CN116522291A - Software license authorization method, device and equipment - Google Patents

Software license authorization method, device and equipment Download PDF

Info

Publication number
CN116522291A
CN116522291A CN202310347502.0A CN202310347502A CN116522291A CN 116522291 A CN116522291 A CN 116522291A CN 202310347502 A CN202310347502 A CN 202310347502A CN 116522291 A CN116522291 A CN 116522291A
Authority
CN
China
Prior art keywords
authorized
authorization
equipment
local
target software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310347502.0A
Other languages
Chinese (zh)
Inventor
查浩兵
秦民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Automotive Innovation Co Ltd
Original Assignee
China Automotive Innovation Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Automotive Innovation Co Ltd filed Critical China Automotive Innovation Co Ltd
Priority to CN202310347502.0A priority Critical patent/CN116522291A/en
Publication of CN116522291A publication Critical patent/CN116522291A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/41User authentication where a single sign-on provides access to a plurality of computers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

The application relates to a method, a device and equipment for authorizing software license. Belonging to the technical field of software authorization, the method comprises the following steps: performed by an authorized device in a local area network, the method comprising: receiving a local authorization request aiming at target software and sent by equipment to be authorized in a local area network, and verifying the authority of the equipment to be authorized according to information carried by the local authorization request; and under the condition that the result of the authority verification represents that the verification passes, license authorization is carried out for the target software of the equipment to be authorized. In the method, only one device is required to obtain the license authorization of the target software in the same local area network, and the target software of other devices to be authorized in the local area network can be licensed and authorized as authorized devices, so that one authorization is realized, the trust transfer effect of the platform authorization is realized, the authority manager is not required to take charge of all software license authorization matters, the efficiency of software license is improved, and the labor cost during software license authorization is also reduced.

Description

Software license authorization method, device and equipment
Technical Field
The present invention relates to the field of software management technologies, and in particular, to a method, an apparatus, and a device for software license authorization.
Background
The software needs to be subject to a software license authorization verification (e.g., license authorization verification) before it is used, and only devices that pass the license authorization verification can use the software.
The existing mainstream software license authorization method is that device hardware information such as an MAC (Media Access Control, medium access control) address of a device to be authorized needs to be provided to a software provider, and the software provider performs license authorization of target software on the device to be authorized after operations such as verification and encryption.
However, in the actual execution process, the number of devices to be authorized is often multiple, device hardware information such as the MAC address of each device needs to be provided to a software provider, and the software provider needs to license and authorize the target software of the devices to be authorized one by one, which results in complicated license and authorization process.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a method, apparatus and device for license authorization of software that improves the efficiency of license authorization.
In a first aspect, the present application provides a method of software license authorization performed by an authorized device in a local area network, the method comprising:
receiving a local authorization request aiming at target software and sent by equipment to be authorized in a local area network; wherein the local authorization request is sent by the device to be authorized in case that the presence of an authorized device in the local area network is detected;
Performing authority verification on the equipment to be authorized according to the information carried by the local authorization request;
and under the condition that the result of the authority verification represents that the verification passes, license authorization is carried out for the target software of the equipment to be authorized.
In one embodiment, before verifying the authority of the device to be authorized according to the information carried by the local authorization request, the method further includes:
acquiring the authorization limit of the target software;
executing a permission verification step for the equipment to be authorized according to the local authorization request under the condition that the authorization limit exists in the authorization limit characterization;
correspondingly, after license authorization is performed for the target software of the device to be authorized, the method further comprises:
and adjusting the authorization limit of the target software, and synchronizing the adjusted authorization limit to other authorized devices in the local area network.
In one embodiment, the information carried by the local authorization request includes login user information; performing authority verification on equipment to be authorized according to information carried by a local authorization request, including:
matching login user information carried by the local authorization request with the authorized user information of the target software;
and verifying the authority of the equipment to be authorized according to the matching result.
In one embodiment, the method further comprises:
if the authorized equipment is the permission authority of the target software, summarizing the equipment hardware information of all the authorized equipment in the local area network to obtain hardware summarizing information;
and sending the hardware summary information to the authority management party.
In a second aspect, the present application also provides another software license authorization method. Performed by a device to be authorized in a local area network, the method comprising:
detecting whether authorized equipment exists in the local area network;
if so, a local authorization request for the target software is sent to the authorized device, so that the authorized device can carry out license authorization of the target software for the authorized device based on the information carried by the local authorization request.
In one embodiment, the method further comprises:
if no authorized device exists in the local area network, an external authorization request for the target software is sent to the authority management party, so that the authority management party can carry out permission authorization of the target software for the device to be authorized based on information carried by the external authorization request.
In one embodiment, the information carried by the external authorization request includes native device hardware information.
In a third aspect, the present application further provides a software license authorizing apparatus configured to an authorized device in a local area network, the apparatus comprising:
the receiving module is used for receiving a local authorization request aiming at target software, which is sent by equipment to be authorized in the local area network; wherein the local authorization request is sent by the device to be authorized in case that the presence of an authorized device in the local area network is detected;
the verification module is used for verifying the authority of the equipment to be authorized according to the information carried by the local authorization request;
and the authorization module is used for carrying out license authorization on the target software of the equipment to be authorized under the condition that the result of the permission verification represents that the verification is passed.
In a fourth aspect, the present application further provides another software license authorizing apparatus configured for a device to be authorized in a local area network, the apparatus including:
the detection module is used for detecting whether authorized equipment exists in the local area network;
and the sending module is used for sending a local authorization request aiming at the target software to the authorized equipment if the local authorization request exists, so that the authorized equipment can carry out permission authorization of the target software for the authorized equipment based on the information carried by the local authorization request.
In a fifth aspect, the present application also provides a computer device comprising a memory and a processor, the memory storing a computer program, the processor executing the computer program to perform the steps of:
Receiving a local authorization request aiming at target software and sent by equipment to be authorized in a local area network; wherein the local authorization request is sent by the device to be authorized in case that the presence of an authorized device in the local area network is detected;
performing authority verification on the equipment to be authorized according to the information carried by the local authorization request;
and under the condition that the result of the authority verification represents that the verification passes, license authorization is carried out for the target software of the equipment to be authorized.
In a sixth aspect, the present application also provides another computer device, the computer device comprising a memory and a processor, the memory storing a computer program, the processor executing the computer program to perform the steps of:
detecting whether authorized equipment exists in the local area network;
if so, a local authorization request for the target software is sent to the authorized device, so that the authorized device can carry out license authorization of the target software for the authorized device based on the information carried by the local authorization request.
In a seventh aspect, the present application also provides a computer-readable storage medium. A computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
receiving a local authorization request aiming at target software and sent by equipment to be authorized in a local area network; wherein the local authorization request is sent by the device to be authorized in case that the presence of an authorized device in the local area network is detected;
Performing authority verification on the equipment to be authorized according to the information carried by the local authorization request;
and under the condition that the result of the authority verification represents that the verification passes, license authorization is carried out for the target software of the equipment to be authorized.
In an eighth aspect, the present application also provides another computer-readable storage medium. A computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
detecting whether authorized equipment exists in the local area network;
if so, a local authorization request for the target software is sent to the authorized device, so that the authorized device can carry out license authorization of the target software for the authorized device based on the information carried by the local authorization request.
In a ninth aspect, the present application also provides a computer program product. Computer program product comprising a computer program which, when executed by a processor, realizes the steps of:
receiving a local authorization request aiming at target software and sent by equipment to be authorized in a local area network; wherein the local authorization request is sent by the device to be authorized in case that the presence of an authorized device in the local area network is detected;
performing authority verification on the equipment to be authorized according to the information carried by the local authorization request;
And under the condition that the result of the authority verification represents that the verification passes, license authorization is carried out for the target software of the equipment to be authorized.
In a tenth aspect, the present application also provides another computer program product. Computer program product comprising a computer program which, when executed by a processor, realizes the steps of:
detecting whether authorized equipment exists in the local area network;
if so, a local authorization request for the target software is sent to the authorized device, so that the authorized device can carry out license authorization of the target software for the authorized device based on the information carried by the local authorization request.
Compared with the prior art, the beneficial effects of this application are: according to the software license authorization method, in the same local area network, only one device is required to obtain license authorization of target software, the target software of other devices to be authorized in the local area network can be licensed and authorized as authorized devices, one authorization is realized, the trust transfer effect of the platform authorization is realized, the authority management party is not required to take charge of all software license authorization matters, the software license efficiency is improved, and the labor cost during software license authorization is also reduced. Software license authorization methods, apparatuses and devices.
Drawings
Fig. 1 is an application environment diagram of a software license authorization method provided in this embodiment;
fig. 2 is a flowchart of a first software license authorization method according to the present embodiment;
fig. 3 is a schematic flow chart of a first authority verification provided in the present embodiment;
fig. 4 is a schematic flow chart of a second authority verification provided in the present embodiment;
fig. 5 is a schematic flow chart of acquiring hardware summary information according to the present embodiment;
FIG. 6 is a flowchart of a second software license authorization method according to the present embodiment;
FIG. 7 is a signaling diagram of a software license authorization method according to the present embodiment;
FIG. 8 is a block diagram showing a first software license authorizing apparatus according to the present embodiment;
FIG. 9 is a block diagram showing a second software license authorizing apparatus according to the present embodiment;
FIG. 10 is a block diagram of a third software license authorizing apparatus according to the present embodiment;
FIG. 11 is a block diagram showing a fourth software license authorizing apparatus according to the present embodiment;
FIG. 12 is a block diagram showing a fifth software license authorizing apparatus according to the present embodiment;
FIG. 13 is a block diagram showing a sixth software license authorizing apparatus according to the present embodiment;
Fig. 14 is an internal structural diagram of the computer device provided in the present embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
The software license authorization method provided by the embodiment of the application can be applied to an application environment shown in fig. 1. The devices 101-104 are devices in the same lan, and different devices may interact through lan communication, for example, may interact through socket communication. The present embodiment may divide the devices 101-104 into devices to be authorized and authorized devices based on whether the devices have obtained the software license of the target software, in one embodiment, the devices 101 and 102 in fig. 1 are authorized devices, and the devices 103 and 104 are devices to be authorized. The device to be authorized in the local area network can perform authorized login through the authorized device. For example, taking the device 101 as an authorized device and taking the device 104 as a device to be authorized as an example, the authorized device 101 receives a local authorization request for target software sent by the device to be authorized 104 in the local area network; wherein the local authorization request is sent by the device to be authorized 104 upon detecting the presence of an authorized device 101 in the local area network; the authorized device 101 verifies the authority of the device 104 to be authorized by carrying information carried by the local authorization request sent by the device 104 to be authorized; and in the case that the verification of the right representation passes, license authorization is performed for the target software of the device 104 to be authorized. The device to be authorized 104 and the authorized device 101 may be, but not limited to, various kinds of intelligent devices such as personal computers, notebook computers, smart phones, tablet computers, and the like.
In one embodiment, as shown in fig. 2, a method for authorizing software permissions is provided, where the method is applied to an authorized device for illustration, the method may include the following steps:
s201, receiving a local authorization request for target software sent by equipment to be authorized in a local area network; wherein the local authorization request is sent by the device to be authorized upon detecting the presence of an authorized device in the local area network.
The local area network is a private network and is a local area network formed by local areas, and the authorized equipment and the equipment to be authorized belong to the same local area network, and the equipment in the local area network are communicated through a socket; the device to be authorized refers to a device which is not authorized by the target software license; the authorized device is a device which has obtained the permission authorization of the target software and can normally use the target software; the local authorization request of the target software refers to a local request instruction sent by the device to be authorized to the authorized device when the software license requirement of the target software exists.
Optionally, the authorized device in this embodiment may receive, based on the lan communication manner, a local authorization request for the target software sent by the device to be authorized in the lan. The communication mode of the local area network adopts but is not limited to socket communication.
S202, verifying the authority of the equipment to be authorized according to the information carried by the local authorization request.
Where rights verification refers to licensing authorization verification. The information carried by the local authorization request of the target software comprises the identity of the device to be authorized. The identity of the device to be authorized may be, but not limited to, a MAC address or a customized unique identity code.
An alternative implementation manner of this embodiment is as follows: tracking and acquiring the identity of equipment to be authorized, which sends the local authorization request, according to the information carried by the local authorization request, matching the acquired identity of the equipment to be authorized with an authorized identity list of authorized equipment so as to perform authority verification, and if the matching is successful, indicating that the authority verification is passed; if the matching fails, the authority verification fails. The authorized identity list records the identities of all the authorized devices.
Another alternative implementation of this embodiment is: analyzing the information carried by the local authorization request, acquiring verification information carried by the local authorization request of the target software, and verifying the verification information by the authorized equipment, for example, matching the verification information with the verification information of the authorized equipment stored in the authorized equipment, and if the matching is successful, indicating that the authority verification is passed; if the matching fails, the authority verification fails. The verification information may be, but is not limited to, identity, account information, user information, etc. of the device to be authorized.
And S203, performing license authorization for the target software of the equipment to be authorized under the condition that the result of the authority verification represents that the verification passes.
An alternative implementation manner of this embodiment is as follows: and under the condition that the verification of the authority is passed by the characterization verification of the result of the authority, the authorized equipment carries out license authorization on the target software of the equipment to be authorized, which sends the local authorization request, specifically, a temporary authorization file can be generated by the authorized equipment and is sent to the equipment to be authorized, which passes the verification, so as to realize license authorization on the target software of the equipment to be authorized.
Another alternative implementation of this embodiment is: and under the condition that the result of the authority verification represents that the verification passes, the authorized equipment sends the identity (such as the MAC address) of the equipment to be authorized, which sends the local authorization request, to the authority manager, and the authority manager performs software license authorization on the equipment to be authorized according to the identity of the equipment to be authorized. Wherein the rights manager may be a software provider.
In the software license authorization method in the embodiment, only one device is required to obtain license authorization of target software, so that the target software of other devices to be authorized in the local area network can be licensed and authorized as authorized devices, one authorization is realized, the trust transfer effect of the platform authorization is realized, the authority manager is not required to take charge of all software license authorization matters, the software license efficiency is improved, and the labor cost in software license authorization is also reduced.
In one embodiment, to limit the number of devices licensed through, as shown in fig. 3, S202 is an alternative implementation, including:
s301, starting.
S302, obtaining the authorization limit of the target software; in the case that the authorization limit exists in the authorization limit characterization, S303 is executed; in case the authorization credit token does not have an authorization credit, 304 is performed.
The authorization limit refers to a limit that can authorize the target software by software license, and can be set by the authority manager.
Optionally, in this embodiment, an authorization limit of the target software is preset, when a local authorization request of the target software sent by the device to be authorized is received, the authorized device determines whether the target software has an authorization limit, if the authorization limit has reached an upper limit, it characterizes that the authorization limit does not exist, and if the authorization limit still exists, the authorization verification is not executed, and if the authorization limit still exists, S303 is executed.
It should be noted that, in this embodiment, if the authorization limit has reached the upper limit, the user is informed that the authorization limit has reached the upper limit.
S303, executing a permission verification step for the device to be authorized according to the local authorization request under the condition that the authorization limit exists in the authorization limit characterization.
In this embodiment, the process of performing authority verification on the device to be authorized according to the local authorization request of the target software has been described in detail in the foregoing embodiment, which is not described in detail herein.
S304, if the authorization limit does not exist in the authorization limit characterization, the authority verification is not executed.
On the basis of the above embodiment, in order to facilitate the judgment of the authorization limit of the target software, after the license authorization is performed on the target software of the device to be authorized, the authorization limit of the target software is adjusted, and the adjusted authorization limit is synchronized to other authorized devices in the local area network. Specifically, after the authorized device performs license authorization for the target software of the device to be authorized, 1-subtracting and updating the authorization limit, and synchronously updating the updated authorization limit of the target software to other authorized devices, so that when the authorized device receives a local authorization request of the target software, whether the authorization limit exists or not is judged based on the updated authorization limit of the target software.
Before performing authority verification, the embodiment determines the authorization limit, if the authorization limit of the target software does not reach the upper limit, then performs subsequent authority verification, and performs authorization on the device to be authorized based on the authorization limit and the authority verification, so that the software license authorization method is more strict and reasonable.
In one embodiment, in order to improve the efficiency of performing authority verification on a device to be authorized, as shown in fig. 4, an alternative implementation manner of S202 includes:
s401, matching login user information carried by the local authorization request with the authorized user information of the target software.
The login user information refers to account information input when logging in the target software, and the account information can be, but is not limited to, user identity information, a custom character segment, or device hardware information. The authorized user information refers to preset login user information which can be granted with authority.
Optionally, in this embodiment, the information of the authorized user of the local area network is preset and stored, when the authorized device receives the local authorization request sent by the device to be authorized, the login user information carried by the local authorization request is obtained by parsing, and the login user information is matched with the preset information of the authorized user of the local area network. The local authorization request carries login user information.
S402, verifying the authority of the equipment to be authorized according to the matching result.
Optionally, in this embodiment, if the authorized user information matched with the login user information exists in the authorized user information of the target software, the matching is successful, and the authority verification of the device to be authorized is passed; if the authorized user information matched with the login user information does not exist in the authorized user information of the local area network, the matching fails, and the authority verification of the equipment to be authorized is not passed.
According to the embodiment, the authorized user information of the target software is preset, and when the authority is verified, only the login user information and the authorized user information of the target software are required to be matched, so that the authority verification is realized, and the efficiency of the authority verification is improved.
In one embodiment, in the case where the authorized device is a rights manager for which the license authorization of the target software is performed, as shown in fig. 5, the software license authorization method of the present embodiment further includes:
s501, receiving a local authorization request for target software sent by equipment to be authorized in a local area network; wherein the local authorization request is sent by the device to be authorized upon detecting the presence of an authorized device in the local area network.
S502, verifying the authority of the equipment to be authorized according to the local authorization request.
And S503, performing license authorization for the target software of the equipment to be authorized under the condition that the result of the authority verification represents that the verification passes.
And S504, summarizing the equipment hardware information of all authorized equipment in the local area network to obtain hardware summarizing information.
The device hardware information refers to a unique identifier of the device hardware, including but not limited to a MAC address, a CPU serial number, a disk serial number, a BIOS serial number, etc., for the rights manager to identify which machine; the rights manager may be a software vendor; the root authority device refers to a device which is authorized by the authority manager to license software, and is also the first authorized device in the local area network.
The execution body of the embodiment is a device authorized by the authority manager in the local area network, that is, the first authorized device (i.e. the root authority device) in the local area network, and after the root authority device performs authority verification on the device to be authorized, the root authority device needs to collect the hardware information of the device to be authorized, so as to obtain the hardware collection information.
Specifically, when the device hardware information of the device to be authorized is summarized, not only the device hardware information of the authorized device verified by the root authority device, but also the device hardware information of the authorized device verified by other authorized devices in the local area network are summarized.
The root authority device needs to be described, and an optional implementation manner of license authorization of the target software of the root authority device is as follows: and transmitting the device hardware information (such as a MAC address) of the root authority device to the authority management party, performing license authorization for the target software of the root authority device by the authority management party, transmitting the authorization limit to the root authority device, and subsequently transmitting the device hardware information of the device to be authorized to the authority management party by the root authority device after the target software of the device to be authorized is licensed and authorized. And when the root authority equipment fails, re-selecting one piece of equipment from other authorized equipment as the root authority equipment, and executing the work of the root authority equipment.
And S505, the hardware summary information is sent to a rights manager, so that the rights manager can issue an authorized license certificate for authorized equipment based on the hardware summary information.
An alternative implementation manner in this embodiment is as follows: the execution body of the embodiment is a device authorized by the authority manager in the local area network, namely a root authority device, and the root authority device sends the hardware summary information to the authority manager in a wired or wireless communication mode.
It should be noted that, the hardware summary information of the authorized devices needs to be synchronized to all authorized devices in the lan.
One of the purposes of sending the hardware summary information to the rights manager in this embodiment is to let the rights manager know the device hardware information of the authorized device, and the other purpose is that the authorized device that has just been licensed and authorized is only temporarily licensed and authorized, and has no license file (e.g., license file), and the rights manager sends the license file to the authorized device through the device hardware information (e.g., MAC address) of the authorized device.
In one embodiment, as shown in fig. 6, the embodiment of the present application further provides a method for authorizing software license, where the method is performed by a device to be authorized in a local area network, and includes the following steps:
S601, detecting whether authorized equipment exists in the local area network.
The authorized device is a device which has obtained the license authorization of the target software and can normally use the target software.
An alternative implementation manner in this embodiment is as follows: the device to be authorized may send detection information (e.g., broadcast information) directly to other devices within the local area network via the local area network to detect whether an authorized device is present. Specifically, the device to be authorized can directly send broadcast information to other devices in the local area network through the local area network, and after receiving the broadcast information, the device in the local area network can reply to feedback information, and whether the authorized device exists is determined according to the feedback information. The broadcast information records whether the affiliated device is an authorized device, and the feedback information only needs to record yes or no, if yes, the device for sending the feedback information is indicated to be the authorized device, and if no, the device for sending the feedback information is indicated to be the device to be authorized.
Another alternative implementation manner in this embodiment is as follows: the device to be authorized may send a detection request to a superior device (e.g., a rights manager device) to cause the superior device to feed back information of whether or not there is an authorized device.
Yet another alternative implementation manner in this embodiment is as follows: obtaining login user information or equipment hardware information of the designated equipment in the local area network, matching the login user information or equipment hardware information of the designated equipment with login user information or equipment hardware information of authorized equipment in a database, if the matching is successful, indicating that the designated equipment is authorized equipment, and if the matching is failed, indicating that the designated equipment is equipment to be authorized.
S602, in the case that the authorized device exists in the local area network, a local authorization request for the target software is sent to the authorized device, so that the authorized device can license and authorize the target software based on the information carried by the local authorization request.
In this embodiment, a local authorization request of the target software is sent to the authorized device, and an optional implementation manner is as follows: if the number of the authorized devices in the local area network is 1, directly sending a target software local authorization request to the authorized devices so that the authorized devices can perform software license authorization on the devices to be authorized based on the target software local authorization request.
Another alternative embodiment is: if the number of authorized devices in the local area network is at least two; determining a target device from the at least two authorized devices; a target software local authorization request is sent to a target device.
An optional implementation manner of determining the target device from at least two authorized devices in this embodiment is: and selecting an authorized device with the earliest authorization time from at least two authorized devices as a target device according to the authorization time.
Another alternative implementation manner of determining the target device from at least two authorized devices in this embodiment is as follows: and determining the target device from at least two authorized devices in a random selection mode.
A further alternative implementation manner of determining the target device from at least two authorized devices in this embodiment is as follows: the login user information or the device hardware information of the authorized device is acquired, the target device is determined from at least two authorized devices according to the login user information or the device hardware information of the authorized device, for example, the authorized device which generates communication is determined according to the login user information or the device hardware information of the authorized device, and then the target device is determined from at least two authorized devices.
After the target device is determined, a local authorization request carrying login user information is generated, and the local authorization request is sent to the target device, so that the target device can license and authorize target software of the device to be authorized based on the local authorization request. The implementation manner of performing license authorization for the target software of the device to be authorized based on the local authorization request is described in detail in the above embodiment, and is not described again.
In the embodiment, when the device to be authorized requests the license authorization of the target software, only a local authorization request is sent to the authorized device, the authorized device carries out the license authorization of the target software of the device to be authorized, and the license authorization of the target software is not required to be carried out by the rights manager, so that the labor cost is reduced when the software license is authorized.
Optionally, in this embodiment, the local device generates an external authorization request carrying the local device hardware information, and sends the external authorization request to the rights management party, so that the rights management party analyzes the external authorization request to obtain the local device hardware information, matches the local device hardware information with the device hardware information table, and if the matching is possible, performs software license authorization for the device to be authorized. Wherein the list of device hardware information may be provided to the rights manager by the software consumer.
It should be noted that, in this embodiment, device hardware information of one or more devices in the local area network is sent to the rights manager in advance, so that the rights manager gathers and forms a device hardware information table.
In one embodiment, if it is detected that the authorized device does not exist in the local area network, an external authorization request for the target software is sent to the rights manager, so that the rights manager can rapidly license and authorize the target software for the device to be authorized based on information carried by the external authorization request. The information carried by the external authorization request comprises the hardware information of the local equipment.
In one embodiment, fig. 7 is a signaling diagram of a software license authorizing method in one embodiment, mainly describing interaction between a device to be authorized and an authorized device, and performing license authorization on the device to be authorized, where the method includes the following steps:
s701, detecting whether authorized equipment exists in a local area network by equipment to be authorized; if so, executing, S703; if not, S702 is performed.
S702, an external authorization request for the target software is sent to the rights management side, so that the rights management side can carry out license authorization of the target software for the device to be authorized based on information carried by the external authorization request.
S703, the device to be authorized sends a local authorization request for the target software to the authorized device.
S704, the authorized device receives a local authorization request for target software sent by the device to be authorized in the local area network. Wherein the local authorization request is sent by the device to be authorized upon detecting the presence of an authorized device in the local area network.
S705, the authorized device obtains the authorization limit of the target software. Stopping authority verification under the condition that the authorization limit does not exist in the authorization limit characterization; in case the authorization credit token exists, S706 is performed.
S706, matching the login user information carried by the local authorization request with the authorized user information of the target software.
And S707, the authorized device performs authority verification on the device to be authorized according to the matching result.
And S708, performing license authorization for the target software of the device to be authorized by the authorized device under the condition that the result of the permission verification represents that the verification passes.
S709, the authorized device adjusts the authorization limit of the target software, and synchronizes the adjusted authorization limit to other authorized devices in the local area network.
S7010, the authorized equipment which is authorized by the authority management side for the permission of the target software thereof gathers the equipment hardware information of all authorized equipment in the local area network to obtain hardware gathering information.
S7011, the hardware summary information is sent to the rights manager, so that the rights manager issues an authorized license for the device to be authorized based on the hardware summary information.
In the embodiment, only one device is required to obtain the license authorization of the target software in the same local area network, and the target software of other devices to be authorized in the local area network can be licensed and authorized as authorized devices, so that one authorization is realized, the trust transfer effect of the platform authorization is realized, the authority manager is not required to take charge of all software license authorization matters, the software license efficiency is improved, and the labor cost during the software license authorization is also reduced.
It should be understood that, although the steps in the flowcharts related to the above embodiments are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides a software license authorizing device for realizing the above related software license authorizing method. The implementation of the solution provided by the apparatus is similar to the implementation described in the software license authorization method of the authorized device, so the specific limitations in the embodiments of the one or more software license authorization apparatuses provided below can be referred to the above limitations of the software license authorization method, and will not be repeated here.
In one embodiment, as shown in fig. 8, there is provided a software license authorizing apparatus 1, the apparatus including:
the receiving module 11 is configured to receive a local authorization request for target software sent by a device to be authorized in the local area network; wherein the local authorization request is sent by the device to be authorized in case that the presence of an authorized device in the local area network is detected;
the verification module 12 is configured to verify the authority of the device to be authorized according to the information carried by the local authorization request;
and the authorization module 13 is used for performing license authorization on the target software of the equipment to be authorized under the condition that the result of the permission verification represents that the verification passes.
In one embodiment, for authorization credit verification, as shown in fig. 9, on the basis of fig. 8, the verification module 12 further includes:
an obtaining unit 121, configured to obtain an authorization limit of the target software;
the first verification unit 122 is configured to perform a permission verification step according to the local authorization request on the device to be authorized, where the authorization line exists in the authorization line representation.
In one embodiment, as shown in fig. 8, the authorization module 13 is further specifically configured to: and adjusting the authorization limit of the target software, and synchronizing the adjusted authorization limit to other authorized devices in the local area network.
In one embodiment, to improve accuracy of authority verification, as shown in fig. 11, on the basis of fig. 8 above, the verification module 12 further includes:
and the matching unit 123 is configured to match login user information carried by the local authorization request with the authorized user information of the target software.
And the second verification unit 124 is configured to perform authority verification on the device to be authorized according to the matching result.
In one embodiment, as shown in fig. 11, on the basis of fig. 8, the software license authorizing apparatus in this embodiment further includes:
and the summarizing module 14 is configured to summarize device hardware information of all authorized devices in the local area network to obtain hardware summarizing information if the authorized device is a permission manager for which permission authorization of the target software is performed.
The first sending module 15 sends the hardware summary information to the rights manager, so that the rights manager can issue an authorized license certificate for the device to be authorized based on the hardware summary information.
The respective modules in the above-described software license granting device may be implemented in whole or in part by software, hardware, and a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
Based on the same inventive concept, the embodiment of the application also provides a software license authorizing device for realizing the above related software license authorizing method. The implementation scheme of the solution to the problem provided by the device is similar to the implementation scheme described in the software license authorization method of the device to be authorized, so the specific limitation in the embodiment of the software license authorization device provided below can be referred to the limitation of the software license authorization method hereinabove, and will not be repeated here.
In one embodiment, as shown in fig. 12, the present embodiment provides a software license authorizing apparatus 2, including:
a detection module 21, configured to detect whether an authorized device exists in the local area network;
the first sending module 22 is configured to send, if the local authorization request for the target software exists, to the authorized device, so that the authorized device performs license authorization for the target software based on the information carried by the local authorization request.
In one embodiment, as shown in fig. 13, a software license authorizing apparatus 2 further includes: and the second sending module 23 is configured to send an external authorization request for the target software to the rights manager if it is detected that the authorized device does not exist in the local area network, so that the rights manager performs license authorization of the target software for the device to be authorized based on information carried by the external authorization request.
In one embodiment, the information carried by the external authorization request includes native device hardware information.
The respective modules in the above-described software license granting device may be implemented in whole or in part by software, hardware, and a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, and the internal structure of which may be as shown in fig. 14. The computer device includes a processor, a memory, an Input/Output interface (I/O) and a communication interface. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface is connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is for storing spectral signature data. The input/output interface of the computer device is used to exchange information between the processor and the external device. The communication interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a terminal communication method.
It will be appreciated by those skilled in the art that the structure shown in fig. 14 is merely a block diagram of a portion of the structure associated with the present application and is not limiting of the computer device to which the present application applies, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided comprising a memory and a processor, the memory having stored therein a computer program, the processor when executing the computer program performing the steps of:
receiving a local authorization request aiming at target software and sent by equipment to be authorized in a local area network; wherein the local authorization request is sent by the device to be authorized in case that the presence of an authorized device in the local area network is detected;
performing authority verification on the equipment to be authorized according to the information carried by the local authorization request;
and under the condition that the result of the authority verification represents that the verification passes, license authorization is carried out for the target software of the equipment to be authorized.
In one embodiment, the processor when executing the computer program further performs the steps of: before verifying the authority of the equipment to be authorized according to the information carried by the local authorization request, the method further comprises the following steps:
Acquiring the authorization limit of the target software;
executing a permission verification step for the equipment to be authorized according to the local authorization request under the condition that the authorization limit exists in the authorization limit characterization;
correspondingly, after license authorization is performed for the target software of the device to be authorized, the method further comprises:
and adjusting the authorization limit of the target software, and synchronizing the adjusted authorization limit to other authorized devices in the local area network.
In one embodiment, the processor when executing the computer program further performs the steps of: the information carried by the local authorization request comprises login user information; performing authority verification on equipment to be authorized according to information carried by a local authorization request, including:
matching login user information carried by the local authorization request with the authorized user information of the target software;
and verifying the authority of the equipment to be authorized according to the matching result.
In one embodiment, the processor when executing the computer program further performs the steps of: the method further comprises the steps of:
if the authorized equipment is the permission authority of the target software, summarizing the equipment hardware information of all the authorized equipment in the local area network to obtain hardware summarizing information;
And sending the hardware summary information to the authority management party.
In one embodiment, there is also provided another computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
detecting whether authorized equipment exists in the local area network;
if so, a local authorization request for the target software is sent to the authorized device, so that the authorized device can carry out license authorization of the target software for the authorized device based on the information carried by the local authorization request.
In one embodiment, the processor when executing the computer program further performs the steps of:
if no authorized device exists in the local area network, an external authorization request for the target software is sent to the authority management party, so that the authority management party can carry out permission authorization of the target software for the device to be authorized based on information carried by the external authorization request.
In one embodiment, the processor when executing the computer program further performs the steps of: the information carried by the external authorization request comprises the hardware information of the local equipment.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of:
Receiving a local authorization request aiming at target software and sent by equipment to be authorized in a local area network; wherein the local authorization request is sent by the device to be authorized in case that the presence of an authorized device in the local area network is detected;
performing authority verification on the equipment to be authorized according to the information carried by the local authorization request;
and under the condition that the result of the authority verification represents that the verification passes, license authorization is carried out for the target software of the equipment to be authorized.
In one embodiment, the computer program when executed by the processor further performs the steps of: before verifying the authority of the equipment to be authorized according to the information carried by the local authorization request, the method further comprises the following steps:
acquiring the authorization limit of the target software;
executing a permission verification step for the equipment to be authorized according to the local authorization request under the condition that the authorization limit exists in the authorization limit characterization;
correspondingly, after license authorization is performed for the target software of the device to be authorized, the method further comprises:
and adjusting the authorization limit of the target software, and synchronizing the adjusted authorization limit to other authorized devices in the local area network.
In one embodiment, the computer program when executed by the processor further performs the steps of: the information carried by the local authorization request comprises login user information; performing authority verification on equipment to be authorized according to information carried by a local authorization request, including:
Matching login user information carried by the local authorization request with the authorized user information of the target software;
and verifying the authority of the equipment to be authorized according to the matching result.
In one embodiment, the computer program when executed by the processor further performs the steps of: the method further comprises the steps of:
if the authorized equipment is the permission authority of the target software, summarizing the equipment hardware information of all the authorized equipment in the local area network to obtain hardware summarizing information;
and sending the hardware summary information to the authority management party.
In one embodiment, there is also provided another computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of:
detecting whether authorized equipment exists in the local area network;
if so, a local authorization request for the target software is sent to the authorized device, so that the authorized device can carry out license authorization of the target software for the authorized device based on the information carried by the local authorization request.
In one embodiment, the computer program when executed by the processor further performs the steps of: if no authorized device exists in the local area network, an external authorization request for the target software is sent to the authority management party, so that the authority management party can carry out permission authorization of the target software for the device to be authorized based on information carried by the external authorization request.
In one embodiment, the computer program when executed by the processor further performs the steps of: the information carried by the external authorization request comprises the hardware information of the local equipment.
In one embodiment, a computer program product is provided comprising a computer program which, when executed by a processor, performs the steps of:
receiving a local authorization request aiming at target software and sent by equipment to be authorized in a local area network; wherein the local authorization request is sent by the device to be authorized in case that the presence of an authorized device in the local area network is detected;
performing authority verification on the equipment to be authorized according to the information carried by the local authorization request;
and under the condition that the result of the authority verification represents that the verification passes, license authorization is carried out for the target software of the equipment to be authorized.
In one embodiment, the computer program when executed by the processor further performs the steps of: before verifying the authority of the equipment to be authorized according to the information carried by the local authorization request, the method further comprises the following steps:
acquiring the authorization limit of the target software;
executing a permission verification step for the equipment to be authorized according to the local authorization request under the condition that the authorization limit exists in the authorization limit characterization;
Correspondingly, after license authorization is performed for the target software of the device to be authorized, the method further comprises:
and adjusting the authorization limit of the target software, and synchronizing the adjusted authorization limit to other authorized devices in the local area network.
In one embodiment, the computer program when executed by the processor further performs the steps of: the information carried by the local authorization request comprises login user information; performing authority verification on equipment to be authorized according to information carried by a local authorization request, including:
matching login user information carried by the local authorization request with the authorized user information of the target software;
and verifying the authority of the equipment to be authorized according to the matching result.
In one embodiment, the computer program when executed by the processor further performs the steps of: the method further comprises the steps of:
if the authorized equipment is the permission authority of the target software, summarizing the equipment hardware information of all the authorized equipment in the local area network to obtain hardware summarizing information;
and sending the hardware summary information to the authority management party.
In one embodiment, there is also provided another computer program product comprising a computer program which, when executed by a processor, performs the steps of:
Detecting whether authorized equipment exists in the local area network;
if so, a local authorization request for the target software is sent to the authorized device, so that the authorized device can carry out license authorization of the target software for the authorized device based on the information carried by the local authorization request.
In one embodiment, the computer program when executed by the processor further performs the steps of: the method further comprises the following steps:
if no authorized device exists in the local area network, an external authorization request for the target software is sent to the authority management party, so that the authority management party can carry out permission authorization of the target software for the device to be authorized based on information carried by the external authorization request.
In one embodiment, the computer program when executed by the processor further performs the steps of: the information carried by the external authorization request comprises the hardware information of the local equipment.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in the various embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the various embodiments provided herein may include at least one of relational databases and non-relational databases. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processors referred to in the embodiments provided herein may be general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic units, quantum computing-based data processing logic units, etc., without being limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples only represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the present application. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application shall be subject to the appended claims.

Claims (10)

1. A method of software license authorization performed by an authorized device in a local area network, the method comprising:
receiving a local authorization request aiming at target software, which is sent by equipment to be authorized in the local area network; wherein the local authorization request is sent by the device to be authorized upon detecting the presence of the authorized device in the local area network;
Performing authority verification on the equipment to be authorized according to the information carried by the local authorization request;
and under the condition that the result of the authority verification represents that the verification passes, license authorization is carried out on the target software of the equipment to be authorized.
2. The method according to claim 1, wherein before performing rights verification on the device to be authorized according to the information carried by the local authorization request, the method further comprises:
acquiring the authorization limit of the target software;
executing the step of verifying the authority of the equipment to be authorized according to the local authorization request under the condition that the authorization limit exists in the authorization limit characterization;
correspondingly, after license authorization is performed for the target software of the device to be authorized, the method further comprises:
and adjusting the authorization limit of the target software, and synchronizing the adjusted authorization limit to other authorized devices in the local area network.
3. The method according to claim 1 or 2, wherein the information carried by the local authorization request comprises login user information; the authority verification of the equipment to be authorized according to the information carried by the local authorization request comprises the following steps:
Matching the login user information carried by the local authorization request with the authorized user information of the target software;
and carrying out authority verification on the equipment to be authorized according to the matching result.
4. The method according to claim 1, wherein the method further comprises:
if the authorized equipment is the permission authority of the target software, summarizing the equipment hardware information of all authorized equipment in the local area network to obtain hardware summarizing information;
and sending the hardware summary information to the authority management party.
5. A method of software license authorization performed by a device to be authorized in a local area network, the method comprising:
detecting whether authorized equipment exists in the local area network;
if so, a local authorization request for target software is sent to the authorized equipment, so that the authorized equipment can carry out license authorization of the target software for the authorized equipment based on the information carried by the local authorization request.
6. The method as recited in claim 5, further comprising:
if no authorized device exists in the local area network, an external authorization request aiming at the target software is sent to a right management party, so that the right management party can carry out permission authorization of the target software for the device to be authorized based on information carried by the external authorization request.
7. The method of claim 6, wherein the information carried by the external authorization request comprises native device hardware information.
8. A software licensing authority characterized by an authorized device configured in a local area network, the apparatus comprising:
the receiving module is used for receiving a local authorization request aiming at target software, which is sent by equipment to be authorized in the local area network; wherein the local authorization request is sent by the device to be authorized in case that the authorized device is detected to be present in the local area network;
the verification module is used for carrying out authority verification on the equipment to be authorized according to the information carried by the local authorization request;
and the authorization module is used for carrying out license authorization on the target software of the equipment to be authorized under the condition that the result of the permission verification represents that the verification is passed.
9. A software licensing authorization apparatus, characterized by a device to be authorized configured in a local area network, the apparatus comprising:
the detection module is used for detecting whether authorized equipment exists in the local area network;
and the sending module is used for sending a local authorization request aiming at the target software to the authorized equipment if the local authorization request exists, so that the authorized equipment can carry out permission authorization of the target software for the authorized equipment based on the information carried by the local authorization request.
10. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any one of claims 1 to 4 or 5 to 8 when the computer program is executed.
CN202310347502.0A 2023-04-03 2023-04-03 Software license authorization method, device and equipment Pending CN116522291A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310347502.0A CN116522291A (en) 2023-04-03 2023-04-03 Software license authorization method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310347502.0A CN116522291A (en) 2023-04-03 2023-04-03 Software license authorization method, device and equipment

Publications (1)

Publication Number Publication Date
CN116522291A true CN116522291A (en) 2023-08-01

Family

ID=87389449

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310347502.0A Pending CN116522291A (en) 2023-04-03 2023-04-03 Software license authorization method, device and equipment

Country Status (1)

Country Link
CN (1) CN116522291A (en)

Similar Documents

Publication Publication Date Title
US11196572B2 (en) Blockchain-based content verification
US10762479B2 (en) Method and system for processing blockchain-based real-time transaction
WO2020048241A1 (en) Blockchain cross-chain authentication method and system, and server and readable storage medium
WO2019184135A1 (en) Application login method and apparatus, and computer device and storage medium
US8997198B1 (en) Techniques for securing a centralized metadata distributed filesystem
TWI667586B (en) System and method for verifying changes to uefi authenticated variables
CN107948152B (en) Information storage method, information acquisition method, information storage device, information acquisition device and information acquisition equipment
WO2016095739A1 (en) Apparatus authentication method and device
US20170346797A1 (en) Detecting compromised credentials
US10270757B2 (en) Managing exchanges of sensitive data
US11658982B2 (en) Efficient authentication in a file system with multiple security groups
US20220286274A1 (en) Local ledger block chain for secure updates
AU2012101559B4 (en) Device identification using synthetic device keys
US10176307B2 (en) Licensing using a node locked virtual machine
WO2019013773A1 (en) Secure token passing via blockchains
EP3961458B1 (en) Blockchain-based service processing methods, apparatuses, devices, and storage media
US20220247731A1 (en) Secure communication between an intermediary device and a network
CN111131144B (en) IoT (Internet of things) equipment management method, device, server and storage medium
CN111988262B (en) Authentication method, authentication device, server and storage medium
US11568091B2 (en) Method and system for integrity protected distributed ledger for component certificate attestation
CN114428661A (en) Mirror image management method and device
CN112422516A (en) Connection method and device of power system, computer equipment and storage medium
CN116522291A (en) Software license authorization method, device and equipment
CN112445705B (en) Software running system, method and device based on trusted verification and computer equipment
CN109923525B (en) System and method for performing a secure backup operation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination