CN106845164B - Network-based software authorization method - Google Patents
Network-based software authorization method Download PDFInfo
- Publication number
- CN106845164B CN106845164B CN201710063977.1A CN201710063977A CN106845164B CN 106845164 B CN106845164 B CN 106845164B CN 201710063977 A CN201710063977 A CN 201710063977A CN 106845164 B CN106845164 B CN 106845164B
- Authority
- CN
- China
- Prior art keywords
- authorization
- client
- data
- server
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 21
- 238000013475 authorization Methods 0.000 claims abstract description 110
- 238000012795 verification Methods 0.000 claims abstract description 6
- 230000006855 networking Effects 0.000 claims abstract description 4
- 238000012545 processing Methods 0.000 claims description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
- G06F21/1014—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to tokens
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Power Engineering (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention provides a network-based software authorization method, which comprises the following steps: the client executes authorization verification operation, specifically verifies whether the client is authorized according to the identification information of the client, and if the client is authorized, authorization management operation is performed through the server; if not, the server end sends authorization data to verify through networking, and if the verification is successful, authorization management operation is carried out through the server end; and the server executes authorization management operation, judges whether to authorize and update the authorization limit according to the request data sent by the client, and returns authorization result information. The authorization process provided by the invention is full-automatic, convenient and quick, and saves much time during factory production, thereby saving the cost; the authorization condition of the client and the use condition of the client can be monitored through the authorization management of the server, and a software developer can know the working state of the software; the authorization management facilitates the software developer to count the order status and the after-sale status.
Description
Technical Field
The invention relates to the technical field of software systems, in particular to a network-based software authorization method.
Background
For a software developer, the developed system software or application software, and the released system firmware or application, are expected to be protected, and need to purchase a corresponding license for use, so as to achieve the purpose of obtaining profits through software development. Therefore, software developers are required to manage and control the use of software on different devices when delivering the developed software to customers, and currently, software authorization methods mainly include the following methods:
a hardware shield is purchased (this is a piece of hardware connected to a computer with a specific hardware key inside). The drawback of this method is that each time the user executes the software, the software is checked to determine if the hardware shield is attached to the computer and to determine if the key in the hardware shield is correct. In the method, the user is very troublesome, so the user experience is poor, and the cost is increased because the user needs the support of a hardware shield;
when the user needs to use the software, the user is forced to enter the authorization website or the server and then inputs the corresponding password, so that great inconvenience is caused to the user, the password is easy to leak, and the benefit of a software developer is damaged.
The serial number is purchased and needs to be input for authorization when using the software. The method needs manual completion by a user, and causes unnecessary trouble to the user.
Disclosure of Invention
In order to solve the technical problem, the invention provides a network software-based authorization method, which is realized by a client and a server and comprises the following steps:
the client executes an authorization verification operation, specifically including the following operations:
a1: checking authorization mark information prestored in a client;
a2: if the authorization flag information is authorized, reading the authorization data of the client, comparing the authorization data of the client with the authorization data stored corresponding to the authorization flag information, if the authorization data are different, judging that the flag information of the client is unauthorized, and executing the step A4; if the two are the same, the client side is authorized successfully;
a3: if the authorization mark is unauthorized, the client requires networking authorization, otherwise, the client cannot use the network;
a4: judging whether to be networked or not, and if not, controlling the client to be networked;
a5: if the client is networked, automatically sending an authorization request to the server;
a6: the server receives the request, performs authorization processing and returns authorization data to the client, and if authorization is successful, the client stores the authorization data; if the authorization fails, prompting the user that the authorization fails and returning failure information to the client;
the server side executes authorization management operation, and specifically comprises the following steps:
b1, the server receives the authorization request sent by the client, judges whether the request data accords with the logic, if not, the request data is judged to be invalid data, and the server does not respond;
b2, if the request data in the step B1 is logical, judging the data to be valid data;
b3: further judging whether the request data has an authorized limit;
b4: if the limit is not available, returning error information to the client; if the quota exists, further judging whether an authorization record exists or not;
b5: if no record exists, authorizing and updating the authorization limit, and returning authorization result information to the client;
b6: if the record exists in the step B5, further judging the repeat type;
b7: if the clients are different, authorizing and updating the authorization limit, and returning authorization result information to the client; and if the clients are the same, updating the authorization time and returning authorization result information.
Preferably, the server stores database information, can record the serial number of the client, and records the authorization result of the client.
Preferably, the request data includes a client ID, a device model, an authorization type ID, a software version number, and a DeviceID, and the server determines whether the request data conforms to logic according to whether the request data includes the above data.
Preferably, the manner of determining the repetition type in step B6 is as follows:
judging the repeated type according to the client ID, wherein if the client ID is the same, the client is the same; if the client ID is different, the client is different.
The invention has the following beneficial effects:
the authorization process of the authorization method based on the network software is full-automatic, convenient and fast, and saves much time during factory production, thereby saving the cost; the authorization condition of the client and the use condition of the client can be monitored through the authorization management of the server, and a software developer can know the working state of the software; the authorization management background is provided with database information, the number of the same model, namely the serial number, can be recorded, and the related information of the client is recorded, and the order condition and the user use condition can be reflected through the information.
Of course, it is not necessary for any product in which the invention is practiced to achieve all of the above-described advantages at the same time.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic diagram illustrating a flow of an operation of a client performing authorization verification according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a process of executing authorization management by a server according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention provides a network-based software authorization method, which is realized by a client and a server and comprises the following steps:
the client executes an authorization verification operation, as shown in fig. 1, specifically including the following operations:
a1: checking authorization mark information prestored in a client;
a2: if the authorization flag information is authorized, reading the authorization data of the client, comparing the authorization data of the client with the authorization data stored corresponding to the authorization flag information, if the authorization data are different, judging that the flag information of the client is unauthorized, and executing the step A4; if the two are the same, the client side is authorized successfully;
a3: if the authorization mark is unauthorized, the client requires networking authorization, otherwise, the client cannot use the network;
a4: judging whether to be networked or not, and if not, controlling the client to be networked;
a5: if the client is networked, automatically sending an authorization request to the server;
a6: the server receives the request, performs authorization processing and returns authorization data to the client, and if authorization is successful, the client stores the authorization data; if the authorization fails, prompting the user that the authorization fails and returning failure information to the client;
the server executes the authorization management operation, as shown in fig. 2, specifically including the following steps:
b1, the server receives the authorization request sent by the client, judges whether the request data accords with the logic, if not, the request data is judged to be invalid data, and the server does not respond;
b2, if the request data in the step B1 is logical, judging the data to be valid data;
b3: further judging whether the request data has an authorized limit;
b4: if the limit is not available, returning error information to the client; if the quota exists, further judging whether an authorization record exists or not;
b5: if no record exists, authorizing and updating the authorization limit, and returning authorization result information to the client;
b6: if the record exists in the step B5, further judging the repeat type;
b7: if the clients are different, authorizing and updating the authorization limit, and returning authorization result information to the client; and if the clients are the same, updating the authorization time and returning authorization result information.
The server stores database information, can record the serial number of the client and record the authorization result of the client.
The request data comprises a client ID, a device model, an authorization type ID, a software version number and a DeviceID, and the server side judges whether the request data accords with logic according to whether the request data contains the data.
Step B6 determines the repetition type as follows:
judging the repeated type according to the client ID, wherein if the client ID is the same, the client is the same; if the client ID is different, the client is different.
The authorization process of the authorization method based on the network software is full-automatic, convenient and fast, and saves much time during factory production, thereby saving the cost; the authorization condition of the client and the use condition of the client can be monitored through the authorization management of the server, and a software developer can know the working state of the software; the authorization management background is provided with database information, the number of the same model, namely the serial number, can be recorded, and the related information of the client is recorded, and the order condition and the user use condition can be reflected through the information.
The preferred embodiments of the invention disclosed above are intended to be illustrative only. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise embodiments disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best utilize the invention. The invention is limited only by the claims and their full scope and equivalents.
Claims (4)
1. A network-based software authorization method is realized by a client and a server, and is characterized by comprising the following steps:
the client executes an authorization verification operation, specifically including the following operations:
a1: checking authorization mark information prestored in a client;
a2: if the authorization flag information is authorized, reading the authorization data of the client, comparing the authorization data of the client with the authorization data stored corresponding to the authorization flag information, if the authorization data are different, judging that the flag information of the client is unauthorized, and executing the step A4; if the two are the same, the client side is authorized successfully;
a3: if the authorization mark is unauthorized, the client requires networking authorization, otherwise, the client cannot use the network;
a4: judging whether to be networked or not, and if not, controlling the client to be networked;
a5: if the client is networked, automatically sending an authorization request to the server;
a6: the server receives the request, performs authorization processing and returns authorization data to the client, and if authorization is successful, the client stores the authorization data; if the authorization fails, prompting the user that the authorization fails and returning failure information to the client;
the server side executes authorization management operation, and specifically comprises the following steps:
b1, the server receives the authorization request sent by the client, judges whether the request data accords with the logic, if not, the request data is judged to be invalid data, and the server does not respond;
b2, if the request data in the step B1 is logical, judging the data to be valid data;
b3: further judging whether the request data has an authorized limit;
b4: if the limit is not available, returning error information to the client; if the quota exists, further judging whether an authorization record exists or not;
b5: if no record exists, authorizing and updating the authorization limit, and returning authorization result information to the client;
b6: if the record exists in the step B5, further judging the repeat type;
b7: if the clients are different, authorizing and updating the authorization limit, and returning authorization result information to the client; and if the clients are the same, updating the authorization time and returning authorization result information.
2. The network-based software authorization method according to claim 1, wherein the server stores database information, records a serial number of the client, and records an authorization result of the client.
3. The network-based software authorization method according to claim 1, wherein the request data includes a client ID, a device model, an authorization type ID, a software version number, and a DeviceID, and the server determines whether the request data is logical according to whether the request data includes the above data.
4. The network-based software authorization method according to claim 1, wherein the step B6 judges the repetition type in a manner that:
judging the repeated type according to the client ID, wherein if the client ID is the same, the client is the same; if the client ID is different, the client is different.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710063977.1A CN106845164B (en) | 2017-02-04 | 2017-02-04 | Network-based software authorization method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710063977.1A CN106845164B (en) | 2017-02-04 | 2017-02-04 | Network-based software authorization method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106845164A CN106845164A (en) | 2017-06-13 |
CN106845164B true CN106845164B (en) | 2020-08-04 |
Family
ID=59121947
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710063977.1A Active CN106845164B (en) | 2017-02-04 | 2017-02-04 | Network-based software authorization method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106845164B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110445749B (en) * | 2019-06-12 | 2022-04-01 | 冯威 | Method for authorizing product production |
CN112528235A (en) * | 2020-12-04 | 2021-03-19 | 上海波客实业有限公司 | Method for authorizing industrial software |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101814122A (en) * | 2009-12-08 | 2010-08-25 | 北京启扬讯达软件有限公司 | Method and system for monitoring software use authorization information |
CN104580316A (en) * | 2013-10-24 | 2015-04-29 | 深圳市国信互联科技有限公司 | Software authorization management method and software authorization management system |
CN105260627A (en) * | 2015-09-18 | 2016-01-20 | 许继集团有限公司 | Anti-copy method for embedded device program |
CN106355052A (en) * | 2016-11-03 | 2017-01-25 | 广东浪潮大数据研究有限公司 | Authorization centralized management method, device and system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7693851B2 (en) * | 2005-12-30 | 2010-04-06 | Sap Ag | Systems and methods for implementing a shared space in a provider-tenant environment |
CN103995991B (en) * | 2014-05-07 | 2017-02-15 | 华中师范大学 | Method for binding hardware information and secret keys in software copyright protection |
-
2017
- 2017-02-04 CN CN201710063977.1A patent/CN106845164B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101814122A (en) * | 2009-12-08 | 2010-08-25 | 北京启扬讯达软件有限公司 | Method and system for monitoring software use authorization information |
CN104580316A (en) * | 2013-10-24 | 2015-04-29 | 深圳市国信互联科技有限公司 | Software authorization management method and software authorization management system |
CN105260627A (en) * | 2015-09-18 | 2016-01-20 | 许继集团有限公司 | Anti-copy method for embedded device program |
CN106355052A (en) * | 2016-11-03 | 2017-01-25 | 广东浪潮大数据研究有限公司 | Authorization centralized management method, device and system |
Also Published As
Publication number | Publication date |
---|---|
CN106845164A (en) | 2017-06-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110889710B (en) | Device information management method, server, and storage medium | |
US10147096B2 (en) | Device diagnostic and data retrieval | |
CN101116070B (en) | System and method to lock TPM always 'on' using a monitor | |
US10144391B2 (en) | Electronics unit, method carried out in an electronics unit of said type, method for sharing a time frame between a server and an electronics unit, and method for synchronizing a server and an electronics unit | |
CN107943502A (en) | A kind of upgrade method based on the detection of fine granularity system mode under linux system | |
JP7021239B2 (en) | Remote management of initial operating system setup options | |
WO2020000758A1 (en) | Server acceptance method and apparatus, computer device, and storage medium | |
KR20120051662A (en) | A method for controlling unauthorized software application usage | |
US7373308B2 (en) | Computer system warranty upgrade method with configuration change detection feature | |
US7373307B2 (en) | Computer system warranty upgrade method | |
CN106845164B (en) | Network-based software authorization method | |
CN110069266A (en) | Application upgrade method, apparatus, computer equipment and storage medium | |
CN115981687A (en) | Firmware upgrading method, device, equipment and storage medium | |
CN109948330B (en) | Method, device, equipment and storage medium for implementing application management service | |
CN113051539A (en) | Method and device for calling digital certificate | |
US12086257B2 (en) | Trusted firmware verification | |
CN108768916B (en) | Method and device for acquiring security configuration information | |
US20230394493A1 (en) | Unmediated and mediated transfer of ownership of devices | |
US11803463B2 (en) | Systems and methods for software integration validation | |
CN110968841A (en) | Activation method, device and system of programmable logic controller | |
TW201935241A (en) | Network framework for detection operation and information management method applied thereto | |
CN114020313A (en) | Application updating method and related equipment | |
CN107295078A (en) | A kind of patch distribution tracking and control system and method | |
CN110647726A (en) | Multi-model authorization permission framework and method based on cloud mode | |
KR20130058527A (en) | System and method for security of application, communication terminal therefor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |