CN103390122B - Application program transmitting method, application program operating method, sever and terminal - Google Patents

Application program transmitting method, application program operating method, sever and terminal Download PDF

Info

Publication number
CN103390122B
CN103390122B CN201210142208.8A CN201210142208A CN103390122B CN 103390122 B CN103390122 B CN 103390122B CN 201210142208 A CN201210142208 A CN 201210142208A CN 103390122 B CN103390122 B CN 103390122B
Authority
CN
China
Prior art keywords
application program
digital certificate
terminal
embedded
delegated strategy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210142208.8A
Other languages
Chinese (zh)
Other versions
CN103390122A (en
Inventor
匡硕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201210142208.8A priority Critical patent/CN103390122B/en
Publication of CN103390122A publication Critical patent/CN103390122A/en
Application granted granted Critical
Publication of CN103390122B publication Critical patent/CN103390122B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an application program transmitting method, an application program operating method, a sever and a terminal. The application program transmitting method disclosed by the invention comprises the steps of receiving information of a request made by the terminal for downloading an application program; when the terminal successfully pays the charge, embedding one or a plurality of identity information and authorization policies into a digital certificate according to the transaction information of the terminal; and jointly transmitting the digital certificate embedded with the identity information and the authorization policies to the terminal. The method and the device disclosed by the invention can specifically configure application program authorization policies in application program copyright protection, support modes such as application program trial use, delegation and presentation, and meet the demands of operators.

Description

Application program sending method, application program operation method, server and terminal
Technical field
The application is related to application program sending method, application program operation method, server and terminal.
Background technology
In the protection mechanism of existing digital content (including application program), compare main flow is based on DRM (Digital Rights Management, Digital Right Management technology) copyright protection regime.DRM copyright protection regimes are applied and are applying journey Juche idea in sequence copyright protection is:
Initially set up application program authorization center.For the application program to be downloaded, it is possible to use key (Key) carries out adding Privacy protection, the digital content head of encryption deposits the URL at KeyID and Content-Authorize center.User prepare install and use when, According to the KeyID and URL information of content headers, it is possible to send correlation after the checking of digital content authorization center is authorized Secret key decryption, third party application can installation and operation.
Need third party application to be protected encrypted, even if downloaded by user preserving, be not applied in mandate The checking mandate of the heart also cannot be installed, so as to closely protect the copyright of content.Key typically has two, and one public key (public key), one private key (private key).Public key is used to encrypt application content itself, and private key is used to decrypt content, Private key is also prevented from when content headers have the situation for being altered or destroying, so as to prevent using key it may determine that out Content is illegally used.
Protected third party application is used traditional DRM content copyright protection the private of corresponding content issuer Key is signed and is encrypted, and mobile terminal itself downloads authority (rights object), authority from business platform In include public key.Authority is stored in mobile terminal locally or obtains from network when using every time, and public key therein can Encryption application program to downloading is decrypted and signature verification, so as to reach the effect of copyright protection.
Relational dependence is customized in the shortcoming of authority to application program in order to be directed to traditional DRM scheme, can be made Authority is stored in the card memory appts such as SD card, SIM in the form of digital certificate, so as to realize authorizing with user in difference The migration of equipment room and migrate.But, whether allow for the form of authorisation of application program is generally only authorized in existing scheme And two dimensions of licensing term, and authority is still bundled in single user, it is impossible to met that such as application program is on probation, turned Authorize, give isotype, it is impossible to meet the demand of operator.
The content of the invention
Form of authorisation is simplified in order to solve the problems, such as existing application Copyright protection scheme, present applicant proposes one Plant application program sending method, application program operation method, server and terminal.
According to the one side of the application, it is proposed that a kind of application program sending method, it may include:Under receiving terminal request Carry the message of application program;In terminal payment success, according to the Transaction Information of the terminal, by multiple identity informations and Delegated strategy is embedded in digital certificate;And by the digital certificate and the application program of embedded identity information and delegated strategy together It is sent to the terminal.
According to further aspect of the application, it is proposed that a kind of application program operation method, it may include:Terminal receives application The digital certificate of program and embedded multiple identity informations and delegated strategy;The body being embedded in the digital certificate that end-on is received Part information and delegated strategy are authenticated;And when certification passes through, the application journey that terminal is received according to delegated strategy operation Sequence.
According to the another aspect of the application, it is proposed that a kind of server, it may include:Receiver module, receiving terminal request Download the message of application program;Logging modle, in terminal payment success, records the Transaction Information of the terminal;Writing module, According to the Transaction Information of logging modle record, by multiple identity informations and the embedded digital certificate of delegated strategy;And sending module, The digital certificate and the application program of embedded identity information and delegated strategy are sent jointly to into the terminal.
According to another aspect of the application, it is proposed that a kind of terminal, it may include:Receiver module, receive application program with And the digital certificate of embedded multiple identity informations and delegated strategy;Authentication module, to the body being embedded in the digital certificate that receives Part information and delegated strategy are authenticated;And operation module, when authentication module certification passes through, connect according to delegated strategy operation The application program for receiving.
By the present processes and device, can to protecting using copyright of program in application program delegated strategy carry out Concrete configuration, so as to supporting such as application program on probation, sublicense, giving isotype, meets the demand of operator.
Description of the drawings
Fig. 1 is the flow chart of the application program sending method according to one embodiment of the application;
Fig. 2 is the structural representation of the digital certificate of the X.509 form according to the application specific embodiment;
Fig. 3 is the flow chart of the application program operation method according to one embodiment of the application;
Fig. 4 is the block diagram of the server according to one embodiment of the application;
Fig. 5 is the block diagram of the terminal according to one embodiment of the application;And
Fig. 6 is the block diagram of the terminal according to one embodiment of the application.
Specific embodiment
With reference to the accompanying drawings, the embodiment of the application is described in detail.
Fig. 1 shows the application program sending method according to one embodiment of the application.As shown in figure 1, in step The message of application program is downloaded in S1002, receiving terminal request.Although it is not shown in the diagrams, it is to be understood that, the user of terminal is sending out Before sending download request, may have been completed that the purchase to application program is operated, and successful payment.At this moment, server side can Record has and the purchase corresponding Transaction Information of operation, wherein may include one or more identity informations and authorize plan accordingly Slightly.
Referring next to Fig. 1, in step S1004, when the terminal payment success of download request is sent, can be according to the terminal Transaction Information, by one or more identity informations for wherein including and the embedded digital certificate of delegated strategy.Then, in step S1006, the application program that the digital certificate and request that embedded in identity information and delegated strategy are downloaded is sent jointly to described Terminal.It is appreciated that if terminal payment is unsuccessful, download request is rejected (not shown).
In the application program sending method shown in Fig. 1, due to embedded in one or more identity informations in digital certificate And delegated strategy such that it is able to support such as application program on probation, sublicense, give isotype.Will be detailed below.
According to a specific embodiment of the application, the delegated strategy of embedded digital certificate may include for particular terminal Application program authority levels, useful life and/or access times.
Specifically, the application program authority levels for certain terminal can be the full releases of such as application program or answer Beta release with program etc..Can be specific time point or time period for the application program useful life of certain terminal, Represent that the application program only can be installed in terminal and/or run before particular point in time or during special time period. Maximum installation and/or number of run of the application program in terminal is represented for the application program access times of certain terminal.
As described above, delegated strategy can be terminal use determining during purchase applications are carried out, and paying Record in Transaction Information after expense success.Because application program delegated strategy can be configured, therefore can preferably meet operation Business and the demand of user.
Below by taking the digital certificate of common X.509 form as an example, describe in detail and identity information is embedded in digital certificate With the mode of delegated strategy.
Fig. 2 shows the structural representation that identity information and delegated strategy are embedded in the digital certificate of X.509 form.Such as Shown in Fig. 2, using extension (extension) field in the X.509 digital certificate of form identity information and mandate are embedded in Strategy.
X.509 each entry of the extended field of the digital certificate of form includes three domains:Expansion type, expanding value and pass Bonded state is indicated.The extended field that String types can be used in this specific embodiment is stored with XML descriptions with regard to application One or more identity informations of program and delegated strategy.
Specifically, in digital certificate as shown in Figure 2, extended field contains copyright authorization description information:Extension word The String of section identifies this extended field is a character string, the key mark field references level of this copyright authorization information Not, expanding value denotes specific application program authorization message.It is angry that in this embodiment expanding value is denoted for application name ID Two copyright authorization informations of bird third party applications:Auth1 marks license to the repertoire of the application program IMSI summaries are the user of abcdef, and licensing term is permanent.Auth2 marks can represent that an application program is given or application turns The authorization message of mandate, i.e. user abcdef purchase using when obtain simultaneously the application be assigned on December 31st, 2011 Or give and give good friend using the application program experience authority of 20 times (IMSI is designated the user of bcdefg).
After the corresponding authorization message extended field defined in X.509 digital certificate, the publisher of application program can be with In the conventional mode, when to specific user's release application program, using X.509 digital certificate to third party application Verified and signed, the content that the third party application bag of issue is finally included is included:Application programs body, apply journey Digital certificate and the signature using the digital certificate signed and issued to application program program body that sequence publisher signs and issues.
In the present embodiment, introduce in publisher's certificate using the IMSI number and authority information of application user so that Needed to generate different application installation packages for different users before application is provided to user's download using publisher, being should Some extra loads are brought with the server of publisher.For such case, due to the signature process of application program it is most complicated Computing be to use publisher's certificate to the bag digest calculations in program body signature process, therefore can be in the clothes using publisher In business device deployment, the dedicated computing instrument of digest algorithm is introduced in server side, to lift the efficiency of signature calculation, shorten user Using the waiting time downloaded.
Specific embodiment according to Fig. 2, by two identity informations being embedded in digital certificate and for every The different delegated strategies of the counterpart terminal of individual identity information, i.e., different authority levels, useful life or access times are capable of achieving Application program is on probation, sublicense, give isotype, meets the demand of operator, and can be by the content to being embedded in digital certificate Flexible configuration is carried out, more application program licensing modes are realized.
Referring next to Fig. 3, the application program operation method according to one embodiment of the application is described.
As shown in figure 3, in step S3002, terminal receive application program and embedded in one or more identity informations and The digital certificate of delegated strategy.Then, in step S3004, in the digital certificate that end-on is received be embedded in identity information and Delegated strategy is authenticated, and in step S3006, if certification passes through, the application that terminal is then received according to delegated strategy operation Program.
Specifically, terminal is installed after obtaining the application comprising application program and digital certificate and doing program bag in program When, the application installation service of terminal operating system can receive mount request, now, using installation service application can be first checked for Digital certificate in program bag signs and issues mechanism's (not shown), if digital certificate is signed and issued for particular operator, carries out step S3004, i.e. identity information and delegated strategy to being embedded in the digital certificate that receives are authenticated.If the numeral of application program The nonspecific operator of certificate signs and issues, then proceed to that traditional checking flow process signs and issues application program the safety of mechanism and legitimacy is entered Row checking, concrete processing mode can be adjusted flexibly according to enterprise security policy, be not described in detail herein.
Method according to Fig. 3, is authenticated by the identity information and delegated strategy that are embedded in digital certificate, Such as application program on probation, sublicense can be supported, isotype is given, the demand of operator is met.
According to a specific embodiment, the delegated strategy in embedded digital certificate may include the application for particular terminal The useful life of program.In this case, the identity information being embedded in the digital certificate that end-on is received and delegated strategy The step of being authenticated can respectively include the certification to identity information and the certification to useful life.
Specifically, the certification of terminal-pair identity information can be that terminal reads locally stored identity information, using local The identity information of storage is authenticated to the identity information being embedded in the digital certificate that receives.By the certification of identity information, Can check whether application program has licensed to the user of this terminal.For example, this terminal SIM is read first using the service of installing In IMSI number (for example can by operating system provide machine card interface reading SIM card in store IMSI information) plucked Will, and checked with the IMSI number summary for including in digital certificate, represent if matching and pass through certification.
In addition, the certification of terminal-pair useful life can be, terminal reads locally stored temporal information, using locally depositing The temporal information of storage is authenticated to the useful life in the delegated strategy that is embedded in the digital certificate that receives.Specifically, may be used Judge whether useful life is expired, if not out of date, then it represents that certification passes through.
According to a specific embodiment, the delegated strategy in embedded digital certificate may include the application for particular terminal The access times of program.In this case, the identity information being embedded in the digital certificate that end-on is received and delegated strategy The step of being authenticated can respectively include the certification to identity information and the certification to access times.
Specifically, the certification of terminal-pair identity information can be that terminal reads locally stored identity information, using local The identity information of storage is authenticated to the identity information being embedded in the digital certificate that receives.
In addition, the certification of terminal-pair access times can be, the number of times of application program is carried out described in terminal-pair local runtime Access times in the delegated strategy that is embedded in the digital certificate that receives are authenticated by statistics using the number of times of statistics, After reaching the experience number of times of reservation, the operation request of application program is prevented.
According to a specific embodiment, delegated strategy may include for terminal corresponding with one or more identity informations Application program authority levels, useful life and access times.In this case, carried out recognizing identity information in terminal After card, the certification to useful life and the certification to access times, application program authority levels that can be in delegated strategy The application program that operation is received.Specifically, the application program authority levels in delegated strategy determine that application program is installed And start-up parameter, and application program is installed with start-up parameter to run application program according to determined by.
In multiple specific embodiments described above, only the details different from existing digital certificate authentication process is entered Go detailed description, in order to save space, eliminate the existing verification process of digital certificate.For example, it is in checking digital certificate The no process issued by particular operator can be the mode of traditional certificate pairing, by the preset root certificate logarithm of terminal the machine Word certificate is verified.Again for example, traditional mode can be used, the signature of application program is verified, its primary operational is According to the legitimacy and integrity of the signature verification of the application package application program.
Specific embodiment by more than, can be realized various by being authenticated to the content for being embedded in digital certificate Application program licensing mode.
Referring next to Fig. 4, the structure of the server according to one embodiment of the application is described.
As shown in figure 4, server 40 may include receiver module 402, logging modle 404, writing module 406 and sending module 408。
Receiver module 402 can receiving terminal request download application program message.Logging modle 404 can terminal payment into During work(, the Transaction Information of the terminal is recorded.Writing module 404 can according to logging modle record Transaction Information, by one or Multiple identity informations and the embedded digital certificate of the embedded digital certificate of delegated strategy.Sending module 408 can by embedded identity information and The digital certificate of delegated strategy and the application program send jointly to the terminal.
Similarly, according to a specific embodiment, delegated strategy may include to be directed to and one or more identity informations pair The application program authority levels of the terminal answered, useful life and/or access times.
According to a specific embodiment, in the digital certificate of X.509 form, writing module is in digital certificate extended field In String types entry in, be embedded in XML format one or more identity informations and delegated strategy.
Fig. 5 and Fig. 6 show the structure of the terminal according to the application embodiment.
With reference first to Fig. 5, terminal 50 may include receiver module 502, authentication module 504 and operation module 506.Receiver module 502 can receive application program and be embedded in the digital certificate of one or more identity informations and delegated strategy.Authentication module 504 can Identity information and delegated strategy to being embedded in the digital certificate that receives is authenticated.Operation module 506 can be in authentication module When certification passes through, according to the application program that delegated strategy operation is received.
According to a specific embodiment, delegated strategy may include for terminal corresponding with one or more identity informations Application program authority levels, useful life and/or access times.Fig. 6 shows the structure of terminal in this case.
As shown in fig. 6, terminal 60 may include receiver module 602, authentication module 604 and operation module 606, wherein, receive Module 602 and operation module 606 are similar with the receiver module 502 shown in Fig. 5 and operation module 506, and here is omitted.
Authentication module 604 as shown in Figure 6 may particularly include:Identity information authentication ' unit 6042, useful life's certification list Unit 6044 and access times authentication ' unit 6046.Wherein, identity information authentication ' unit 6042 can read locally stored identity letter Breath, is authenticated using locally stored identity information to the identity information being embedded in the digital certificate that receives;Useful life Authentication ' unit 6044 can read locally stored temporal information, using locally stored temporal information to the digital certificate that receives In be embedded in delegated strategy in useful life be authenticated;Access times authentication ' unit 6046 can be to applying described in local runtime The number of times of program is counted, using the number of times of statistics to the use time in the delegated strategy that is embedded in the digital certificate that receives Number is authenticated.
According to a specific embodiment, in the terminal, the application that module 506 or 606 can be in delegated strategy is run Program authorization rank determines that application program is installed and start-up parameter, and the application program according to determined by is installed and start-up parameter is come Operation application program.
Below with a specific example, the application program for describing the application sends and operation method.
User have purchased application program, the entitled APP of program from using shop, and user's (IMSI summaries are abcdef) is This application have purchased complete access right and try out for 20 times of another specified user's (IMSI summaries are bcdefa) Authority.The application program for completing to buy the subsidiary Copyright Strategy certificate of server generation after operation is downloaded for user.So pacify in example A Copyright Strategy of application program is addition of in full certificate, policy depiction is as follows:
Auth_1 identifies application APP and licenses to user of the IMSI summaries for abcdef in the delegated strategy, it is allowed to Its without time limit unrestrictedly uses the application program.Auth_2 identifies application program and licenses to use of the IMSI summaries for bcdefa Family, it is allowed to its before 31 days December in 2011, trial operation this application program 20 times.
After application package is downloaded and distributes.As terminal starts the operation for installing APP, systematic difference installs service Intercept mount request INS_REQ of application.Security system is received after the request, starts the stream of copyright and integrity verification Journey.
In copyright and integrity verification flow process, the installation kit of copyright and integrity verification subsystem extraction application program, The certificate provided using publisher is therefrom parsed, whether the publisher for first verifying that the certificate is mechanism.If certificate Publisher is verified, then read the Copyright Strategy added in safety certificate.
After reading certificate, the IMSI digest calculations of copyright and integrity verification subsystem and decision sub-module read the machine The IMSI that stores in SIM is simultaneously compared after being made a summary with the abcdef in certificate, and the application program is reexamined after the match is successful The time limit of mandate and authority, determine whether the application program can be installed on the mobile phone with this.
Can see from upper example, relative to the verification method in traditional copyright protection system based on document form, this Application realizes flexibly matching somebody with somebody for application program mandate by the corresponding copyright authorization strategy of preset application program in digital certificate Put and mobilism identification.
The exemplary embodiment of the application is described above by reference to accompanying drawing.Those skilled in the art should manage Solution, the purpose that the embodiment above is merely to illustrate that and the example lifted, rather than for being limited.It is all in the application Teaching and claims under any modification, the equivalent made etc., should be included in this application claims In the range of.

Claims (11)

1. application program sending method, including:
The message of application program is downloaded in receiving terminal request;
In terminal payment success, according to the Transaction Information of the terminal, multiple identity informations and delegated strategy are embedded in Digital certificate;And
The digital certificate and the application program of embedded identity information and delegated strategy are sent jointly to into the terminal;
Wherein, delegated strategy includes application program authority levels, the useful life for terminal corresponding with multiple identity informations And/or access times;
The digital certificate is the digital certificate based on X.509 form,
Multiple identity informations and delegated strategy are included the step of being embedded in digital certificate:
In the entry of the String types in digital certificate extended field, multiple identity informations and the mandate of XML format are embedded in Strategy.
2. application program operation method, including:
Terminal receives application program and is embedded in the digital certificate of multiple identity informations and delegated strategy;
The identity information and delegated strategy being embedded in the digital certificate that end-on is received is authenticated;And
When certification passes through, the application program that terminal is received according to delegated strategy operation;
Wherein, delegated strategy includes application program authority levels, the useful life for terminal corresponding with multiple identity informations And access times;
The digital certificate is and the String classes in the digital certificate extended field based on the digital certificate of X.509 form Multiple identity informations and delegated strategy of XML format are embedded in the entry of type.
3. method as claimed in claim 2, wherein, delegated strategy includes the institute for terminal corresponding with multiple identity informations State the useful life of application program.
4. method as claimed in claim 2, wherein, delegated strategy includes the institute for terminal corresponding with multiple identity informations State the access times of application program.
5. method as claimed in claim 3, wherein, the identity information being embedded in the digital certificate that end-on is received and mandate The step of strategy is authenticated includes:
Terminal reads locally stored identity information, using locally stored identity information to being embedded in the digital certificate that receives Identity information be authenticated;And
Terminal reads locally stored temporal information, using locally stored temporal information to being embedded in the digital certificate that receives Delegated strategy in useful life be authenticated.
6. method as claimed in claim 4, wherein, the identity information being embedded in the digital certificate that end-on is received and mandate The step of strategy is authenticated includes:
Terminal reads locally stored identity information, using locally stored identity information to being embedded in the digital certificate that receives Identity information be authenticated;And
The number of times of application program is counted described in terminal-pair local runtime, using the number of times of statistics to the digital certificate that receives In be embedded in delegated strategy in access times be authenticated.
7. method as claimed in claim 2, wherein, include the step of the application program received according to delegated strategy operation:
Application program authority levels in delegated strategy determine that application program is installed and start-up parameter, and according to determined by Application program is installed with start-up parameter to run application program.
8. server, including:
The message of application program is downloaded in receiver module, receiving terminal request;
Logging modle, in terminal payment success, records the Transaction Information of the terminal;
Writing module, according to the Transaction Information of logging modle record, by multiple identity informations and the embedded digital certificate of delegated strategy; And
Sending module, by the digital certificate and the application program of embedded identity information and delegated strategy the end is sent jointly to End;
Wherein, delegated strategy includes application program authority levels, the useful life for terminal corresponding with multiple identity informations And/or access times;
The digital certificate is the digital certificate based on X.509 form, and said write module expands in the digital certificate of X.509 form In the entry of the String types in exhibition field, multiple identity informations and delegated strategy of XML format are embedded in.
9. terminal, including:
Receiver module, receives application program and is embedded in the digital certificate of multiple identity informations and delegated strategy;
Authentication module, the identity information and delegated strategy to being embedded in the digital certificate that receives is authenticated;And
Operation module, when authentication module certification passes through, according to the application program that delegated strategy operation is received;
Wherein, delegated strategy includes application program authority levels, the useful life for terminal corresponding with multiple identity informations And/or access times;
The digital certificate is and the String classes in the digital certificate extended field based on the digital certificate of X.509 form Multiple identity informations and delegated strategy of XML format are embedded in the entry of type.
10. terminal as claimed in claim 9, wherein, authentication module includes:
Identity information authentication ' unit, read locally stored identity information, using locally stored identity information to receiving The identity information being embedded in digital certificate is authenticated;
Useful life's authentication ' unit, read locally stored temporal information, using locally stored temporal information to receiving Useful life in the delegated strategy being embedded in digital certificate is authenticated;And
Access times authentication ' unit, counts to the number of times of application program described in local runtime, using the number of times docking of statistics Access times in the delegated strategy being embedded in the digital certificate for receiving are authenticated.
11. terminals as described in claim 9 or 10, wherein, application program of the operation module in delegated strategy is awarded Power level does not determine that application program is installed and start-up parameter, and the application program according to determined by is installed and start-up parameter should to run Use program.
CN201210142208.8A 2012-05-09 2012-05-09 Application program transmitting method, application program operating method, sever and terminal Active CN103390122B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210142208.8A CN103390122B (en) 2012-05-09 2012-05-09 Application program transmitting method, application program operating method, sever and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210142208.8A CN103390122B (en) 2012-05-09 2012-05-09 Application program transmitting method, application program operating method, sever and terminal

Publications (2)

Publication Number Publication Date
CN103390122A CN103390122A (en) 2013-11-13
CN103390122B true CN103390122B (en) 2017-05-03

Family

ID=49534391

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210142208.8A Active CN103390122B (en) 2012-05-09 2012-05-09 Application program transmitting method, application program operating method, sever and terminal

Country Status (1)

Country Link
CN (1) CN103390122B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105630587B (en) * 2014-10-31 2024-04-12 腾讯科技(深圳)有限公司 Method, device and system for migrating application program data between terminals
CN106156547A (en) * 2015-03-23 2016-11-23 深圳市亚启科技有限公司 Time-based client application control method and system
CN106304040A (en) * 2015-05-25 2017-01-04 阿里巴巴集团控股有限公司 The management method of Mobile solution, device
CN107241298B (en) * 2016-03-29 2020-06-23 阿里巴巴集团控股有限公司 Application control method, terminal and system
CN106657137A (en) * 2017-01-17 2017-05-10 腾讯科技(上海)有限公司 Software product legitimacy verification method, apparatus and system
CN108471419B (en) * 2018-03-28 2021-03-16 湖南东方华龙信息科技有限公司 Certificate sharing method based on trusted identity
CN110417554A (en) * 2018-04-26 2019-11-05 华为技术有限公司 A kind of method and device for verifying terminal device identity
CN109063422B (en) * 2018-07-05 2022-04-29 北京奇虎科技有限公司 Download operation method, reinforcing method and server for paid application

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101945366A (en) * 2009-07-07 2011-01-12 中国移动通信集团公司 Experiential accounting method, proxy module, terminal and system
CN102034059A (en) * 2010-12-02 2011-04-27 东莞宇龙通信科技有限公司 Method and device for managing application program and terminal
CN102149064A (en) * 2011-01-26 2011-08-10 宇龙计算机通信科技(深圳)有限公司 Charging authentication method, mobile terminal and charging authentication server
CN102340398A (en) * 2010-07-27 2012-02-01 中国移动通信有限公司 Security policy setting and determining method, and method and device for executing operation by application program

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100293103A1 (en) * 2009-05-12 2010-11-18 Microsoft Corporation Interaction model to migrate states and data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101945366A (en) * 2009-07-07 2011-01-12 中国移动通信集团公司 Experiential accounting method, proxy module, terminal and system
CN102340398A (en) * 2010-07-27 2012-02-01 中国移动通信有限公司 Security policy setting and determining method, and method and device for executing operation by application program
CN102034059A (en) * 2010-12-02 2011-04-27 东莞宇龙通信科技有限公司 Method and device for managing application program and terminal
CN102149064A (en) * 2011-01-26 2011-08-10 宇龙计算机通信科技(深圳)有限公司 Charging authentication method, mobile terminal and charging authentication server

Also Published As

Publication number Publication date
CN103390122A (en) 2013-11-13

Similar Documents

Publication Publication Date Title
CN103390122B (en) Application program transmitting method, application program operating method, sever and terminal
JP4067985B2 (en) Application authentication system and device
US7146645B1 (en) Dedicated applications for user stations and methods for downloading dedicated applications to user stations
CN101689237B (en) Activation system architecture
JP5895252B2 (en) Method for protecting a communication terminal connected with a terminal user identification information module
US7734549B2 (en) Methods and apparatus for managing secured software for a wireless device
US7899187B2 (en) Domain-based digital-rights management system with easy and secure device enrollment
US10382954B2 (en) System and method for providing a service to the user of a mobile terminal
CN102685727B (en) Method for transmitting and operating application program, system for operating application program, server and terminal
US20040088541A1 (en) Digital-rights management system
EP1471753A1 (en) Method for securing a mobile terminal and for control of functions requiring an high degree of security
KR20100109472A (en) Method, system, license server for providing a license to a user for accessing a protected content on a user device and software module
KR101314751B1 (en) Apparatus for managing installation of DRM and method thereof
CN111914293A (en) Data access authority verification method and device, computer equipment and storage medium
CN102622559B (en) A kind of navigation software user authorization and system
US20090119505A1 (en) Transaction method and verification method
US9514288B2 (en) Information processing device, information processing method, program and storage medium
US20240028672A1 (en) Terminal hardware configuration system
US20120204232A1 (en) System And Method For Managing Usage Rights Of Software Applications
US20130232337A1 (en) User terminal and method for playing digital rights management content
JP5781678B1 (en) Electronic data utilization system, portable terminal device, and method in electronic data utilization system
US8745375B2 (en) Handling of the usage of software in a disconnected computing environment
KR20180046492A (en) Security system for selling and using e-training contents
KR20200089562A (en) Method and apparatus for managing a shared digital key
JP2005215945A (en) Information processor, storage device for permitting software execution, and software execution method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant