CN106250722A - Extension method based on java remote authorization APP - Google Patents
Extension method based on java remote authorization APP Download PDFInfo
- Publication number
- CN106250722A CN106250722A CN201610625782.7A CN201610625782A CN106250722A CN 106250722 A CN106250722 A CN 106250722A CN 201610625782 A CN201610625782 A CN 201610625782A CN 106250722 A CN106250722 A CN 106250722A
- Authority
- CN
- China
- Prior art keywords
- extension
- mobile terminal
- method based
- remote authorization
- software
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 16
- 238000013475 authorization Methods 0.000 title claims abstract description 15
- 238000009434 installation Methods 0.000 claims description 5
- 238000012550 audit Methods 0.000 claims description 4
- 230000008014 freezing Effects 0.000 claims description 3
- 238000007710 freezing Methods 0.000 claims description 3
- 238000012795 verification Methods 0.000 abstract description 3
- 230000003111 delayed effect Effects 0.000 abstract 1
- 230000008859 change Effects 0.000 description 3
- 210000004556 brain Anatomy 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000003139 buffering effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000005096 rolling process Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/105—Arrangements for software license management or administration, e.g. for managing licenses at corporate level
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/107—License processing; Key processing
Abstract
The present invention discloses a kind of extension method based on java remote authorization APP, including: software installed by PC, and initializes the MAC Address of the PC of backstage storage;Initiate extension request;Examination & verification is delayed the most normal and arranges the dating.Remotely the software needed an extension is authorized, it is therefore prevented that usurping of room software is seen on foreground, it is achieved that PC and the one_to_one corresponding of APP, significantly prevent the theft seeing room software, use to one safer environment of client.
Description
Technical field
The invention belongs to the technical field that software renews, particularly relate to a kind of extension side based on java remote authorization APP
Method.
Background technology
Software piracy is to spend software vendors to need the global problem faced every year, and one is referred to as carefree leaning on
The form of piracy of the back of the body is to share on multiple stage computer and install software, violates end user license agreement, wherein, Product Activation
It is to reduce pirate a kind of mode.
But, under the main trend of the Internet high speed development, renewing of software is built upon in the Internet substantially, therefore exists
During software version is transferred, there is the risk that software is usurped, current most of software does not exist asking of a mandate
Topic, as easy as rolling off a log use by piracy and uncontrollable, cause client to use the environment of software to be on the hazard.
Summary of the invention
For solving above-mentioned technical problem, the present invention provides a kind of extension method based on java remote authorization APP.In order to right
Some aspects of the embodiment disclosed have a basic understanding, shown below is simple summary.This summarized section is not general
General commentary, is not key/critical component to be determined or the protection domain describing these embodiments.Its sole purpose is to use
Simple form presents some concepts, in this, as the preamble of following detailed description.
The present invention adopts the following technical scheme that
In some optional embodiments, it is provided that extension method based on java remote authorization APP, including:
Software installed by step 1:PC machine, and initializes the MAC Address of the described PC of backstage storage;
Step 2: the MAC Address of described PC is verified by server, it is judged that whether the MAC Address of described PC exists, if
Exist and then carry out step 3, otherwise carry out step 4;
Step 3: described server judges whether the MAC Address of described PC freezes, if freezing, carrying out step 5, otherwise carrying out
Step 8;
Step 4: described server preserves the MAC information of described PC and is set as extension state;
Step 5: described server generates identifying code, and sends unblock note to the first mobile terminal;
Step 6: identifying code described in described first acquisition for mobile terminal is also forwarded to the second mobile terminal;
Step 7: identifying code described in described server authentication is the most expired, if expired, carry out step 5, otherwise carries out step 8;
Step 8: described PC sends request message of delaying to described server;
Step 9: described server receives described extension request message and audits, by msu message with note after having audited
Form be sent to the 3rd mobile terminal, described server to described 3rd mobile terminal send short message in comprise setting
The entrance of extension time;
Step 10: the described 3rd acquisition for mobile terminal extension time is also committed to backstage.
In some optional embodiments, the short breath of described unblock comprises request and unlocks information and the checking of described PC
Code.
In some optional embodiments, described first mobile terminal is the mobile phone carried by city partner or flat board electricity
Brain.
In some optional embodiments, described second mobile terminal is the mobile phone carried by installation personnel or flat board electricity
Brain.
In some optional embodiments, described 3rd mobile terminal is the mobile phone or panel computer carried by person approving.
The beneficial effect that the present invention is brought: the software needed an extension remotely is authorized by company person approving, it is therefore prevented that
Usurping of room software is seen on foreground, it is achieved that PC and the one_to_one corresponding of APP, significantly prevents the theft seeing room software, gives
One safer environment of client uses.
For above-mentioned and relevant purpose, one or more embodiments include will be explained in below and in claim
In the feature that particularly points out.Description below and accompanying drawing describe some illustrative aspects in detail, and its instruction is only
Some modes in the utilizable various modes of principle of each embodiment.Other benefit and novel features will along with under
The detailed description in face is considered in conjunction with the accompanying and becomes obvious, the disclosed embodiments be intended to include all these aspect and they
Equivalent.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of a kind of extension method based on java remote authorization APP of the present invention.
Detailed description of the invention
The following description and drawings illustrate specific embodiments of the present invention fully, to enable those skilled in the art to
Put into practice them.Other embodiments can include structure, logic, electric, process and other change.Embodiment
Only represent possible change.Unless explicitly requested, otherwise individually components and functionality is optional, and the order operated is permissible
Change.The part of some embodiments and feature can be included in or replace part and the feature of other embodiments.This
The scope of bright embodiment includes the gamut of claims, and all obtainable equivalent of claims
Thing.
Owing to software version is transferred, there is the risk that software is usurped, therefore the present invention provides a kind of and prevents software from usurping
Remote authorization extension method, the software needed an extension remotely is authorized by company person approving.By MAC Address and the software of PC
Binding, and verify in use, want to unlock, need by short message verification code the most operable, and identifying code is by city partner
Send after first examination & verification, significantly prevent the theft of software, use to one safer environment of client.
As it is shown in figure 1, in some illustrative embodiments, it is provided that a kind of extension side based on java remote authorization APP
Method, including:
Software installed by step 1:PC machine, and initializes the MAC Address of the described PC of backstage storage;
Step 2: the MAC Address of described PC is verified by server, it is judged that whether the MAC Address of described PC exists, i.e.
Verify whether described PC installed this software, if existing, carrying out step 3, otherwise carrying out step 4, if not existing, then proving
This software do not installed by described PC;
Step 3: described server judges whether the MAC Address of described PC freezes, if freezing, carrying out step 5, otherwise carrying out
Step 8;
Step 4: described server preserves the MAC information of described PC and is set as extension state, i.e. acquiescence Current software is super
Spend the use date;
Step 5: described server generate identifying code, and send unblock note to the first mobile terminal, unlock short breath and comprise request
Unlock information and the identifying code of described PC;
Step 6: identifying code described in described first acquisition for mobile terminal is also forwarded to the second mobile terminal;
Step 7: identifying code described in described server authentication is the most expired, if expired, carry out step 5, otherwise carries out step 8;
Step 8: described PC sends request message of delaying to described server;
Step 9: described server receives described extension request message and audits, by msu message with note after having audited
Form be sent to the 3rd mobile terminal, described server to described 3rd mobile terminal send short message in comprise setting
The entrance of extension time;
Step 10: the described 3rd acquisition for mobile terminal extension time is also committed to backstage.
In some illustrative embodiments, described first mobile terminal is the mobile phone or flat board carried by city partner
Computer;Described second mobile terminal is the mobile phone or panel computer carried by installation personnel;Described 3rd mobile terminal is for by examining
Mobile phone that core people carries or panel computer.Wherein, the rank of the mobile terminal related to is that the 3rd mobile terminal > first moves end
End > the second mobile terminal, i.e. person approving > city partner > installation personnel.
The extension method that the present invention provides is the soft extension request of remote authorization, for preventing software pirate use, needs remote upload
Personnel audit mandate and just can delay, and during software use, the MAC Address with PC is bound, if software is replicated copy,
Server can judge whether current MAC value locks, and after locking, installation personnel needs to input the identifying code ability that city partner provides
Follow-up deferred operations can be carried out.Backstage uses stable Java and MySQL exploitation and HTTP communication, and caching mechanism is service
The Buffering Verifier code data of device, alleviate retrieval and the operating pressure of server.
It should also be appreciated by one skilled in the art that various illustrative box, the mould combining the embodiments herein and describing
Block, circuit and algorithm steps all can be implemented as electronic hardware, computer software or a combination thereof.In order to clearly demonstrate hardware and
Interchangeability between software, is all carried out around its function various illustrative parts, frame, module, circuit and step above
It is generally described.It is implemented as hardware as this function and is also implemented as software, depend on specifically applying and to whole
The design constraint that system is applied.Those skilled in the art can realize in the way of flexible for each application-specific
Described function, but, this realize decision-making and should not be construed as the protection domain deviating from the disclosure.
Claims (5)
1. extension method based on java remote authorization APP, it is characterised in that including:
Software installed by step 1:PC machine, and initializes the MAC Address of the described PC of backstage storage;
Step 2: the MAC Address of described PC is verified by server, it is judged that whether the MAC Address of described PC exists, if
Exist and then carry out step 3, otherwise carry out step 4;
Step 3: described server judges whether the MAC Address of described PC freezes, if freezing, carrying out step 5, otherwise carrying out
Step 8;
Step 4: described server preserves the MAC information of described PC and is set as extension state;
Step 5: described server generates identifying code, and sends unblock note to the first mobile terminal;
Step 6: identifying code described in described first acquisition for mobile terminal is also forwarded to the second mobile terminal;
Step 7: identifying code described in described server authentication is the most expired, if expired, carry out step 5, otherwise carries out step 8;
Step 8: described PC sends request message of delaying to described server;
Step 9: described server receives described extension request message and audits, by msu message with note after having audited
Form be sent to the 3rd mobile terminal, described server to described 3rd mobile terminal send short message in comprise setting
The entrance of extension time;
Step 10: the described 3rd acquisition for mobile terminal extension time is also committed to backstage.
Extension method based on java remote authorization APP the most according to claim 1, it is characterised in that described unblock is short
Breath comprises request and unlocks information and the identifying code of described PC.
Extension method based on java remote authorization APP the most according to claim 1, it is characterised in that described first moves
Dynamic terminal is the mobile phone or panel computer carried by city partner.
Extension method based on java remote authorization APP the most according to claim 1, it is characterised in that described second moves
Dynamic terminal is the mobile phone or panel computer carried by installation personnel.
Extension method based on java remote authorization APP the most according to claim 1, it is characterised in that the described 3rd moves
Dynamic terminal is the mobile phone or panel computer carried by person approving.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610625782.7A CN106250722A (en) | 2016-08-03 | 2016-08-03 | Extension method based on java remote authorization APP |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610625782.7A CN106250722A (en) | 2016-08-03 | 2016-08-03 | Extension method based on java remote authorization APP |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106250722A true CN106250722A (en) | 2016-12-21 |
Family
ID=57606168
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610625782.7A Pending CN106250722A (en) | 2016-08-03 | 2016-08-03 | Extension method based on java remote authorization APP |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106250722A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6778096B1 (en) * | 1997-11-17 | 2004-08-17 | International Business Machines Corporation | Method and apparatus for deploying and tracking computers |
CN102208003A (en) * | 2010-03-31 | 2011-10-05 | 鸿富锦精密工业(深圳)有限公司 | Software program protection system and method |
CN103171277A (en) * | 2011-12-21 | 2013-06-26 | 北大方正集团有限公司 | Authorization method and authorization device of printing equipment |
CN105786531A (en) * | 2014-12-19 | 2016-07-20 | 江苏融成嘉益信息科技有限公司 | Cooperative work method for online software update and data encryption |
-
2016
- 2016-08-03 CN CN201610625782.7A patent/CN106250722A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6778096B1 (en) * | 1997-11-17 | 2004-08-17 | International Business Machines Corporation | Method and apparatus for deploying and tracking computers |
CN102208003A (en) * | 2010-03-31 | 2011-10-05 | 鸿富锦精密工业(深圳)有限公司 | Software program protection system and method |
CN103171277A (en) * | 2011-12-21 | 2013-06-26 | 北大方正集团有限公司 | Authorization method and authorization device of printing equipment |
CN105786531A (en) * | 2014-12-19 | 2016-07-20 | 江苏融成嘉益信息科技有限公司 | Cooperative work method for online software update and data encryption |
Non-Patent Citations (1)
Title |
---|
鬼龙老大: "软件延期", 《《饮食通》操作手册软件安装》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106875518B (en) | Control method and device of intelligent lock and intelligent lock | |
CN106462674B (en) | Resource access control using authentication tokens | |
US10356082B2 (en) | Distributing an authentication key to an application installation | |
CN103179115B (en) | The cloud service access control method that a kind of facing cloud television terminal is applied across cloud | |
WO2017107732A1 (en) | Login status synchronization method and system | |
CN102546648B (en) | Resource access authorization method | |
CN104537293B (en) | Authenticating device and system | |
CN107025400A (en) | Device accesses revocation | |
CN107948321A (en) | The remote-authorization method and system of vehicle | |
US20180109530A1 (en) | Peer to peer enterprise file sharing | |
CN104219198B (en) | A kind of tamper resistant method of WebApp | |
CN103716794A (en) | Two-way safety verification method and system based on portable device | |
US20160048673A1 (en) | Secure electronic lock | |
CN103685194A (en) | Capacity calling method and device, and terminal | |
CN105872848A (en) | Credible two-way authentication method applicable to asymmetric resource environment | |
CN109246205A (en) | A kind of smart lock upgrade method and device based on mobile Internet and bluetooth | |
CN109166200A (en) | Authorization method, device, system, electronic lock, digital key and storage medium | |
CN103957189B (en) | Application program interaction method and device | |
US8595848B2 (en) | Method for moving rights object and method for managing rights of issuing rights object and system thereof | |
CN110266653A (en) | A kind of method for authenticating, system and terminal device | |
CN105610855A (en) | Method and device for login verification of cross-domain system | |
CN106250722A (en) | Extension method based on java remote authorization APP | |
CN114070616B (en) | Distributed session sharing method and system based on redis cache | |
CN116436624A (en) | Storage system access method and device, computer readable medium and electronic equipment | |
CN105227305A (en) | Safe verification method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161221 |