storage medium
CN107077552A (en) Bio-identification checking is distributed between device in AD-HOC network
EP1782155B1 (en) Methods and apparatuses for automatically selecting a profile
CN108629161A (en) Authorize monitoring method, server and readable storage medium storing program for executing
CN103597492A (en) Improved security function-based cloud service system and method for supporting same
CN107818258A (en) Indirect certification
CN110505198A (en) A kind of checking request method, apparatus, computer equipment and storage medium
CN107077355A (en) For the mthods, systems and devices initialized to platform
CN109657448A (en) A kind of method, apparatus, electronic equipment and storage medium obtaining Root authority
CN105612731B (en) It may have access to application state across accredited and untrusted platform roaming internet
US10447702B2 (en) Digital credential tiers
CN107888589A (en) A kind of method and its system for calling trusted application
JP7104259B1 (en) Information processing equipment, information processing methods, and programs
CN108153420A (en) A kind of information push method, device, server and storage medium
US10873849B1 (en) System and method for universal mobile device lock using blockchain
KR101607935B1 (en) System for paying mobile using finger scan and method therefor
CN108460251B (en) Method, device and system for running application program
US20150121474A1 (en) Processor security authentication area
WO2017080246A1 (en) Unlocking method, device, and equipment
US10452819B2 (en) Digital credential system
CN107968779A (en) Auth method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20181009