CN103390122B - Application program transmitting method, application program operating method, sever and terminal - Google Patents
Application program transmitting method, application program operating method, sever and terminal Download PDFInfo
- Publication number
- CN103390122B CN103390122B CN201210142208.8A CN201210142208A CN103390122B CN 103390122 B CN103390122 B CN 103390122B CN 201210142208 A CN201210142208 A CN 201210142208A CN 103390122 B CN103390122 B CN 103390122B
- Authority
- CN
- China
- Prior art keywords
- application program
- digital certificate
- terminal
- embedded
- delegated strategy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an application program transmitting method, an application program operating method, a sever and a terminal. The application program transmitting method disclosed by the invention comprises the steps of receiving information of a request made by the terminal for downloading an application program; when the terminal successfully pays the charge, embedding one or a plurality of identity information and authorization policies into a digital certificate according to the transaction information of the terminal; and jointly transmitting the digital certificate embedded with the identity information and the authorization policies to the terminal. The method and the device disclosed by the invention can specifically configure application program authorization policies in application program copyright protection, support modes such as application program trial use, delegation and presentation, and meet the demands of operators.
Description
Technical field
The application is related to application program sending method, application program operation method, server and terminal.
Background technology
In the protection mechanism of existing digital content (including application program), compare main flow is based on DRM (Digital
Rights Management, Digital Right Management technology) copyright protection regime.DRM copyright protection regimes are applied and are applying journey
Juche idea in sequence copyright protection is:
Initially set up application program authorization center.For the application program to be downloaded, it is possible to use key (Key) carries out adding
Privacy protection, the digital content head of encryption deposits the URL at KeyID and Content-Authorize center.User prepare install and use when,
According to the KeyID and URL information of content headers, it is possible to send correlation after the checking of digital content authorization center is authorized
Secret key decryption, third party application can installation and operation.
Need third party application to be protected encrypted, even if downloaded by user preserving, be not applied in mandate
The checking mandate of the heart also cannot be installed, so as to closely protect the copyright of content.Key typically has two, and one public key
(public key), one private key (private key).Public key is used to encrypt application content itself, and private key is used to decrypt content,
Private key is also prevented from when content headers have the situation for being altered or destroying, so as to prevent using key it may determine that out
Content is illegally used.
Protected third party application is used traditional DRM content copyright protection the private of corresponding content issuer
Key is signed and is encrypted, and mobile terminal itself downloads authority (rights object), authority from business platform
In include public key.Authority is stored in mobile terminal locally or obtains from network when using every time, and public key therein can
Encryption application program to downloading is decrypted and signature verification, so as to reach the effect of copyright protection.
Relational dependence is customized in the shortcoming of authority to application program in order to be directed to traditional DRM scheme, can be made
Authority is stored in the card memory appts such as SD card, SIM in the form of digital certificate, so as to realize authorizing with user in difference
The migration of equipment room and migrate.But, whether allow for the form of authorisation of application program is generally only authorized in existing scheme
And two dimensions of licensing term, and authority is still bundled in single user, it is impossible to met that such as application program is on probation, turned
Authorize, give isotype, it is impossible to meet the demand of operator.
The content of the invention
Form of authorisation is simplified in order to solve the problems, such as existing application Copyright protection scheme, present applicant proposes one
Plant application program sending method, application program operation method, server and terminal.
According to the one side of the application, it is proposed that a kind of application program sending method, it may include:Under receiving terminal request
Carry the message of application program;In terminal payment success, according to the Transaction Information of the terminal, by multiple identity informations and
Delegated strategy is embedded in digital certificate;And by the digital certificate and the application program of embedded identity information and delegated strategy together
It is sent to the terminal.
According to further aspect of the application, it is proposed that a kind of application program operation method, it may include:Terminal receives application
The digital certificate of program and embedded multiple identity informations and delegated strategy;The body being embedded in the digital certificate that end-on is received
Part information and delegated strategy are authenticated;And when certification passes through, the application journey that terminal is received according to delegated strategy operation
Sequence.
According to the another aspect of the application, it is proposed that a kind of server, it may include:Receiver module, receiving terminal request
Download the message of application program;Logging modle, in terminal payment success, records the Transaction Information of the terminal;Writing module,
According to the Transaction Information of logging modle record, by multiple identity informations and the embedded digital certificate of delegated strategy;And sending module,
The digital certificate and the application program of embedded identity information and delegated strategy are sent jointly to into the terminal.
According to another aspect of the application, it is proposed that a kind of terminal, it may include:Receiver module, receive application program with
And the digital certificate of embedded multiple identity informations and delegated strategy;Authentication module, to the body being embedded in the digital certificate that receives
Part information and delegated strategy are authenticated;And operation module, when authentication module certification passes through, connect according to delegated strategy operation
The application program for receiving.
By the present processes and device, can to protecting using copyright of program in application program delegated strategy carry out
Concrete configuration, so as to supporting such as application program on probation, sublicense, giving isotype, meets the demand of operator.
Description of the drawings
Fig. 1 is the flow chart of the application program sending method according to one embodiment of the application;
Fig. 2 is the structural representation of the digital certificate of the X.509 form according to the application specific embodiment;
Fig. 3 is the flow chart of the application program operation method according to one embodiment of the application;
Fig. 4 is the block diagram of the server according to one embodiment of the application;
Fig. 5 is the block diagram of the terminal according to one embodiment of the application;And
Fig. 6 is the block diagram of the terminal according to one embodiment of the application.
Specific embodiment
With reference to the accompanying drawings, the embodiment of the application is described in detail.
Fig. 1 shows the application program sending method according to one embodiment of the application.As shown in figure 1, in step
The message of application program is downloaded in S1002, receiving terminal request.Although it is not shown in the diagrams, it is to be understood that, the user of terminal is sending out
Before sending download request, may have been completed that the purchase to application program is operated, and successful payment.At this moment, server side can
Record has and the purchase corresponding Transaction Information of operation, wherein may include one or more identity informations and authorize plan accordingly
Slightly.
Referring next to Fig. 1, in step S1004, when the terminal payment success of download request is sent, can be according to the terminal
Transaction Information, by one or more identity informations for wherein including and the embedded digital certificate of delegated strategy.Then, in step
S1006, the application program that the digital certificate and request that embedded in identity information and delegated strategy are downloaded is sent jointly to described
Terminal.It is appreciated that if terminal payment is unsuccessful, download request is rejected (not shown).
In the application program sending method shown in Fig. 1, due to embedded in one or more identity informations in digital certificate
And delegated strategy such that it is able to support such as application program on probation, sublicense, give isotype.Will be detailed below.
According to a specific embodiment of the application, the delegated strategy of embedded digital certificate may include for particular terminal
Application program authority levels, useful life and/or access times.
Specifically, the application program authority levels for certain terminal can be the full releases of such as application program or answer
Beta release with program etc..Can be specific time point or time period for the application program useful life of certain terminal,
Represent that the application program only can be installed in terminal and/or run before particular point in time or during special time period.
Maximum installation and/or number of run of the application program in terminal is represented for the application program access times of certain terminal.
As described above, delegated strategy can be terminal use determining during purchase applications are carried out, and paying
Record in Transaction Information after expense success.Because application program delegated strategy can be configured, therefore can preferably meet operation
Business and the demand of user.
Below by taking the digital certificate of common X.509 form as an example, describe in detail and identity information is embedded in digital certificate
With the mode of delegated strategy.
Fig. 2 shows the structural representation that identity information and delegated strategy are embedded in the digital certificate of X.509 form.Such as
Shown in Fig. 2, using extension (extension) field in the X.509 digital certificate of form identity information and mandate are embedded in
Strategy.
X.509 each entry of the extended field of the digital certificate of form includes three domains:Expansion type, expanding value and pass
Bonded state is indicated.The extended field that String types can be used in this specific embodiment is stored with XML descriptions with regard to application
One or more identity informations of program and delegated strategy.
Specifically, in digital certificate as shown in Figure 2, extended field contains copyright authorization description information:Extension word
The String of section identifies this extended field is a character string, the key mark field references level of this copyright authorization information
Not, expanding value denotes specific application program authorization message.It is angry that in this embodiment expanding value is denoted for application name ID
Two copyright authorization informations of bird third party applications:Auth1 marks license to the repertoire of the application program
IMSI summaries are the user of abcdef, and licensing term is permanent.Auth2 marks can represent that an application program is given or application turns
The authorization message of mandate, i.e. user abcdef purchase using when obtain simultaneously the application be assigned on December 31st, 2011
Or give and give good friend using the application program experience authority of 20 times (IMSI is designated the user of bcdefg).
After the corresponding authorization message extended field defined in X.509 digital certificate, the publisher of application program can be with
In the conventional mode, when to specific user's release application program, using X.509 digital certificate to third party application
Verified and signed, the content that the third party application bag of issue is finally included is included:Application programs body, apply journey
Digital certificate and the signature using the digital certificate signed and issued to application program program body that sequence publisher signs and issues.
In the present embodiment, introduce in publisher's certificate using the IMSI number and authority information of application user so that
Needed to generate different application installation packages for different users before application is provided to user's download using publisher, being should
Some extra loads are brought with the server of publisher.For such case, due to the signature process of application program it is most complicated
Computing be to use publisher's certificate to the bag digest calculations in program body signature process, therefore can be in the clothes using publisher
In business device deployment, the dedicated computing instrument of digest algorithm is introduced in server side, to lift the efficiency of signature calculation, shorten user
Using the waiting time downloaded.
Specific embodiment according to Fig. 2, by two identity informations being embedded in digital certificate and for every
The different delegated strategies of the counterpart terminal of individual identity information, i.e., different authority levels, useful life or access times are capable of achieving
Application program is on probation, sublicense, give isotype, meets the demand of operator, and can be by the content to being embedded in digital certificate
Flexible configuration is carried out, more application program licensing modes are realized.
Referring next to Fig. 3, the application program operation method according to one embodiment of the application is described.
As shown in figure 3, in step S3002, terminal receive application program and embedded in one or more identity informations and
The digital certificate of delegated strategy.Then, in step S3004, in the digital certificate that end-on is received be embedded in identity information and
Delegated strategy is authenticated, and in step S3006, if certification passes through, the application that terminal is then received according to delegated strategy operation
Program.
Specifically, terminal is installed after obtaining the application comprising application program and digital certificate and doing program bag in program
When, the application installation service of terminal operating system can receive mount request, now, using installation service application can be first checked for
Digital certificate in program bag signs and issues mechanism's (not shown), if digital certificate is signed and issued for particular operator, carries out step
S3004, i.e. identity information and delegated strategy to being embedded in the digital certificate that receives are authenticated.If the numeral of application program
The nonspecific operator of certificate signs and issues, then proceed to that traditional checking flow process signs and issues application program the safety of mechanism and legitimacy is entered
Row checking, concrete processing mode can be adjusted flexibly according to enterprise security policy, be not described in detail herein.
Method according to Fig. 3, is authenticated by the identity information and delegated strategy that are embedded in digital certificate,
Such as application program on probation, sublicense can be supported, isotype is given, the demand of operator is met.
According to a specific embodiment, the delegated strategy in embedded digital certificate may include the application for particular terminal
The useful life of program.In this case, the identity information being embedded in the digital certificate that end-on is received and delegated strategy
The step of being authenticated can respectively include the certification to identity information and the certification to useful life.
Specifically, the certification of terminal-pair identity information can be that terminal reads locally stored identity information, using local
The identity information of storage is authenticated to the identity information being embedded in the digital certificate that receives.By the certification of identity information,
Can check whether application program has licensed to the user of this terminal.For example, this terminal SIM is read first using the service of installing
In IMSI number (for example can by operating system provide machine card interface reading SIM card in store IMSI information) plucked
Will, and checked with the IMSI number summary for including in digital certificate, represent if matching and pass through certification.
In addition, the certification of terminal-pair useful life can be, terminal reads locally stored temporal information, using locally depositing
The temporal information of storage is authenticated to the useful life in the delegated strategy that is embedded in the digital certificate that receives.Specifically, may be used
Judge whether useful life is expired, if not out of date, then it represents that certification passes through.
According to a specific embodiment, the delegated strategy in embedded digital certificate may include the application for particular terminal
The access times of program.In this case, the identity information being embedded in the digital certificate that end-on is received and delegated strategy
The step of being authenticated can respectively include the certification to identity information and the certification to access times.
Specifically, the certification of terminal-pair identity information can be that terminal reads locally stored identity information, using local
The identity information of storage is authenticated to the identity information being embedded in the digital certificate that receives.
In addition, the certification of terminal-pair access times can be, the number of times of application program is carried out described in terminal-pair local runtime
Access times in the delegated strategy that is embedded in the digital certificate that receives are authenticated by statistics using the number of times of statistics,
After reaching the experience number of times of reservation, the operation request of application program is prevented.
According to a specific embodiment, delegated strategy may include for terminal corresponding with one or more identity informations
Application program authority levels, useful life and access times.In this case, carried out recognizing identity information in terminal
After card, the certification to useful life and the certification to access times, application program authority levels that can be in delegated strategy
The application program that operation is received.Specifically, the application program authority levels in delegated strategy determine that application program is installed
And start-up parameter, and application program is installed with start-up parameter to run application program according to determined by.
In multiple specific embodiments described above, only the details different from existing digital certificate authentication process is entered
Go detailed description, in order to save space, eliminate the existing verification process of digital certificate.For example, it is in checking digital certificate
The no process issued by particular operator can be the mode of traditional certificate pairing, by the preset root certificate logarithm of terminal the machine
Word certificate is verified.Again for example, traditional mode can be used, the signature of application program is verified, its primary operational is
According to the legitimacy and integrity of the signature verification of the application package application program.
Specific embodiment by more than, can be realized various by being authenticated to the content for being embedded in digital certificate
Application program licensing mode.
Referring next to Fig. 4, the structure of the server according to one embodiment of the application is described.
As shown in figure 4, server 40 may include receiver module 402, logging modle 404, writing module 406 and sending module
408。
Receiver module 402 can receiving terminal request download application program message.Logging modle 404 can terminal payment into
During work(, the Transaction Information of the terminal is recorded.Writing module 404 can according to logging modle record Transaction Information, by one or
Multiple identity informations and the embedded digital certificate of the embedded digital certificate of delegated strategy.Sending module 408 can by embedded identity information and
The digital certificate of delegated strategy and the application program send jointly to the terminal.
Similarly, according to a specific embodiment, delegated strategy may include to be directed to and one or more identity informations pair
The application program authority levels of the terminal answered, useful life and/or access times.
According to a specific embodiment, in the digital certificate of X.509 form, writing module is in digital certificate extended field
In String types entry in, be embedded in XML format one or more identity informations and delegated strategy.
Fig. 5 and Fig. 6 show the structure of the terminal according to the application embodiment.
With reference first to Fig. 5, terminal 50 may include receiver module 502, authentication module 504 and operation module 506.Receiver module
502 can receive application program and be embedded in the digital certificate of one or more identity informations and delegated strategy.Authentication module 504 can
Identity information and delegated strategy to being embedded in the digital certificate that receives is authenticated.Operation module 506 can be in authentication module
When certification passes through, according to the application program that delegated strategy operation is received.
According to a specific embodiment, delegated strategy may include for terminal corresponding with one or more identity informations
Application program authority levels, useful life and/or access times.Fig. 6 shows the structure of terminal in this case.
As shown in fig. 6, terminal 60 may include receiver module 602, authentication module 604 and operation module 606, wherein, receive
Module 602 and operation module 606 are similar with the receiver module 502 shown in Fig. 5 and operation module 506, and here is omitted.
Authentication module 604 as shown in Figure 6 may particularly include:Identity information authentication ' unit 6042, useful life's certification list
Unit 6044 and access times authentication ' unit 6046.Wherein, identity information authentication ' unit 6042 can read locally stored identity letter
Breath, is authenticated using locally stored identity information to the identity information being embedded in the digital certificate that receives;Useful life
Authentication ' unit 6044 can read locally stored temporal information, using locally stored temporal information to the digital certificate that receives
In be embedded in delegated strategy in useful life be authenticated;Access times authentication ' unit 6046 can be to applying described in local runtime
The number of times of program is counted, using the number of times of statistics to the use time in the delegated strategy that is embedded in the digital certificate that receives
Number is authenticated.
According to a specific embodiment, in the terminal, the application that module 506 or 606 can be in delegated strategy is run
Program authorization rank determines that application program is installed and start-up parameter, and the application program according to determined by is installed and start-up parameter is come
Operation application program.
Below with a specific example, the application program for describing the application sends and operation method.
User have purchased application program, the entitled APP of program from using shop, and user's (IMSI summaries are abcdef) is
This application have purchased complete access right and try out for 20 times of another specified user's (IMSI summaries are bcdefa)
Authority.The application program for completing to buy the subsidiary Copyright Strategy certificate of server generation after operation is downloaded for user.So pacify in example
A Copyright Strategy of application program is addition of in full certificate, policy depiction is as follows:
Auth_1 identifies application APP and licenses to user of the IMSI summaries for abcdef in the delegated strategy, it is allowed to
Its without time limit unrestrictedly uses the application program.Auth_2 identifies application program and licenses to use of the IMSI summaries for bcdefa
Family, it is allowed to its before 31 days December in 2011, trial operation this application program 20 times.
After application package is downloaded and distributes.As terminal starts the operation for installing APP, systematic difference installs service
Intercept mount request INS_REQ of application.Security system is received after the request, starts the stream of copyright and integrity verification
Journey.
In copyright and integrity verification flow process, the installation kit of copyright and integrity verification subsystem extraction application program,
The certificate provided using publisher is therefrom parsed, whether the publisher for first verifying that the certificate is mechanism.If certificate
Publisher is verified, then read the Copyright Strategy added in safety certificate.
After reading certificate, the IMSI digest calculations of copyright and integrity verification subsystem and decision sub-module read the machine
The IMSI that stores in SIM is simultaneously compared after being made a summary with the abcdef in certificate, and the application program is reexamined after the match is successful
The time limit of mandate and authority, determine whether the application program can be installed on the mobile phone with this.
Can see from upper example, relative to the verification method in traditional copyright protection system based on document form, this
Application realizes flexibly matching somebody with somebody for application program mandate by the corresponding copyright authorization strategy of preset application program in digital certificate
Put and mobilism identification.
The exemplary embodiment of the application is described above by reference to accompanying drawing.Those skilled in the art should manage
Solution, the purpose that the embodiment above is merely to illustrate that and the example lifted, rather than for being limited.It is all in the application
Teaching and claims under any modification, the equivalent made etc., should be included in this application claims
In the range of.
Claims (11)
1. application program sending method, including:
The message of application program is downloaded in receiving terminal request;
In terminal payment success, according to the Transaction Information of the terminal, multiple identity informations and delegated strategy are embedded in
Digital certificate;And
The digital certificate and the application program of embedded identity information and delegated strategy are sent jointly to into the terminal;
Wherein, delegated strategy includes application program authority levels, the useful life for terminal corresponding with multiple identity informations
And/or access times;
The digital certificate is the digital certificate based on X.509 form,
Multiple identity informations and delegated strategy are included the step of being embedded in digital certificate:
In the entry of the String types in digital certificate extended field, multiple identity informations and the mandate of XML format are embedded in
Strategy.
2. application program operation method, including:
Terminal receives application program and is embedded in the digital certificate of multiple identity informations and delegated strategy;
The identity information and delegated strategy being embedded in the digital certificate that end-on is received is authenticated;And
When certification passes through, the application program that terminal is received according to delegated strategy operation;
Wherein, delegated strategy includes application program authority levels, the useful life for terminal corresponding with multiple identity informations
And access times;
The digital certificate is and the String classes in the digital certificate extended field based on the digital certificate of X.509 form
Multiple identity informations and delegated strategy of XML format are embedded in the entry of type.
3. method as claimed in claim 2, wherein, delegated strategy includes the institute for terminal corresponding with multiple identity informations
State the useful life of application program.
4. method as claimed in claim 2, wherein, delegated strategy includes the institute for terminal corresponding with multiple identity informations
State the access times of application program.
5. method as claimed in claim 3, wherein, the identity information being embedded in the digital certificate that end-on is received and mandate
The step of strategy is authenticated includes:
Terminal reads locally stored identity information, using locally stored identity information to being embedded in the digital certificate that receives
Identity information be authenticated;And
Terminal reads locally stored temporal information, using locally stored temporal information to being embedded in the digital certificate that receives
Delegated strategy in useful life be authenticated.
6. method as claimed in claim 4, wherein, the identity information being embedded in the digital certificate that end-on is received and mandate
The step of strategy is authenticated includes:
Terminal reads locally stored identity information, using locally stored identity information to being embedded in the digital certificate that receives
Identity information be authenticated;And
The number of times of application program is counted described in terminal-pair local runtime, using the number of times of statistics to the digital certificate that receives
In be embedded in delegated strategy in access times be authenticated.
7. method as claimed in claim 2, wherein, include the step of the application program received according to delegated strategy operation:
Application program authority levels in delegated strategy determine that application program is installed and start-up parameter, and according to determined by
Application program is installed with start-up parameter to run application program.
8. server, including:
The message of application program is downloaded in receiver module, receiving terminal request;
Logging modle, in terminal payment success, records the Transaction Information of the terminal;
Writing module, according to the Transaction Information of logging modle record, by multiple identity informations and the embedded digital certificate of delegated strategy;
And
Sending module, by the digital certificate and the application program of embedded identity information and delegated strategy the end is sent jointly to
End;
Wherein, delegated strategy includes application program authority levels, the useful life for terminal corresponding with multiple identity informations
And/or access times;
The digital certificate is the digital certificate based on X.509 form, and said write module expands in the digital certificate of X.509 form
In the entry of the String types in exhibition field, multiple identity informations and delegated strategy of XML format are embedded in.
9. terminal, including:
Receiver module, receives application program and is embedded in the digital certificate of multiple identity informations and delegated strategy;
Authentication module, the identity information and delegated strategy to being embedded in the digital certificate that receives is authenticated;And
Operation module, when authentication module certification passes through, according to the application program that delegated strategy operation is received;
Wherein, delegated strategy includes application program authority levels, the useful life for terminal corresponding with multiple identity informations
And/or access times;
The digital certificate is and the String classes in the digital certificate extended field based on the digital certificate of X.509 form
Multiple identity informations and delegated strategy of XML format are embedded in the entry of type.
10. terminal as claimed in claim 9, wherein, authentication module includes:
Identity information authentication ' unit, read locally stored identity information, using locally stored identity information to receiving
The identity information being embedded in digital certificate is authenticated;
Useful life's authentication ' unit, read locally stored temporal information, using locally stored temporal information to receiving
Useful life in the delegated strategy being embedded in digital certificate is authenticated;And
Access times authentication ' unit, counts to the number of times of application program described in local runtime, using the number of times docking of statistics
Access times in the delegated strategy being embedded in the digital certificate for receiving are authenticated.
11. terminals as described in claim 9 or 10, wherein, application program of the operation module in delegated strategy is awarded
Power level does not determine that application program is installed and start-up parameter, and the application program according to determined by is installed and start-up parameter should to run
Use program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210142208.8A CN103390122B (en) | 2012-05-09 | 2012-05-09 | Application program transmitting method, application program operating method, sever and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210142208.8A CN103390122B (en) | 2012-05-09 | 2012-05-09 | Application program transmitting method, application program operating method, sever and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103390122A CN103390122A (en) | 2013-11-13 |
CN103390122B true CN103390122B (en) | 2017-05-03 |
Family
ID=49534391
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210142208.8A Active CN103390122B (en) | 2012-05-09 | 2012-05-09 | Application program transmitting method, application program operating method, sever and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103390122B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105630587B (en) * | 2014-10-31 | 2024-04-12 | 腾讯科技(深圳)有限公司 | Method, device and system for migrating application program data between terminals |
CN106156547A (en) * | 2015-03-23 | 2016-11-23 | 深圳市亚启科技有限公司 | Time-based client application control method and system |
CN106304040A (en) * | 2015-05-25 | 2017-01-04 | 阿里巴巴集团控股有限公司 | The management method of Mobile solution, device |
CN107241298B (en) * | 2016-03-29 | 2020-06-23 | 阿里巴巴集团控股有限公司 | Application control method, terminal and system |
CN106657137A (en) * | 2017-01-17 | 2017-05-10 | 腾讯科技(上海)有限公司 | Software product legitimacy verification method, apparatus and system |
CN108471419B (en) * | 2018-03-28 | 2021-03-16 | 湖南东方华龙信息科技有限公司 | Certificate sharing method based on trusted identity |
CN110417554A (en) * | 2018-04-26 | 2019-11-05 | 华为技术有限公司 | A kind of method and device for verifying terminal device identity |
CN109063422B (en) * | 2018-07-05 | 2022-04-29 | 北京奇虎科技有限公司 | Download operation method, reinforcing method and server for paid application |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101945366A (en) * | 2009-07-07 | 2011-01-12 | 中国移动通信集团公司 | Experiential accounting method, proxy module, terminal and system |
CN102034059A (en) * | 2010-12-02 | 2011-04-27 | 东莞宇龙通信科技有限公司 | Method and device for managing application program and terminal |
CN102149064A (en) * | 2011-01-26 | 2011-08-10 | 宇龙计算机通信科技(深圳)有限公司 | Charging authentication method, mobile terminal and charging authentication server |
CN102340398A (en) * | 2010-07-27 | 2012-02-01 | 中国移动通信有限公司 | Security policy setting and determining method, and method and device for executing operation by application program |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100293103A1 (en) * | 2009-05-12 | 2010-11-18 | Microsoft Corporation | Interaction model to migrate states and data |
-
2012
- 2012-05-09 CN CN201210142208.8A patent/CN103390122B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101945366A (en) * | 2009-07-07 | 2011-01-12 | 中国移动通信集团公司 | Experiential accounting method, proxy module, terminal and system |
CN102340398A (en) * | 2010-07-27 | 2012-02-01 | 中国移动通信有限公司 | Security policy setting and determining method, and method and device for executing operation by application program |
CN102034059A (en) * | 2010-12-02 | 2011-04-27 | 东莞宇龙通信科技有限公司 | Method and device for managing application program and terminal |
CN102149064A (en) * | 2011-01-26 | 2011-08-10 | 宇龙计算机通信科技(深圳)有限公司 | Charging authentication method, mobile terminal and charging authentication server |
Also Published As
Publication number | Publication date |
---|---|
CN103390122A (en) | 2013-11-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103390122B (en) | Application program transmitting method, application program operating method, sever and terminal | |
JP4067985B2 (en) | Application authentication system and device | |
US7146645B1 (en) | Dedicated applications for user stations and methods for downloading dedicated applications to user stations | |
CN101689237B (en) | Activation system architecture | |
JP5895252B2 (en) | Method for protecting a communication terminal connected with a terminal user identification information module | |
US7734549B2 (en) | Methods and apparatus for managing secured software for a wireless device | |
US7899187B2 (en) | Domain-based digital-rights management system with easy and secure device enrollment | |
US10382954B2 (en) | System and method for providing a service to the user of a mobile terminal | |
CN102685727B (en) | Method for transmitting and operating application program, system for operating application program, server and terminal | |
US20040088541A1 (en) | Digital-rights management system | |
EP1471753A1 (en) | Method for securing a mobile terminal and for control of functions requiring an high degree of security | |
KR20100109472A (en) | Method, system, license server for providing a license to a user for accessing a protected content on a user device and software module | |
KR101314751B1 (en) | Apparatus for managing installation of DRM and method thereof | |
CN111914293A (en) | Data access authority verification method and device, computer equipment and storage medium | |
CN102622559B (en) | A kind of navigation software user authorization and system | |
US20090119505A1 (en) | Transaction method and verification method | |
US9514288B2 (en) | Information processing device, information processing method, program and storage medium | |
US20240028672A1 (en) | Terminal hardware configuration system | |
US20120204232A1 (en) | System And Method For Managing Usage Rights Of Software Applications | |
US20130232337A1 (en) | User terminal and method for playing digital rights management content | |
JP5781678B1 (en) | Electronic data utilization system, portable terminal device, and method in electronic data utilization system | |
US8745375B2 (en) | Handling of the usage of software in a disconnected computing environment | |
KR20180046492A (en) | Security system for selling and using e-training contents | |
KR20200089562A (en) | Method and apparatus for managing a shared digital key | |
JP2005215945A (en) | Information processor, storage device for permitting software execution, and software execution method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |